An Introduction to Mathematical Methods in Combinatorics

Total Page:16

File Type:pdf, Size:1020Kb

An Introduction to Mathematical Methods in Combinatorics An Introduction to Mathematical Methods in Combinatorics Renzo Sprugnoli Dipartimento di Sistemi e Informatica Viale Morgagni, 65 - Firenze (Italy) January 18, 2006 2 Contents 1 Introduction 5 1.1 What is the Analysis of an Algorithm . ......... 5 1.2 The Analysis of Sequential Searching . ...... 6 1.3 Binary Searching . ..... 6 1.4 ClosedForms ...................................... ....... 7 1.5 TheLandaunotation................................... ...... 9 2 Special numbers 11 2.1 Mappings and powers . 11 2.2 Permutations ....................................... ...... 12 2.3 The group structure . ..... 13 2.4 Counting permutations . ....... 14 2.5 Dispositions and Combinations . ......... 15 2.6 ThePascaltriangle.................................. ........ 16 2.7 Harmonicnumbers .................................... ...... 17 2.8 Fibonacci numbers . ..... 18 2.9 Walks, trees and Catalan numbers . ........ 19 2.10 Stirling numbers of the first kind . ........ 21 2.11 Stirling numbers of the second kind . ....... 22 2.12 Bell and Bernoulli numbers . ...... 23 3 Formal power series 25 3.1 Definitions for formal power series . ........ 25 3.2 The basic algebraic structure . ....... 26 3.3 Formal Laurent Series . ...... 27 3.4 Operations on formal power series . ........ 27 3.5 Composition ..................................... ........ 29 3.6 Coefficient extraction . ...... 29 3.7 Matrixrepresentation ................................ ........ 31 3.8 Lagrange inversion theorem . ........ 32 3.9 Some examples of the LIF . ..... 33 3.10 Formal power series and the computer . ...... 34 3.11 The internal representation of expressions . ......... 35 3.12 Basic operations of formal power series . ............. 36 3.13 Logarithm and exponential . ........ 37 4 Generating Functions 39 4.1 General Rules . 39 4.2 Some Theorems on Generating Functions . 40 4.3 More advanced results . ..... 41 4.4 Common Generating Functions . 42 4.5 The Method of Shifting . 44 4.6 Diagonalization................................... ......... 45 4.7 Some special generating functions . ..... 46 3 4 CONTENTS 4.8 Linear recurrences with constant coefficients . 47 4.9 Linear recurrences with polynomial coefficients . 49 4.10 The summing factor method . ...... 49 4.11 The internal path length of binary trees . ....... 51 4.12 Height balanced binary trees . ..... 52 4.13 Some special recurrences . 53 5 Riordan Arrays 55 5.1 Definitions and basic concepts . 55 5.2 The algebraic structure of Riordan arrays . .......... 56 5.3 The A-sequence for proper Riordan arrays . ...... 57 5.4 Simple binomial coefficients . 59 5.5 Other Riordan arrays from binomial coefficients . ....... 60 5.6 Binomial coefficients and the LIF . ..... 61 5.7 Colouredwalks ..................................... ....... 62 5.8 Stirling numbers and Riordan arrays . ......... 64 5.9 Identities involving the Stirling numbers . .......... 65 6 Formal methods 67 6.1 Formallanguages.................................... ....... 67 6.2 Context-free languages . ....... 68 6.3 Formal languages and programming languages . ....... 69 6.4 Thesymbolicmethod .................................. ...... 70 6.5 Thebivariatecase ................................... ....... 71 6.6 The Shift Operator . ..... 72 6.7 The Difference Operator . 73 6.8 Shift and Difference Operators - Example I . 74 6.9 Shift and Difference Operators - Example II . ..... 76 6.10 The Addition Operator . ...... 77 6.11 Definite and Indefinite summation . 78 6.12 Definite Summation . ..... 79 6.13 The Euler-McLaurin Summation Formula . ...... 80 6.14 Applications of the Euler-McLaurin Formula . ....... 81 7 Asymptotics 83 7.1 The convergence of power series . ..... 83 7.2 ThemethodofDarboux .................................. ..... 84 7.3 Singularities: poles . ........ 85 7.4 Polesandasymptotics ................................. ....... 86 7.5 Algebraic and logarithmic singularities . ............ 87 7.6 Subtracted singularities . ...... 88 7.7 The asymptotic behavior of a trinomial square root . ............. 89 7.8 Hayman’smethod ..................................... ..... 89 7.9 Examples of Hayman’s Theorem . ..... 91 8 Bibliography 93 Chapter 1 Introduction 1.1 What is the Analysis of an ever, as a matter of fact, the nature of S is not essen- Algorithm tial, because we always deal with a suitable binary representation of the elements in S on a computer, and have therefore to be considered as “words” in An algorithm is a finite sequence of unambiguous the computer memory. The “problem of searching” rules for solving a problem. Once the algorithm is is as follows: we are given a finite ordered subset started with a particular input, it will always end, T = (a1, a2,...,an) of S (usually called a table, its obtaining the correct answer or output, which is the elements referred to as keys), an element s S and solution to the given problem. An algorithm is real- we wish to know whether s T or s T , and∈ in