Characterizing Levels of Reasoning in Graph Theory
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
1. Directed Graphs Or Quivers What Is Category Theory? • Graph Theory on Steroids • Comic Book Mathematics • Abstract Nonsense • the Secret Dictionary
1. Directed graphs or quivers What is category theory? • Graph theory on steroids • Comic book mathematics • Abstract nonsense • The secret dictionary Sets and classes: For S = fX j X2 = Xg, have S 2 S , S2 = S Directed graph or quiver: C = (C0;C1;@0 : C1 ! C0;@1 : C1 ! C0) Class C0 of objects, vertices, points, . Class C1 of morphisms, (directed) edges, arrows, . For x; y 2 C0, write C(x; y) := ff 2 C1 j @0f = x; @1f = yg f 2C1 tail, domain / @0f / @1f o head, codomain op Opposite or dual graph of C = (C0;C1;@0;@1) is C = (C0;C1;@1;@0) Graph homomorphism F : D ! C has object part F0 : D0 ! C0 and morphism part F1 : D1 ! C1 with @i ◦ F1(f) = F0 ◦ @i(f) for i = 0; 1. Graph isomorphism has bijective object and morphism parts. Poset (X; ≤): set X with reflexive, antisymmetric, transitive order ≤ Hasse diagram of poset (X; ≤): x ! y if y covers x, i.e., x 6= y and [x; y] = fx; yg, so x ≤ z ≤ y ) z = x or z = y. Hasse diagram of (N; ≤) is 0 / 1 / 2 / 3 / ::: Hasse diagram of (f1; 2; 3; 6g; j ) is 3 / 6 O O 1 / 2 1 2 2. Categories Category: Quiver C = (C0;C1;@0 : C1 ! C0;@1 : C1 ! C0) with: • composition: 8 x; y; z 2 C0 ; C(x; y) × C(y; z) ! C(x; z); (f; g) 7! g ◦ f • satisfying associativity: 8 x; y; z; t 2 C0 ; 8 (f; g; h) 2 C(x; y) × C(y; z) × C(z; t) ; h ◦ (g ◦ f) = (h ◦ g) ◦ f y iS qq <SSSS g qq << SSS f qqq h◦g < SSSS qq << SSS qq g◦f < SSS xqq << SS z Vo VV < x VVVV << VVVV < VVVV << h VVVV < h◦(g◦f)=(h◦g)◦f VVVV < VVV+ t • identities: 8 x; y; z 2 C0 ; 9 1y 2 C(y; y) : 8 f 2 C(x; y) ; 1y ◦ f = f and 8 g 2 C(y; z) ; g ◦ 1y = g f y o x MM MM 1y g MM MMM f MMM M& zo g y Example: N0 = fxg ; N1 = N ; 1x = 0 ; 8 m; n 2 N ; n◦m = m+n ; | one object, lots of arrows [monoid of natural numbers under addition] 4 x / x Equation: 3 + 5 = 4 + 4 Commuting diagram: 3 4 x / x 5 ( 1 if m ≤ n; Example: N1 = N ; 8 m; n 2 N ; jN(m; n)j = 0 otherwise | lots of objects, lots of arrows [poset (N; ≤) as a category] These two examples are small categories: have a set of morphisms. -
What's in a Name? the Matrix As an Introduction to Mathematics
St. John Fisher College Fisher Digital Publications Mathematical and Computing Sciences Faculty/Staff Publications Mathematical and Computing Sciences 9-2008 What's in a Name? The Matrix as an Introduction to Mathematics Kris H. Green St. John Fisher College, [email protected] Follow this and additional works at: https://fisherpub.sjfc.edu/math_facpub Part of the Mathematics Commons How has open access to Fisher Digital Publications benefited ou?y Publication Information Green, Kris H. (2008). "What's in a Name? The Matrix as an Introduction to Mathematics." Math Horizons 16.1, 18-21. Please note that the Publication Information provides general citation information and may not be appropriate for your discipline. To receive help in creating a citation based on your discipline, please visit http://libguides.sjfc.edu/citations. This document is posted at https://fisherpub.sjfc.edu/math_facpub/12 and is brought to you for free and open access by Fisher Digital Publications at St. John Fisher College. For more information, please contact [email protected]. What's in a Name? The Matrix as an Introduction to Mathematics Abstract In lieu of an abstract, here is the article's first paragraph: In my classes on the nature of scientific thought, I have often used the movie The Matrix to illustrate the nature of evidence and how it shapes the reality we perceive (or think we perceive). As a mathematician, I usually field questions elatedr to the movie whenever the subject of linear algebra arises, since this field is the study of matrices and their properties. So it is natural to ask, why does the movie title reference a mathematical object? Disciplines Mathematics Comments Article copyright 2008 by Math Horizons. -
The Matrix As an Introduction to Mathematics
