• Title/Summary/Keyword: Graph

Search Result 4,618, Processing Time 0.029 seconds

Cofinite Graphs and Groupoids and their Profinite Completions

  • Acharyya, Amrita;Corson, Jon M.;Das, Bikash
    • Kyungpook Mathematical Journal
    • /
    • v.58 no.2
    • /
    • pp.399-426
    • /
    • 2018
  • Cofinite graphs and cofinite groupoids are defined in a unified way extending the notion of cofinite group introduced by Hartley. These objects have in common an underlying structure of a directed graph endowed with a certain type of uniform structure, called a cofinite uniformity. Much of the theory of cofinite directed graphs turns out to be completely analogous to that of cofinite groups. For instance, the completion of a directed graph Γ with respect to a cofinite uniformity is a profinite directed graph and the cofinite structures on Γ determine and distinguish all the profinite directed graphs that contain Γ as a dense sub-directed graph. The completion of the underlying directed graph of a cofinite graph or cofinite groupoid is observed to often admit a natural structure of a profinite graph or profinite groupoid, respectively.

ONE-SIDED FATTENING OF THE GRAPH IN THE REAL PROJECTIVE PLANE

  • Choy, Jaeyoo;Chu, Hahng-Yun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.27-43
    • /
    • 2022
  • The one-sided fattenings (called semi-ribbon graph in this paper) of the graph embedded in the real projective plane ℝℙ2 are completely classified up to topological equivalence. A planar graph (i.e., embedded in the plane), admitting the one-sided fattening, is known to be a cactus boundary. For the graphs embedded in ℝℙ2 admitting the one-sided fattening, unlike the planar graphs, a new building block appears: a bracelet along the Möbius band, which is not a connected summand of the oriented surfaces.

Automatic decomposition of unstructured meshes employing genetic algorithms for parallel FEM computations

  • Rama Mohan Rao, A.;Appa Rao, T.V.S.R.;Dattaguru, B.
    • Structural Engineering and Mechanics
    • /
    • v.14 no.6
    • /
    • pp.625-647
    • /
    • 2002
  • Parallel execution of computational mechanics codes requires efficient mesh-partitioning techniques. These mesh-partitioning techniques divide the mesh into specified number of submeshes of approximately the same size and at the same time, minimise the interface nodes of the submeshes. This paper describes a new mesh partitioning technique, employing Genetic Algorithms. The proposed algorithm operates on the deduced graph (dual or nodal graph) of the given finite element mesh rather than directly on the mesh itself. The algorithm works by first constructing a coarse graph approximation using an automatic graph coarsening method. The coarse graph is partitioned and the results are interpolated onto the original graph to initialise an optimisation of the graph partition problem. In practice, hierarchy of (usually more than two) graphs are used to obtain the final graph partition. The proposed partitioning algorithm is applied to graphs derived from unstructured finite element meshes describing practical engineering problems and also several example graphs related to finite element meshes given in the literature. The test results indicate that the proposed GA based graph partitioning algorithm generates high quality partitions and are superior to spectral and multilevel graph partitioning algorithms.

An Algorithm for One-to-One Mapping Matrix-star Graph into Transposition Graph (행렬-스타 그래프를 전위 그래프에 일-대-일 사상하는 알고리즘)

  • Kim, Jong-Seok;Lee, Hyeong-Ok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1110-1115
    • /
    • 2014
  • The matrix-star and the transposition graphs are considered as star graph variants that have various merits in graph theory such as node symmetry, fault tolerance, recursive scalability, etc. This paper describes an one-to-one mapping algorithm from a matrix-star graph to a transposition graph using adjacent properties in graph theory. The result show that a matrix-star graph $MS_{2,n}$ can be embedded in a transposition graph $T_{2n}$ with dilation n or less and average dilation 2 or less.

An Efficient Large Graph Clustering Technique based on Min-Hash (Min-Hash를 이용한 효율적인 대용량 그래프 클러스터링 기법)

  • Lee, Seok-Joo;Min, Jun-Ki
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.380-388
    • /
    • 2016
  • Graph clustering is widely used to analyze a graph and identify the properties of a graph by generating clusters consisting of similar vertices. Recently, large graph data is generated in diverse applications such as Social Network Services (SNS), the World Wide Web (WWW), and telephone networks. Therefore, the importance of graph clustering algorithms that process large graph data efficiently becomes increased. In this paper, we propose an effective clustering algorithm which generates clusters for large graph data efficiently. Our proposed algorithm effectively estimates similarities between clusters in graph data using Min-Hash and constructs clusters according to the computed similarities. In our experiment with real-world data sets, we demonstrate the efficiency of our proposed algorithm by comparing with existing algorithms.