the ized on a computer by means of a program, i.e., a set ∈ 6∈ former case which element ak in T it is. of instructions which cause the computer to perform Although the mathematical problem “s T or the elaborations intended by the algorithm. not” has almost no relevance, the searching∈ prob- So, an algorithm is independent of any computer, lem is basic in computer science and many algorithms and, in fact, the word was used for a long time before have been devised to make the process of searching computers were invented. Leonardo Fibonacci called as fast as possible. Surely, the most straight-forward “algorisms” the rules for performing the four basic algorithm is sequential searching: we begin by com- operations (addition, subtraction, multiplication and paring s and a1 and we are finished if they are equal. division) with the newly introduced arabic digits and Otherwise, we compare s and a2, and so on, until we the positional notation for numbers. “Euclid’s algo- find an element ak = s or reach the end of T . In rithm” for evaluating the greatest common divisor of the former case the search is successful and we have two integer numbers was also well known before the determined the element in T equal to s. In the latter appearance of computers. case we are convinced that s T and the search is Many algorithms can exist which solve the same unsuccessful. 6∈ problem. Some can be very skillful, others can be The analysis of this (simple) algorithm consists in very simple and straight-forward. A natural prob- finding one or more mathematical expressions de- lem, in these cases, is to choose, if any, the best al- scribing in some way the number of operations per- gorithm, in order to realize it as a program on a par- formed by the algorithm as a function of the number ticular computer. Simple algorithms are more easily n of the elements in T . This definition is intentionally programmed, but they can be very slow or require vague and the following points should be noted: large amounts of computer memory. The problem an algorithm can present several aspects and is therefore to have some means to judge the speed • therefore may require several mathematical ex- and the quantity of computer resources a given algo- pressions to be fully understood. For example, rithm uses. The aim of the “Analysis of Algorithms” for what concerns the sequential search algo- is just to give the mathematical bases for describing rithm, we are interested in what happens during the behavior of algorithms, thus obtaining exact cri- a successful or unsuccessful search. Besides, for teria to compare different algorithms performing the a successful search, we wish to know what the same task, or to see if an algorithm is sufficiently good worst case is (Worst Case Analysis) and what to be efficiently implemented on a computer. the average case is (Average Case Analysis) with Let us consider, as a simple example, the problem respect to all the tables containing n elements or, of searching. Let S be a given set. In practical cases for a fixed table, with respect to the n elements S is the set N of natural numbers, or the set Z of it contains; integer numbers, or the set R of real numbers or also the set A∗ of the words on some alphabet A. How- the operations performed by an algorithm can be • 5 6 CHAPTER 1. INTRODUCTION of many different kinds. In the example above technical point for the analyst. A large part of our the only operations involved in the algorithm are efforts will be dedicated to this topic. comparisons, so no doubt is possible. In other Let us now consider an unsuccessful search, for algorithms we can have arithmetic or logical op- which we only have an Average Case analysis. If Uk erations. Sometimes we can also consider more denotes the number of comparisons necessary for a complex operations as square roots, list concate- table with k elements, we can determine Un in the nation or reversal of words. Operations depend following way. We compare s with the first element on the nature of the algorithm, and we can de- a in T and obviously we find s = a , so we should 1 6 1 cide to consider as an “operation” also very com- go on with the table T ′ = T a1 , which contains plicated manipulations (e.g., extracting a ran- n 1 elements. Consequently,\ we { have:} dom number or performing the differentiation of − a polynomial of a given degree). The important Un = 1 + Un 1 − point is that every instance of the “operation” takes on about the same time or has the same This is a recurrence relation, that is an expression complexity. If this is not the case, we can give relating the value of Un with other values of Uk having different weights to different operations or to dif- k < n. It is clear that if some value, e.g., U0 or U1 ferent instances of the same operation. is known, then it is possible to find the value of Un, for every n N. In our case, U0 is the number of We observe explicitly that we never consider exe- comparisons∈ necessary to find out that an element cution time as a possible parameter for the behavior s does not belong to a table containing no element.
