undirected graph
Recently Published Documents


TOTAL DOCUMENTS

426
(FIVE YEARS 156)

H-INDEX

24
(FIVE YEARS 3)

Author(s):  
S. Visweswaran

The rings considered in this paper are commutative with identity which are not integral domains. Let [Formula: see text] be a ring. Let us denote the set of all annihilating ideals of [Formula: see text] by [Formula: see text] and [Formula: see text] by [Formula: see text]. With [Formula: see text], we associate an undirected graph, denoted by [Formula: see text], whose vertex set is [Formula: see text] and distinct vertices [Formula: see text] and [Formula: see text] are adjacent in this graph if and only if [Formula: see text] and [Formula: see text]. The aim of this paper is to study the interplay between the graph-theoretic properties of [Formula: see text] and the ring-theoretic properties of [Formula: see text].


2022 ◽  
Vol 7 (4) ◽  
pp. 5480-5498
Author(s):  
Piyapat Dangpat ◽  
◽  
Teerapong Suksumran ◽  

<abstract><p>The extended conjugate graph associated to a finite group $ G $ is defined as an undirected graph with vertex set $ G $ such that two distinct vertices joined by an edge if they are conjugate. In this article, we show that several properties of finite groups can be expressed in terms of properties of their extended conjugate graphs. In particular, we show that there is a strong connection between a graph-theoretic property, namely regularity, and an algebraic property, namely nilpotency. We then give some sufficient conditions and necessary conditions for the non-central part of an extended conjugate graph to be regular. Finally, we study extended conjugate graphs associated to groups of order $ pq $, $ p^3 $, and $ p^4 $, where $ p $ and $ q $ are distinct primes.</p></abstract>


Author(s):  
Sooyeong Kim

In the context of a random walk on an undirected graph, Kemeny's constant can measure the average travel time for a random walk between two randomly chosen vertices. We are interested in graphs that behave counter-intuitively in regard to Kemeny's constant: in particular, we examine graphs with a cut-vertex at which at least two branches are paths, regarding whether the insertion of a particular edge into a graph results in an increase of Kemeny's constant. We provide several tools for identifying such an edge in a family of graphs and for analysing asymptotic behaviour of the family regarding the tendency to have that edge; and classes of particular graphs are given as examples. Furthermore, asymptotic behaviours of families of trees are described.


Author(s):  
Paul Burkhardt

The fastest deterministic algorithms for connected components take logarithmic time and perform superlinear work on a Parallel Random Access Machine (PRAM). These algorithms maintain a spanning forest by merging and compressing trees, which requires pointer-chasing operations that increase memory access latency and are limited to shared-memory systems. Many of these PRAM algorithms are also very complicated to implement. Another popular method is “leader-contraction” where the challenge is to select a constant fraction of leaders that are adjacent to a constant fraction of non-leaders with high probability, but this can require adding more edges than were in the original graph. Instead we investigate label propagation because it is deterministic, easy to implement, and does not rely on pointer-chasing. Label propagation exchanges representative labels within a component using simple graph traversal, but it is inherently difficult to complete in a sublinear number of steps. We are able to overcome the problems with label propagation for graph connectivity. We introduce a surprisingly simple framework for deterministic, undirected graph connectivity using label propagation that is easily adaptable to many computational models. It achieves logarithmic convergence independently of the number of processors and without increasing the edge count. We employ a novel method of propagating directed edges in alternating direction while performing minimum reduction on vertex labels. We present new algorithms in PRAM, Stream, and MapReduce. Given a simple, undirected graph [Formula: see text] with [Formula: see text] vertices, [Formula: see text] edges, our approach takes O(m) work each step, but we can only prove logarithmic convergence on a path graph. It was conjectured by Liu and Tarjan (2019) to take [Formula: see text] steps or possibly [Formula: see text] steps. Our experiments on a range of difficult graphs also suggest logarithmic convergence. We leave the proof of convergence as an open problem.


Author(s):  
S. Karthik ◽  
S. N. Meera ◽  
K. Selvakumar

Let [Formula: see text] be a commutative ring with identity and [Formula: see text] be the set of all nonzero zero-divisors of [Formula: see text]. The annihilator graph of commutative ring [Formula: see text] is the simple undirected graph [Formula: see text] with vertices [Formula: see text] and two distinct vertices [Formula: see text] and [Formula: see text] are adjacent if and only if [Formula: see text]. The essential graph of [Formula: see text] is defined as the graph [Formula: see text] with the vertex set [Formula: see text] and two distinct vertices [Formula: see text] and [Formula: see text] are adjacent if and only if [Formula: see text] is an essential ideal. In this paper, we classify all finite commutative rings with identity whose annihilator graph and essential graph have crosscap two.