St. John Fisher College Fisher Digital Publications Mathematical and Computing Sciences Faculty/Staff Publications Mathematical and Computing Sciences 2012 What's in a Name? The Matrix as an Introduction to Mathematics Kris H. Green St. John Fisher College, [email protected] Follow this and additional works at: https://fisherpub.sjfc.edu/math_facpub Part of the Mathematics Commons How has open access to Fisher Digital Publications benefited ou?y Publication Information Green, Kris H. (2012). "What's in a Name? The Matrix as an Introduction to Mathematics." Mathematics in Popular Culture: Essays on Appearances in Film, Fiction, Games, Television and Other Media , 44-54. Please note that the Publication Information provides general citation information and may not be appropriate for your discipline. To receive help in creating a citation based on your discipline, please visit http://libguides.sjfc.edu/citations. This document is posted at https://fisherpub.sjfc.edu/math_facpub/18 and is brought to you for free and open access by Fisher Digital Publications at St. John Fisher College. For more information, please contact [email protected]. What's in a Name? The Matrix as an Introduction to Mathematics Abstract In my classes on the nature of scientific thought, I have often used the movie The Matrix (1999) to illustrate how evidence shapes the reality we perceive (or think we perceive). As a mathematician and self-confessed science fiction fan, I usually field questionselated r to the movie whenever the subject of linear algebra arises, since this field is the study of matrices and their properties. So it is natural to ask, why does the movie title reference a mathematical object? Of course, there are many possible explanations for this, each of which probably contributed a little to the naming decision. -
Graph Theory
1 Graph Theory “Begin at the beginning,” the King said, gravely, “and go on till you come to the end; then stop.” — Lewis Carroll, Alice in Wonderland The Pregolya River passes through a city once known as K¨onigsberg. In the 1700s seven bridges were situated across this river in a manner similar to what you see in Figure 1.1. The city’s residents enjoyed strolling on these bridges, but, as hard as they tried, no residentof the city was ever able to walk a route that crossed each of these bridges exactly once. The Swiss mathematician Leonhard Euler learned of this frustrating phenomenon, and in 1736 he wrote an article [98] about it. His work on the “K¨onigsberg Bridge Problem” is considered by many to be the beginning of the field of graph theory. FIGURE 1.1. The bridges in K¨onigsberg. J.M. Harris et al., Combinatorics and Graph Theory , DOI: 10.1007/978-0-387-79711-3 1, °c Springer Science+Business Media, LLC 2008 2 1. Graph Theory At first, the usefulness of Euler’s ideas and of “graph theory” itself was found only in solving puzzles and in analyzing games and other recreations. In the mid 1800s, however, people began to realize that graphs could be used to model many things that were of interest in society. For instance, the “Four Color Map Conjec- ture,” introduced by DeMorgan in 1852, was a famous problem that was seem- ingly unrelated to graph theory. The conjecture stated that four is the maximum number of colors required to color any map where bordering regions are colored differently. -
An Application of Graph Theory in Markov Chains Reliability Analysis
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DSpace at VSB Technical University of Ostrava STATISTICS VOLUME: 12 j NUMBER: 2 j 2014 j JUNE An Application of Graph Theory in Markov Chains Reliability Analysis Pavel SKALNY Department of Applied Mathematics, Faculty of Electrical Engineering and Computer Science, VSB–Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava-Poruba, Czech Republic [email protected] Abstract. The paper presents reliability analysis which the production will be equal or greater than the indus- was realized for an industrial company. The aim of the trial partner demand. To deal with the task a Monte paper is to present the usage of discrete time Markov Carlo simulation of Discrete time Markov chains was chains and the flow in network approach. Discrete used. Markov chains a well-known method of stochastic mod- The goal of this paper is to present the Discrete time elling describes the issue. The method is suitable for Markov chain analysis realized on the system, which is many systems occurring in practice where we can easily not distributed in parallel. Since the analysed process distinguish various amount of states. Markov chains is more complicated the graph theory approach seems are used to describe transitions between the states of to be an appropriate tool. the process. The industrial process is described as a graph network. The maximal flow in the network cor- Graph theory has previously been applied to relia- responds to the production. The Ford-Fulkerson algo- bility, but for different purposes than we intend. -