Recommended publications
  • Labeled Factorization of Integers
    Labeled Factorization of Integers Augustine O. Munagi John Knopfmacher Centre for Applicable Analysis and Number Theory School of Mathematics, University of the Witwatersrand Wits 2050, Johannesburg, South Africa [email protected] Submitted: Jan 5, 2009; Accepted: Apr 16, 2009; Published: Apr 22, 2009 Mathematics Subject Classification: 11Y05, 05A05, 11B73, 11B13 Abstract The labeled factorizations of a positive integer n are obtained as a completion of the set of ordered factorizations of n. This follows a new technique for generating ordered factorizations found by extending a method for unordered factorizations that relies on partitioning the multiset of prime factors of n. Our results include explicit enumeration formulas and some combinatorial identities. It is proved that labeled factorizations of n are equinumerous with the systems of complementing subsets of {0, 1,...,n − 1}. We also give a new combinatorial interpretation of a class of generalized Stirling numbers. 1 Ordered and labeled factorization An ordered factorization of a positive integer n is a representation of n as an ordered product of integers, each factor greater than 1. The set of ordered factorizations of n will be denoted by F (n), and |F (n)| = f(n). For example, F (6) = {6, 2.3, 3.2}. So f(6) = 3. Every integer n> 1 has a canonical factorization into prime numbers p1,p2,..., namely m1 m2 mr n = p1 p2 ...pr , p1 <p2 < ··· <pr, mi > 0, 1 ≤ i ≤ r. (1) The enumeration function f(n) does not depend on the size of n but on the exponents mi. In particular we define Ω(n)= m1 + m2 + ··· + mr, Ω(1) = 0.
    [Show full text]
  • A Subspace Theorem for Manifolds
    A subspace theorem for manifolds Emmanuel Breuillard and Nicolas de Saxcé February 5, 2021 Abstract We prove a theorem that generalizes Schmidt’s Subspace Theorem in the context of metric diophantine approximation. To do so we reformulate the Subspace theorem in the framework of homogeneous dynamics by introducing and studying a slope formalism and the corresponding notion of semistability for diagonal flows. Introduction In 1972, Wolfgang Schmidt formulated his celebrated subspace theorem [32, Lemma 7], a far reaching generalization of results of Thue [37], Siegel [35], and Roth [28] on rational approximations to algebraic numbers. Around the same time, in his work on arithmeticity of lattices in Lie groups, Gregory Margulis [26] used the geometry of numbers to establish the recurrence of unipotent flows on the space of lattices GLd(R)=GLd(Z). More than two decades later, a quantita- tive refinement of this fact, the so-called quantitative non-divergence estimate, was used by Kleinbock and Margulis [18] in their solution to the Sprindzuk conjecture regarding the extremality of non-degenerate manifolds in metric dio- phantine approximation. As it turns out, these two remarkable results – the subspace theorem and the Sprindzuk conjecture – are closely related and can be understood together as statements about diagonal orbits in the space of lat- tices. In this paper we prove a theorem that generalizes both results at the same time. We also provide several applications. This marriage is possible thanks to a better understanding of the geometry lying behind the subspace theorem, in particular the notion of Harder-Narasimhan filtration for one-parameter di- agonal actions, which leads both to a dynamical reformulation of the original subspace theorem and to a further geometric understanding of the family of exceptional subspaces arising in Schmidt’s theorem.
