首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
Zero forcing and power domination are iterative processes on graphs where an initial set of vertices are observed, and additional vertices become observed based on some rules. In both cases, the goal is to eventually observe the entire graph using the fewest number of initial vertices. The concept of k-power domination was introduced by Chang et al. (2012) as a generalization of power domination and standard graph domination. Independently, k-forcing was defined by Amos et al. (2015) to generalize zero forcing. In this paper, we combine the study of k-forcing and k-power domination, providing a new approach to analyze both processes. We give a relationship between the k-forcing and the k-power domination numbers of a graph that bounds one in terms of the other. We also obtain results using the contraction of subgraphs that allow the parallel computation of k-forcing and k-power dominating sets.  相似文献   

2.
We examine the following version of a classic combinatorial search problem introduced by Rényi: Given a finite set X of n elements we want to identify an unknown subset Y of X, which is known to have exactly d elements, by means of testing, for as few as possible subsets A of X, whether A intersects Y or not. We are primarily concerned with the non-adaptive model, where the family of test sets is specified in advance, in the case where each test set is of size at most some given natural number k. Our main results are nearly tight bounds on the minimum number of tests necessary when d and k are fixed and n is large enough.  相似文献   

3.
4.
5.
6.
7.
We consider a restriction of the well-known Cage Problem to the class of vertex-transitive graphs, and consider the problem of finding the smallest vertex-transitive k-regular graphs of girth g. Counting cycles to obtain necessary arithmetic conditions on the parameters (k,g), we extend previous results of Biggs, and prove that, for any given excess e and any given degree k4, the asymptotic density of the set of girths g for which there exists a vertex-transitive (k,g)-cage with excess not exceeding e is 0.  相似文献   

8.
Using the Unified Transform, also known as the Fokas method, the solution of the sine-Gordon equation in the quarter plane can be expressed in terms of the solution of a matrix Riemann–Hilbert problem whose definition involves four spectral functions a,b,A,B. The functions a(k) and b(k) are defined via a nonlinear Fourier transform of the initial data, whereas A(k) and B(k) are defined via a nonlinear Fourier transform of the boundary values. In this paper, we provide an extensive study of these nonlinear Fourier transforms and the associated eigenfunctions under weak regularity and decay assumptions on the initial and boundary values. The results can be used to determine the long-time asymptotics of the sine-Gordon quarter-plane solution via nonlinear steepest descent techniques.  相似文献   

9.
10.
11.
In this paper we establish bifurcation theory of limit cycles for planar Ck smooth autonomous differential systems, with kN. The key point is to study the smoothness of bifurcation functions which are basic and important tool on the study of Hopf bifurcation at a fine focus or a center, and of Poincaré bifurcation in a period annulus. We especially study the smoothness of the first order Melnikov function in degenerate Hopf bifurcation at an elementary center. As we know, the smoothness problem was solved for analytic and C differential systems, but it was not tackled for finitely smooth differential systems. Here, we present their optimal regularity of these bifurcation functions and their asymptotic expressions in the finite smooth case.  相似文献   

12.
From a random sample of size n from an absolutely continuous bivariate population (X,Y) we consider two complementary (upper and lower) subsets of Y-values formed by a sorting on the basis of the corresponding X-values. We derive the finite-sample and asymptotic joint distributions of the extreme order statistics of these Y subsets assuming that the subset sizes remain proportional to n as n. We illustrate the use of our results with the bivariate normal example and provide an approximation to the probability of an event of interest in selection problems.  相似文献   

13.
14.
15.
16.
Let S and T be local rings with common residue field k, let R be the fiber product S×kT, and let M be an S-module. The Poincaré series PMR of M has been expressed in terms of PMS, PkS and PkT by Kostrikin and Shafarevich, and by Dress and Krämer. Here, an explicit minimal resolution, as well as theorems on the structure of ExtR(k,k) and ExtR(M,k) are given that illuminate these equalities. Structure theorems for the cohomology modules of fiber products of modules are also given. As an application of these results, we compute the depth of cohomology modules over a fiber product.  相似文献   

17.
The hypergraph k-cut problem is the problem of finding a minimum capacity set of hyperedges whose removal divides a given hypergraph into at least k connected components. We present an algorithm for this problem, that runs in strongly polynomial time if both k and the maximum size of the hyperedges are constants. Our algorithm extends the algorithm proposed by Thorup (2008) for computing minimum k-cuts of graphs from greedy packings of spanning trees.  相似文献   

18.
19.
We define [k]={1,2,,k} to be a (totally ordered) alphabet on k letters. A word w of length n on the alphabet [k] is an element of [k]n. A word can be represented by a bargraph (i.e., by a column-convex polyomino whose lower edges lie on the x-axis) in which the height of the ith column equals the size of the ith part of the word. Thus these bargraphs have heights which are less than or equal to k. We consider the perimeter, which is the number of edges on the boundary of the bargraph. By way of Cramer’s method and the kernel method, we obtain the generating function that counts the perimeter of words. Using these generating functions we find the average perimeter of words of length n over the alphabet [k]. We also show how the mean and variance can be obtained using a direct counting method.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号