2021 ◽  
Vol 40 (6) ◽  
pp. 1411-1430
Author(s):  
Jituparna Goswami ◽  
Masoumeh Shabani

Let R be a commutative ring with unity and M be a unitary R module. Let Nil(M) be the set of all nilpotent elements of M. The entire nilpotent element graph of M over R is an undirected graph E(G(M)) with vertex set as M and any two distinct vertices x and y are adjacent if and only if x + y ∈ Nil(M). In this paper we attempt to study the domination in the graph E(G(M)) and investigate the domination number as well as bondage number of E(G(M)) and its induced subgraphs N(G(M)) and Non(G(M)). Some domination parameters of E(G(M)) are also studied. It has been showed that E(G(M)) is excellent, domatically full and well covered under certain conditions.


Author(s):  
V. Srisarkun ◽  
C. Jittawiriyanukoon

Neutrosophic concept is known undirected graph theory to involve with complex logistic networks, not clearly given and unpredictable real life situations, where fuzzy logic malfunctions to model. The transportation objective is to ship all logistic nodes in the network. The logistic network mostly experiences in stable condition, but for some edges found to be volatile. The weight of these erratic edges may vary at random (bridge-lifting/bascule, ad hoc accident on road, traffic condition) In this article, we propose an approximation algorithm for solving minimum spanning tree (MST) of an undirected neutrosophic graphs (UNG), in which the edge weights represent neutrosophic values. The approximation upon the balanced score calculation is introduced for all known configurations in alternative MST. As the result, we further compute decisive threshold value for the weak weights amid minimum cost pre-computation. If the threshold triggers then the proper MST can direct the decision and avoid post-computation. The proposed algorithm is also related to other existing approaches and a numerical analysis is presented.


Author(s):  
Saeed Rajaee

In this paper, we introduce and study a new kind of graph related to a unitary module [Formula: see text] on a commutative ring [Formula: see text] with identity, namely the annihilators comaximal graph of submodules of [Formula: see text], denoted by [Formula: see text]. The (undirected) graph [Formula: see text] is with vertices of all non-trivial submodules of [Formula: see text] and two vertices [Formula: see text] of [Formula: see text] are adjacent if and only if their annihilators are comaximal ideals of [Formula: see text], i.e. [Formula: see text]. The main purpose of this paper is to investigate the interplay between the graph-theoretic properties of [Formula: see text] and the module-theoretic properties of [Formula: see text]. We study the annihilators comaximal graph [Formula: see text] in terms of the powers of the decomposition of [Formula: see text] to product distinct prime numbers in some special cases.


Author(s):  
Zeynep Nihan Berberler

The irregularity of a simple undirected graph [Formula: see text] is defined as [Formula: see text], where [Formula: see text] denotes the degree of a vertex [Formula: see text]. The total irregularity of a graph as a new measure of graph irregularity is defined as [Formula: see text]. In this paper, the irregularity and the total irregularity of fractal graphs and the derived graphs from a class of fractal graphs are investigated. Exact formulae are presented for the computation of the irregularity and total irregularity of fractal-type graphs in terms of the parameters of the underlying graphs.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Cindy (Sin Yi) Tsang

Abstract A skew brace is a triplet ( A , ⋅ , ∘ ) (A,{\cdot}\,,\circ) , where ( A , ⋅ ) (A,{\cdot}\,) and ( A , ∘ ) (A,\circ) are groups such that the brace relation x ∘ ( y ⋅ z ) = ( x ∘ y ) ⋅ x - 1 ⋅ ( x ∘ z ) x\circ(y\cdot z)=(x\circ y)\cdot x^{-1}\cdot(x\circ z) holds for all x , y , z ∈ A x,y,z\in A . In this paper, we study the number of finite skew braces ( A , ⋅ , ∘ ) (A,{\cdot}\,,\circ) , up to isomorphism, such that ( A , ⋅ ) (A,{\cdot}\,) and ( A , ∘ ) (A,\circ) are both isomorphic to T n T^{n} with 𝑇 non-abelian simple and n ∈ N n\in\mathbb{N} . We prove that it is equal to the number of unlabeled directed graphs on n + 1 n+1 vertices, with one distinguished vertex, and whose underlying undirected graph is a tree. In particular, it depends only on 𝑛 and is independent of 𝑇.


Sign in / Sign up

Export Citation Format

Share Document