    [Show full text]
  • Enciclopedia Matematica a Claselor De Numere Întregi
    THE MATH ENCYCLOPEDIA OF SMARANDACHE TYPE NOTIONS vol. I. NUMBER THEORY Marius Coman INTRODUCTION About the works of Florentin Smarandache have been written a lot of books (he himself wrote dozens of books and articles regarding math, physics, literature, philosophy). Being a globally recognized personality in both mathematics (there are countless functions and concepts that bear his name), it is natural that the volume of writings about his research is huge. What we try to do with this encyclopedia is to gather together as much as we can both from Smarandache’s mathematical work and the works of many mathematicians around the world inspired by the Smarandache notions. Because this is too vast to be covered in one book, we divide encyclopedia in more volumes. In this first volume of encyclopedia we try to synthesize his work in the field of number theory, one of the great Smarandache’s passions, a surfer on the ocean of numbers, to paraphrase the title of the book Surfing on the ocean of numbers – a few Smarandache notions and similar topics, by Henry Ibstedt. We quote from the introduction to the Smarandache’work “On new functions in number theory”, Moldova State University, Kishinev, 1999: “The performances in current mathematics, as the future discoveries, have, of course, their beginning in the oldest and the closest of philosophy branch of nathematics, the number theory. Mathematicians of all times have been, they still are, and they will be drawn to the beaty and variety of specific problems of this branch of mathematics. Queen of mathematics, which is the queen of sciences, as Gauss said, the number theory is shining with its light and attractions, fascinating and facilitating for us the knowledge of the laws that govern the macrocosm and the microcosm”.
    [Show full text]
  • Tropical Moduli Space of Rational Graphically Stable Curves 3
    TROPICAL MODULI SPACE OF RATIONAL GRAPHICALLY STABLE CURVES ANDY FRY Abstract. We study moduli spaces of rational graphically stable tropical curves and a refinement given by radial alignment. Given a complete multipartite graph Γ, the moduli space of radially aligned Γ-stable tropical curves can be given the structure of a balanced fan. This fan structure coincides with the Bergman fan of the cycle matroid of Γ. 1. Introduction trop The moduli space M0,n is a cone complex which parameterizes leaf-labelled metric trees. Its structure is obtained by gluing positive orthants of Rn−3 corresponding to trivalent trees. Speyer and Sturmfels [14] give an embedding of this cone complex (in the context of phy- logenetic trees) into a real vector space as a balanced fan where each top-dimensional cone is assigned weight 1. In [1], Ardila and Klivans study phylogenetic trees and show that the trop fan structure of M0,n has a refinement which coincides with the Bergman fan of the cycle matroid of Kn−1, the complete graph on n − 1 vertices. As a generalization of Ardila and Klivans, it is shown by Cavalieri, Hampe, Markwig, and Ranganathan in [3] that the fan trop associated to the moduli space of rational heavy/light weighted stable tropical curves, M0,w , and the Bergman fan of a graphic matroid have the same support. The main result of this paper further generalizes their result by starting with stability conditions defined by a graph (reduced weight graph) rather than a weight vector. We trop introduce tropical rational graphically stable curves (Definition 3.12) and write M0,Γ as the moduli space of these curves.
    [Show full text]
  • Partial Metrics, Quasi-Metrics and Oriented Hypercubes
    General Weightable l1 Cones Hypercube Hamiltonian Sink References Partial Metrics, Quasi-metrics and Oriented Hypercubes Michel Deza Ecole Normale Superieure, Paris, and JAIST, Ishikawa General Weightable l1 Cones Hypercube Hamiltonian Sink References Overview 1 General quasi-semi-metrics 2 Weightable q-s-metrics and equivalent notions 3 l1 Quasi-metrics 4 The cones under consideration 5 Path quasi-metrics of oriented hypercubes 6 Hamiltonian orientations of hypercubes 7 Unique-sink orientations of hypercubes 8 References A weak quasi-metric is a quasi-semi-metric q with weak symmetry: q(x, y) = q(y, x) whenever q(y, x) = 0. An Albert quasi-metric is a quasi-semi-metric q with weak definiteness: x = y whenever q(x, y) = q(y, x) = 0. General Weightable l1 Cones Hypercube Hamiltonian Sink References Quasi-semi-metrics Given a set X , a function q : X × X → R≥0 with q(x, x)=0 is a quasi-distance (or, in Topology, prametric) on X . A quasi-distance q is a quasi-semi-metric if for x, y, z ∈ X it holds (oriented triangle inequality) q(x, y) ≤ q(x, z) + q(z, y) . q0 given by q0(x, y)=q(y, x) is dual quasi-semi-metric to q. (X , q) can be partially ordered by the specialization order: x y if and only if q(x, y)=0. Discrete quasi-metric on poset (X , ≤) is q≤(x, y)=0 if x y and =1 else; for (X , q≤), order coincides with ≤. General Weightable l1 Cones Hypercube Hamiltonian Sink References Quasi-semi-metrics Given a set X , a function q : X × X → R≥0 with q(x, x)=0 is a quasi-distance (or, in Topology, prametric) on X .