Math Object Identifiers – Towards Research Data in Mathematics
Math Object Identifiers – Towards Research Data in Mathematics Michael Kohlhase Computer Science, FAU Erlangen-N¨urnberg Abstract. We propose to develop a system of “Math Object Identi- fiers” (MOIs: digital object identifiers for mathematical concepts, ob- jects, and models) and a process of registering them. These envisioned MOIs constitute a very lightweight form of semantic annotation that can support many knowledge-based workflows in mathematics, e.g. clas- sification of articles via the objects mentioned or object-based search. In essence MOIs are an enabling technology for Linked Open Data for mathematics and thus makes (parts of) the mathematical literature into mathematical research data. 1 Introduction The last years have seen a surge in interest in scaling computer support in scientific research by preserving, making accessible, and managing research data. For most subjects, research data consist in measurement or simulation data about the objects of study, ranging from subatomic particles via weather systems to galaxy clusters. Mathematics has largely been left untouched by this trend, since the objects of study – mathematical concepts, objects, and models – are by and large ab- stract and their properties and relations apply whole classes of objects. There are some exceptions to this, concrete integer sequences, finite groups, or ℓ-functions and modular form are collected and catalogued in mathematical data bases like the OEIS (Online Encyclopedia of Integer Sequences) [Inc; Slo12], the GAP Group libraries [GAP, Chap. 50], or the LMFDB (ℓ-Functions and Modular Forms Data Base) [LMFDB; Cre16]. Abstract mathematical structures like groups, manifolds, or probability dis- tributions can formalized – usually by definitions – in logical systems, and their relations expressed in form of theorems which can be proved in the logical sys- tems as well. -
1.3 Matrices and Matrix Operations 1.3.1 De…Nitions and Notation Matrices Are Yet Another Mathematical Object
20 CHAPTER 1. SYSTEMS OF LINEAR EQUATIONS AND MATRICES 1.3 Matrices and Matrix Operations 1.3.1 De…nitions and Notation Matrices are yet another mathematical object. Learning about matrices means learning what they are, how they are represented, the types of operations which can be performed on them, their properties and …nally their applications. De…nition 50 (matrix) 1. A matrix is a rectangular array of numbers. in which not only the value of the number is important but also its position in the array. 2. The numbers in the array are called the entries of the matrix. 3. The size of the matrix is described by the number of its rows and columns (always in this order). An m n matrix is a matrix which has m rows and n columns. 4. The elements (or the entries) of a matrix are generally enclosed in brack- ets, double-subscripting is used to index the elements. The …rst subscript always denote the row position, the second denotes the column position. For example a11 a12 ::: a1n a21 a22 ::: a2n A = 2 ::: ::: ::: ::: 3 (1.5) 6 ::: ::: ::: ::: 7 6 7 6 am1 am2 ::: amn 7 6 7 =4 [aij] , i = 1; 2; :::; m, j =5 1; 2; :::; n (1.6) Enclosing the general element aij in square brackets is another way of representing a matrix A . 5. When m = n , the matrix is said to be a square matrix. 6. The main diagonal in a square matrix contains the elements a11; a22; a33; ::: 7. A matrix is said to be upper triangular if all its entries below the main diagonal are 0. -
1 Sets and Set Notation. Definition 1 (Naive Definition of a Set)
