On the Decomposition of a 3-Connected Graph into Cyclically 4-Edge-Connected Components

2018 ◽  
Vol 232 (1) ◽  
pp. 61-83
Author(s):  
A. V. Pastor
1974 ◽  
Vol 26 (5) ◽  
pp. 1025-1035 ◽  
Author(s):  
Joseph Zaks

The maximum genus γM(G) of a connected graph G has been defined in [2] as the maximum g for which there exists an embedding h : G —> S(g), where S(g) is a compact orientable 2-manifold of genus g, such that each one of the connected components of S(g) — h(G) is homeomorphic to an open disk; such an embedding is called cellular. If G is cellularly embedded in S(g), having V vertices, E edges and F faces, then by Euler's formulaV-E + F = 2-2g.


Author(s):  
Bea Adam-Day ◽  
Peter J. Cameron

AbstractIt is known that, if we take a countable model of Zermelo–Fraenkel set theory ZFC and “undirect” the membership relation (that is, make a graph by joining x to y if either $$x\in y$$ x ∈ y or $$y\in x$$ y ∈ x ), we obtain the Erdős–Rényi random graph. The crucial axiom in the proof of this is the Axiom of Foundation; so it is natural to wonder what happens if we delete this axiom, or replace it by an alternative (such as Aczel’s Anti-Foundation Axiom). The resulting graph may fail to be simple; it may have loops (if $$x\in x$$ x ∈ x for some x) or multiple edges (if $$x\in y$$ x ∈ y and $$y\in x$$ y ∈ x for some distinct x, y). We show that, in ZFA, if we keep the loops and ignore the multiple edges, we obtain the “random loopy graph” (which is $$\aleph _0$$ ℵ 0 -categorical and homogeneous), but if we keep multiple edges, the resulting graph is not $$\aleph _0$$ ℵ 0 -categorical, but has infinitely many 1-types. Moreover, if we keep only loops and double edges and discard single edges, the resulting graph contains countably many connected components isomorphic to any given finite connected graph with loops.


2017 ◽  
Vol 28 (04) ◽  
pp. 335-355
Author(s):  
Goksen Bacak-Turan ◽  
Ekrem Oz

A vulnerability parameter the neighbor rupture degree can be used to obtain the vulnerability of a spy network. The neighbor rupture degree of a noncomplete connected graph [Formula: see text] is defined to be [Formula: see text] where [Formula: see text] is any vertex subversion strategy of [Formula: see text], [Formula: see text] is the number of connected components in [Formula: see text], and [Formula: see text] is the maximum order of the components of [Formula: see text]. In this study, the neighbor rupture degree of transformation graphs [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text] of path graphs, cycle graphs, wheel graphs, complete graphs and complete bipartite graphs are obtained.


2006 ◽  
Vol 15 (06) ◽  
pp. 681-693 ◽  
Author(s):  
LOWELL ABRAMS ◽  
DANIEL C. SLILATY

Given a finite connected graph G and specifications for a closed, connected pseudosurface, we characterize when G can be imbedded in a closed, connected pseudosurface with the given specifications. The specifications for the pseudosurface are: the number of face-connected components, the number of pinches, the number of crosscaps and handles, and the dimension of the first ℤ2 homology group. The characterizations are formulated in terms of the existence of a dual graph G* on the same set of edges as G which satisfies algebraic conditions inspired by homology groups and their intersection products.


2016 ◽  
Vol 27 (06) ◽  
pp. 739-756
Author(s):  
Ferhan Nihan Altundag ◽  
Goksen Bacak-Turan

The vulnerability shows the endurance of the network until the communication collapse after the breakdown of certain stations or communication links. If a spy or a station is invaded in a spy network, then the adjacent stations are treacherous. A vulnerability parameter the neighbor rupture degree can be used to obtain the vulnerability of a spy network. The neighbor rupture degree of a noncomplete connected graph G is defined to be [Formula: see text] where S is any vertex subversion strategy of G, w(G/S) is the number of connected components in G/S, and c(G/S) is the maximum order of the components of G/S. In this paper, the neighbor rupture degree of Harary graphs are obtained.


BIBECHANA ◽  
2014 ◽  
Vol 11 ◽  
pp. 157-160
Author(s):  
RN Yadav

For any base of the root lattice (An) we can construct a signed graph. A signed graph is one whose edges are signed by +1 or -1. A signed graph is balanced if and only if its vertex set can be divided into two sets-either of which may be empty–so that each edge between the sets is negative and each edge within a set is positive. For a given signed graph Tsaranov, Siedel and Cameron constructed the corresponding root lattice. In the present work we have dealt with signed graphs corresponding to the root lattice An. A connected graph is called a Fushimi tree if its all blocks are complete subgraphs. A Fushimi tree is said to be simple when by deleting any cut vertex we have always two connected components. A signed Fushimi tree is called a Fushimi tree with standard sign if it can be transformed into a signed Fushimi tree whose all edges are signed by +1 by switching. Here we have proved that any signed graph corresponding to An is a simple Fushimi tree with standard sign. Our main result is that s simple Fushimi tree with standard sign is contained in the cluster given by a line. DOI: http://dx.doi.org/10.3126/bibechana.v11i0.10396 BIBECHANA 11(1) (2014) 157-160


10.37236/8930 ◽  
2020 ◽  
Vol 27 (1) ◽  
Author(s):  
Samantha Dahlberg ◽  
Adrian She ◽  
Stephanie Van Willigenburg

We prove that the chromatic symmetric function of any $n$-vertex tree containing a vertex of degree $d\geqslant \log _2n +1$ is not $e$-positive, that is, not a positive linear combination of elementary symmetric functions. Generalizing this, we also prove that the chromatic symmetric function of any $n$-vertex connected graph containing a cut vertex whose deletion disconnects the graph into $d\geqslant\log _2n +1$ connected components is not $e$-positive. Furthermore we prove that any $n$-vertex bipartite graph, including all trees, containing a vertex of degree greater than $\lceil \frac{n}{2}\rceil$ is not Schur-positive, namely not a positive linear combination of Schur functions. In complete generality, we prove that if an $n$-vertex connected graph has no perfect matching (if $n$ is even) or no almost perfect matching (if $n$ is odd), then it is not $e$-positive. We hence deduce that many graphs containing the claw are not $e$-positive.


1965 ◽  
Vol 17 ◽  
pp. 731-733 ◽  
Author(s):  
C. Ramanujacharyulu

As is well known in the theory of graphs a tree is a connected graph without cycles. Many characterizing properties of trees are known (1), for example the cyclomatic number is equal to zero, which is also equal to p — 1, where p is the number of connected components of the graph. The graphs with cyclomatic number equal to p — 1 are defined here as tree-equivalent graphs. A tree is always a tree-equivalent graph but not conversely. The properties of tree-equivalent graphs are studied here.


The movement along the glide path of an unmanned aerial vehicle during landing on an aircraft carrier is investigated. The implementation of this task is realized in the conditions of radio silence of the aircraft carrier. The algorithm for treatment information from an optical landing system installed on an aircraft carrier is developed. The algorithm of the color signal recognition assumes the usage of the image frame preliminary treatment method via a downsample function, that performs the decimation process, the HSV model, the Otsu’s method for calculating the binarization threshold for a halftone image, and the method of separating the connected Two-Pass components. Keywords unmanned aerial vehicle; aircraft carrier; approach; glide path; optical landing system; color signal recognition algorithm; decimation; connected components; halftone image binarization


Sign in / Sign up

Export Citation Format

Share Document