    [Show full text]
  • The Deranged Bell Numbers 2
    THE DERANGED BELL NUMBERS BELBACHIR HACENE,` DJEMMADA YAHIA, AND NEMETH´ LASZL` O` Abstract. It is known that the ordered Bell numbers count all the ordered partitions of the set [n] = {1, 2,...,n}. In this paper, we introduce the de- ranged Bell numbers that count the total number of deranged partitions of [n]. We first study the classical properties of these numbers (generating function, explicit formula, convolutions, etc.), we then present an asymptotic behavior of the deranged Bell numbers. Finally, we give some brief results for their r-versions. 1. Introduction A permutation σ of a finite set [n] := {1, 2,...,n} is a rearrangement (linear ordering) of the elements of [n], and we denote it by σ([n]) = σ(1)σ(2) ··· σ(n). A derangement is a permutation σ of [n] that verifies σ(i) 6= i for all (1 ≤ i ≤ n) (fixed-point-free permutation). The derangement number dn denotes the number of all derangements of the set [n]. A simple combinatorial approach yields the two recursions for dn (see for instance [13]) dn = (n − 1)(dn−1 + dn−2) (n ≥ 2) and n dn = ndn−1 + (−1) (n ≥ 1), with the first values d0 = 1 and d1 = 0. The derangement number satisfies the explicit expression (see [3]) n (−1)i d = n! . n i! i=0 X The generating function of the sequence dn is given by tn e−t D(t)= dn = . arXiv:2102.00139v1 [math.GM] 30 Jan 2021 n! 1 − t n≥ X0 The first few values of dn are (dn)n≥0 = {1, 0, 1, 2, 9, 44, 265, 1854, 14833, 133496, 1334961,...}.
    [Show full text]
  • Hierarchical Structures and Leadership Design in Mean-Field-Type Games with Polynomial Cost
    games Article Hierarchical Structures and Leadership Design in Mean-Field-Type Games with Polynomial Cost Zahrate El Oula Frihi 1 , Julian Barreiro-Gomez 2,3,*, Salah Eddine Choutri 2,3 and Hamidou Tembine 2,3 1 Lab. of Probability and Statistics (LaPS), Department of Mathematics, Badji-Mokhtar University, B.P.12, Annaba 23000, Algeria; [email protected] 2 Learning & Game Theory Laboratory, Engineering Division, New York University Abu Dhabi, Saadiyat Campus, PO Box 129188, Abu Dhabi 44966, UAE; [email protected] (S.E.C.); [email protected] (H.T.) 3 Research Center on Stability, Instability and Turbulence, New York University Abu Dhabi, Abu Dhabi 44966, UAE * Correspondence: [email protected] Received: 8 June 2020; Accepted: 30 July 2020; Published: 6 August 2020 Abstract: This article presents a class of hierarchical mean-field-type games with multiple layers and non-quadratic polynomial costs. The decision-makers act in sequential order with informational differences. We first examine the single-layer case where each decision-maker does not have the information about the other control strategies. We derive the Nash mean-field-type equilibrium and cost in a linear state-and-mean-field feedback form by using a partial integro-differential system. Then, we examine the Stackelberg two-layer problem with multiple leaders and multiple followers. Numerical illustrations show that, in the symmetric case, having only one leader is not necessarily optimal for the total sum cost. Having too many leaders may also be suboptimal for the total sum cost. The methodology is extended to multi-level hierarchical systems. It is shown that the order of the play plays a key role in the total performance of the system.