LINEAR ALGEBRA MATH 2700.006 SPRING 2013 (COHEN) LECTURE NOTES 1 Sets and Set Notation. Definition 1 (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most often name sets using capital letters, like A, B, X, Y , etc., while the elements of a set will usually be given lower-case letters, like x, y, z, v, etc. Two sets X and Y are called equal if X and Y consist of exactly the same elements. In this case we write X = Y . Example 1 (Examples of Sets). (1) Let X be the collection of all integers greater than or equal to 5 and strictly less than 10. Then X is a set, and we may write: X = f5; 6; 7; 8; 9g The above notation is an example of a set being described explicitly, i.e. just by listing out all of its elements. The set brackets {· · ·} indicate that we are talking about a set and not a number, sequence, or other mathematical object. (2) Let E be the set of all even natural numbers. We may write: E = f0; 2; 4; 6; 8; :::g This is an example of an explicity described set with infinitely many elements. The ellipsis (:::) in the above notation is used somewhat informally, but in this case its meaning, that we should \continue counting forever," is clear from the context. (3) Let Y be the collection of all real numbers greater than or equal to 5 and strictly less than 10. Recalling notation from previous math courses, we may write: Y = [5; 10) This is an example of using interval notation to describe a set. -
Graph Algorithms in Bioinformatics an Introduction to Bioinformatics Algorithms Outline
An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Graph Algorithms in Bioinformatics An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Outline 1. Introduction to Graph Theory 2. The Hamiltonian & Eulerian Cycle Problems 3. Basic Biological Applications of Graph Theory 4. DNA Sequencing 5. Shortest Superstring & Traveling Salesman Problems 6. Sequencing by Hybridization 7. Fragment Assembly & Repeats in DNA 8. Fragment Assembly Algorithms An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Section 1: Introduction to Graph Theory An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Knight Tours • Knight Tour Problem: Given an 8 x 8 chessboard, is it possible to find a path for a knight that visits every square exactly once and returns to its starting square? • Note: In chess, a knight may move only by jumping two spaces in one direction, followed by a jump one space in a perpendicular direction. http://www.chess-poster.com/english/laws_of_chess.htm An Introduction to Bioinformatics Algorithms www.bioalgorithms.info 9th Century: Knight Tours Discovered An Introduction to Bioinformatics Algorithms www.bioalgorithms.info 18th Century: N x N Knight Tour Problem • 1759: Berlin Academy of Sciences proposes a 4000 francs prize for the solution of the more general problem of finding a knight tour on an N x N chessboard. • 1766: The problem is solved by Leonhard Euler (pronounced “Oiler”). • The prize was never awarded since Euler was Director of Mathematics at Berlin Academy and was deemed ineligible. Leonhard Euler http://commons.wikimedia.org/wiki/File:Leonhard_Euler_by_Handmann.png An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Introduction to Graph Theory • A graph is a collection (V, E) of two sets: • V is simply a set of objects, which we call the vertices of G. -
Graph Theory Approach to the Vulnerability of Transportation Networks
algorithms Article Graph Theory Approach to the Vulnerability of Transportation Networks Sambor Guze Department of Mathematics, Gdynia Maritime University, 81-225 Gdynia, Poland; [email protected]; Tel.: +48-608-034-109 Received: 24 November 2019; Accepted: 10 December 2019; Published: 12 December 2019 Abstract: Nowadays, transport is the basis for the functioning of national, continental, and global economies. Thus, many governments recognize it as a critical element in ensuring the daily existence of societies in their countries. Those responsible for the proper operation of the transport sector must have the right tools to model, analyze, and optimize its elements. One of the most critical problems is the need to prevent bottlenecks in transport networks. Thus, the main aim of the article was to define the parameters characterizing the transportation network vulnerability and select algorithms to support their search. The parameters proposed are based on characteristics related to domination in graph theory. The domination, edge-domination concepts, and related topics, such as bondage-connected and weighted bondage-connected numbers, were applied as the tools for searching and identifying the bottlenecks in transportation networks. Furthermore, the algorithms for finding the minimal dominating set and minimal (maximal) weighted dominating sets are proposed. This way, the exemplary academic transportation network was analyzed in two cases: stationary and dynamic. Some conclusions are presented. The main one is the fact that the methods given in this article are universal and applicable to both small and large-scale networks. Moreover, the approach can support the dynamic analysis of bottlenecks in transport networks. Keywords: vulnerability; domination; edge-domination; transportation networks; bondage-connected number; weighted bondage-connected number 1. -