    [Show full text]
  • Grained Integers and Applications to Cryptography
    poses. These works may not bemission posted of elsewhere the without copyright the holder. explicit (Last written update per- 2017/11/29-18 :20.) . Grained integers and applications to cryptography Rheinischen Friedrich-Willhelms-Universität Bonn Mathematisch-Naturwissenschaftlichen Fakultät ing any of theseeach documents will copyright adhere holder, to and the in terms particular and use constraints them invoked only by for noncommercial pur- Erlangung des Doktorgrades (Dr. rer. nat.) . Dissertation, Mathematisch-Naturwissenschaftliche Fakultät der Rheinischen Daniel Loebenberger Bonn, Januar 2012 Dissertation vorgelegt von Nürnberg aus der der zur are maintained by the authors orthese by works other are copyright posted holders, here notwithstanding electronically. that It is understood that all persons copy- http://hss.ulb.uni-bonn.de/2012/2848/2848.htm Grained integers and applications to cryptography (2012). OEBENBERGER L ANIEL D Friedrich-Wilhelms-Universität Bonn. URL This document is provided as aand means to technical ensure work timely dissemination on of a scholarly non-commercial basis. Copyright and all rights therein Angefertigt mit Genehmigung der Mathematisch-Naturwissenschaftlichen Fakultät der Rheinischen Friedrich-Wilhelms-Universität Bonn 1. Gutachter: Prof. Dr. Joachim von zur Gathen 2. Gutachter: Prof. Dr. Andreas Stein Tag der Promotion: 16.05.2012 Erscheinungsjahr: 2012 iii Οἱ πρῶτοι ἀριθμοὶ πλείους εἰσὶ παντὸς τοῦ προτένθος πλήθους πρώτων ἀριθμῶν.1 (Euclid) Problema, numeros primos a compositis dignoscendi, hosque in factores suos primos resolvendi, ad gravissima ac ultissima totius arithmeticae pertinere [...] tam notum est, ut de hac re copiose loqui superfluum foret. [...] Praetereaque scientiae dignitas requirere videtur, ut omnia subsidia ad solutionem problematis tam elegantis ac celibris sedulo excolantur.2 (C.
    [Show full text]
  • The Geometric Structure of Max-Plus Hemispaces
    The Geometric Structure of Max-Plus Hemispaces Daniel Ehrmanna, Zach Higginsb, Viorel Niticac aDepartment of Mathematics, University of Tampa, 401 West Kennedy Blvd., Campus Box 2928, Tampa, FL 33606 bDepartment of Mathematics, University of Florida, 358 Little Hall, PO Box 118105, Gainesville, FL 32611 cDepartment of Mathematics, West Chester University, PA 19383, USA, and Institute of Mathematics, P.O. Box 1-764, Bucharest, Romania Abstract Given a set S endowed with a convexity structure, a hemispace is a convex subset Rn of S which has convex complement. We recall that max is a semimodule over the max-plus semifield (Rmax := R ∪ {−∞}, max, +). A convexity structure of Rn current interest is provided by max naturally endowed with the max-plus (or tropical) convexity. In this paper we provide a geometric description of a max- Rn plus hemispace in max. We show that a max-plus hemispace has a conical decomposition as a finite union of disjoint max-plus cones. These cones can be interpreted as faces of several max-plus hyperplanes. Briec-Horvath proved that the closure of a max-plus hemispace is bounded by a max-plus hyperplane. Given a hyperplane, we give a simple condition for the assignment of the faces between a pair of complementary max-plus hemispaces. Our result allows for counting and enumeration of the associated max-plus hemispaces. We recall that an n-dimensional max-plus hyperplane is called strictly affine and nondegenerate if it has a linear equation that contains all variables x1, x2,...,xn and a free Rn term. We prove that the number of max-plus hemispaces in max, supported by strictly affine nondegenerate hyperplanes centered in the origin, is twice the n-th ordered Bell number.
    [Show full text]
  • Numbers 1 to 100
    Numbers 1 to 100 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 30 Nov 2010 02:36:24 UTC Contents Articles −1 (number) 1 0 (number) 3 1 (number) 12 2 (number) 17 3 (number) 23 4 (number) 32 5 (number) 42 6 (number) 50 7 (number) 58 8 (number) 73 9 (number) 77 10 (number) 82 11 (number) 88 12 (number) 94 13 (number) 102 14 (number) 107 15 (number) 111 16 (number) 114 17 (number) 118 18 (number) 124 19 (number) 127 20 (number) 132 21 (number) 136 22 (number) 140 23 (number) 144 24 (number) 148 25 (number) 152 26 (number) 155 27 (number) 158 28 (number) 162 29 (number) 165 30 (number) 168 31 (number) 172 32 (number) 175 33 (number) 179 34 (number) 182 35 (number) 185 36 (number) 188 37 (number) 191 38 (number) 193 