Graph Theory: Network Flow
University of Washington Math 336 Term Paper Graph Theory: Network Flow Author: Adviser: Elliott Brossard Dr. James Morrow 3 June 2010 Contents 1 Introduction ...................................... 2 2 Terminology ...................................... 2 3 Shortest Path Problem ............................... 3 3.1 Dijkstra’sAlgorithm .............................. 4 3.2 ExampleUsingDijkstra’sAlgorithm . ... 5 3.3 TheCorrectnessofDijkstra’sAlgorithm . ...... 7 3.3.1 Lemma(TriangleInequalityforGraphs) . .... 8 3.3.2 Lemma(Upper-BoundProperty) . 8 3.3.3 Lemma................................... 8 3.3.4 Lemma................................... 9 3.3.5 Lemma(ConvergenceProperty) . 9 3.3.6 Theorem (Correctness of Dijkstra’s Algorithm) . ....... 9 4 Maximum Flow Problem .............................. 10 4.1 Terminology.................................... 10 4.2 StatementoftheMaximumFlowProblem . ... 12 4.3 Ford-FulkersonAlgorithm . .. 12 4.4 Example Using the Ford-Fulkerson Algorithm . ..... 13 4.5 The Correctness of the Ford-Fulkerson Algorithm . ........ 16 4.5.1 Lemma................................... 16 4.5.2 Lemma................................... 16 4.5.3 Lemma................................... 17 4.5.4 Lemma................................... 18 4.5.5 Lemma................................... 18 4.5.6 Lemma................................... 18 4.5.7 Theorem(Max-FlowMin-CutTheorem) . 18 5 Conclusion ....................................... 19 1 1 Introduction An important study in the field of computer science is the analysis of networks. Internet service providers (ISPs), cell-phone companies, search engines, e-commerce sites, and a va- riety of other businesses receive, process, store, and transmit gigabytes, terabytes, or even petabytes of data each day. When a user initiates a connection to one of these services, he sends data across a wired or wireless network to a router, modem, server, cell tower, or perhaps some other device that in turn forwards the information to another router, modem, etc. and so forth until it reaches its destination. -
Combinatorics and Graph Theory I (Math 688)
Combinatorics and Graph Theory I (Math 688). Problems and Solutions. May 17, 2006 PREFACE Most of the problems in this document are the problems suggested as home- work in a graduate course Combinatorics and Graph Theory I (Math 688) taught by me at the University of Delaware in Fall, 2000. Later I added several more problems and solutions. Most of the solutions were prepared by me, but some are based on the ones given by students from the class, and from subsequent classes. I tried to acknowledge all those, and I apologize in advance if I missed someone. The course focused on Enumeration and Matching Theory. Many problems related to enumeration are taken from a 1984-85 course given by Herbert S. Wilf at the University of Pennsylvania. I would like to thank all students who took the course. Their friendly criti- cism and questions motivated some of the problems. I am especially thankful to Frank Fiedler and David Kravitz. To Frank – for sharing with me LaTeX files of his solutions and allowing me to use them. I did it several times. To David – for the technical help with the preparation of this version. Hopefully all solutions included in this document are correct, but the whole set is by no means polished. I will appreciate all comments. Please send them to [email protected]. – Felix Lazebnik 1 Problem 1. In how many 4–digit numbers abcd (a, b, c, d are the digits, a 6= 0) (i) a < b < c < d? (ii) a > b > c > d? Solution. (i) Notice that there exists a bijection between the set of our numbers and the set of all 4–subsets of the set {1, 2,..., 9}.