39 (number) 196 40 (number) 199 41 (number) 204 42 (number) 207 43 (number) 214 44 (number) 217 45 (number) 220 46 (number) 222 47 (number) 225 48 (number) 229 49 (number) 232 50 (number) 235 51 (number) 238 52 (number) 241 53 (number) 243 54 (number) 246 55 (number) 248 56 (number) 251 57 (number) 255 58 (number) 258 59 (number) 260 60 (number) 263 61 (number) 267 62 (number) 270 63 (number) 272 64 (number) 274 66 (number) 277 67 (number) 280 68 (number) 282 69 (number) 284 70 (number) 286 71 (number) 289 72 (number) 292 73 (number) 296 74 (number) 298 75 (number) 301 77 (number) 302 78 (number) 305 79 (number) 307 80 (number) 309 81 (number) 311 82 (number) 313 83 (number) 315 84 (number) 318 85 (number) 320 86 (number) 323 87 (number) 326 88 (number)
    [Show full text]
  • Arxiv:1712.08520V3 [Math.CO] 1 Feb 2018 Tions to Physics, in Particular to the Study of Scattering Amplitudes in Quantum field Theory and String Theory
    CANONICAL BASES FOR PERMUTOHEDRAL PLATES NICK EARLY Abstract. We study three finite-dimensional quotient vector spaces constructed from the linear span of the set of characteristic functions of permutohedral cones by imposing two kinds of constraints: (1) neglect characteristic functions of higher codimension permutohedral cones, and (2) neglect characteristic functions of non-pointed permutohedral cones. We construct an ordered basis which is canonical, in the sense that it has subsets which map onto ordered bases for the quotients. We present straightening relations to the canonical basis, and using Laplace transforms we obtain functional representations for each quotient space. Contents 1. Introduction1 2. Landscape: basic properties of cones and plates2 2.1. Notation and conventions4 2.2. Genericity8 3. Plate homology: from plates to their faces8 4. Constructing the canonical plate basis 13 5. Plates and trees 18 6. Straightening plates to the canonical basis 20 7. Acknowledgements 24 Appendix A. Functional representations 25 A.1. Laplace transforms 25 A.2. Examples: Laplace transforms of permutohedral cones for tree graphs 26 References 32 1. Introduction The purpose of this paper is two-fold: it contains general combinatorial and geometric results about generalized permutohedra, but from our perspective it is motivated by surprising connec- arXiv:1712.08520v3 [math.CO] 1 Feb 2018 tions to physics, in particular to the study of scattering amplitudes in quantum field theory and string theory. This paper is devoted to the combinatorial analysis of the vector space of characteristic func- tions of permutohedral cones, studied as plates by A. Ocneanu as communicated privately [17], and by the author in [9, 10].
    [Show full text]
  • A New Class of Hermite-Fubini Polynomials and Its Properties
    Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 30 April 2019 doi:10.20944/preprints201904.0333.v1 A new class of Hermite-Fubini polynomials and its properties Waseem A. Khan1 and Nisar K S2 1Department of Mathematics, Faculty of Science, Integral University, Lucknow-226026, (India) 2Department of Mathematics, College of Arts and Science-Wadi Al dawaser, Prince Sattam bin Abdulaziz University, Riyadh region 11991, Saudi Arabia E-mail: waseem08 khan@rediffmail.com, [email protected] Abstract. In this paper, we introduce a new class of Hermite-Fubini numbers and polynomials and investigate some properties of these polynomials. We establish sum- mation formulas of these polynomials by summation techniques series. Furthermore, we derive symmetric identities of Hermite-Fubini numbers and polynomials by using generating functions. Keywords: Hermite polynomials, Fubini numbers and polynomials, Hermite-Fubini polynomials, summation formulae, symmetric identities. 2010 Mathematics Subject Classification.: 11B68, 11B75, 11B83, 33C45, 33C99. 1. Introduction As is well known, the 2-variable Hermite Kamp´ede F´erietpolynomials (2VHKdFP) Hn(x; y) [1, 3] are defined as [ n ] X2 yrxn−2r H (x; y) = n! : (1:1) n r!(n − 2r)! r=0 It is clear that 1 H (2x; −1) = H (x; H (x; − ) = He (x);H (x; 0) = xn; n n n 2 n n where Hn(x) and Hen(x) being ordinary Hermite polynomials. The Hermite polynomial Hn(x,y) (see ([9, 10]) is defined by means of the fol- lowing generating function as follows: X1 n 2 t ext+yt = H (x; y) : (1:2) n n! n=0 Geometric polynomials (also known as Fubini polynomials) are defined as follows (see [2]): { } Xn n F (x) = k!xk; (1:3) n k { } k=0 n where is the Stirling number of the second kind (see [5]).
    [Show full text]