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.

HYPERIDENTITIES IN (xy)x ≈x(yy) GRAPH ALGEBRAS OF TYPE (2,0)

  • Khampakdee, Jeeranunt;Poomsa-Ard, Tiang
    • Bulletin of the Korean Mathematical Society
    • /
    • v.44 no.4
    • /
    • pp.651-661
    • /
    • 2007
  • Graph algebras establish a connection between directed graphs without multiple edges and special universal algebras of type (2,0). We say that a graph G satisfies an identity $s{\approx}t$ if the corresponding graph algebra $\underline{A(G)}$ satisfies $s{\approx}t$. A graph G=(V,E) is called an $(xy)x{\approx}x(yy)$ graph if the graph algebra $\underline{A(G)}$ satisfies the equation $(xy)x{\approx}x(yy)$. An identity $s{\approx}t$ of terms s and t of any type ${\tau}$ is called a hyperidentity of an algebra $\underline{A}$ if whenever the operation symbols occurring in s and t are replaced by any term operations of $\underline{A}$ of the appropriate arity, the resulting identities hold in $\underline{A}$. In this paper we characterize $(xy)x{\approx}x(yy)$ graph algebras, identities and hyperidentities in $(xy)x{\approx}x(yy)$ graph algebras.

A Study on the Constructing the Function using Extension Edge Valued Graph (모서리값 확장 그래프를 사용한 함수구성에 관한연구)

  • Park, Chun-Myoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.863-868
    • /
    • 2013
  • In recently years, many digital logic systems based on graph theory are analyzed and synthesized. This paper presented a method of constructing the function using edge valued extension graph which is based on graph theory. The graph is applied to a new data structure. from binary graph which is recently used in constructing the digital logic systems based on the graph theory. We discuss the mathematical background of literal and reed-muller expansion, and we discuss the edge valued extension graph which is the key of this paper. Also, we propose the algorithms which is the function derivation based on the proposed edge valued extension graph. That is the function minimization method of the n-variables m-valued functions and showed that the algorithm had the regularity with module by which the same blocks were made concerning about the schematic property of the proposed algorithm.

Embedding Mechanism between Pancake and Star, Macro-star Graph (팬케익 그래프와 스타(Star) 그래프, 매크로-스타(Macro-star) 그래프간의 임베딩 방법)

  • 최은복;이형옥
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.556-564
    • /
    • 2003
  • A Star and Pancake graph also have such a good property of a hypercube and have a low network cost than the hypercube. A Macro-star graph which has the star graph as a basic module has the node symmetry, the maximum fault tolerance, and the hierarchical decomposition property. And, it is an interconnection network which improves the network cost against the Star graph. In this paper, we propose a method to embed between Star graph, Pancake graph, and Macro-star graph using the edge definition of graphs. We prove that the Star graph $S_n$ can be embedded into Pancake graph $P_n$ with dilation 4, and Macro-star graph MS(2,n) can be embedded into Pancake graph $P_{2n+1}$ with dilation 4. Also, we have a result that the embedding cost, a Pancake graph can be embedded into Star and Macro-star graph, is O(n).

  • PDF

A study on the comparative analysis of the graph introduced newly in the seventh grade mathematics textbook and on the investigation of the degree of the learning satisfaction (중학교 1학년 수학 교과서에 새롭게 도입된 그래프 내용 비교 분석과 학습만족도 조사 연구)

  • Hwang, Hye Jeang;Kim, Hye Ji
    • The Mathematical Education
    • /
    • v.58 no.3
    • /
    • pp.403-422
    • /
    • 2019
  • As the informal graph was introduced newly in the area of function in middle school mathematics curriculum revised in 2015, ten publishing company became to have a concern on how to represent the graph content uniquely and newly. At this time, it may be meaningful and useful to compare and analyze the content of the graph unit shown on each textbook published by publishing companies. To accomplish this, on fundamentally the basis of diverse prior researches this study tried to select the elements of expression and interpretation of the graph and establish an analytic frameworks of expression and interpretation of the graph respectively. This study executed the frequency analysis and cross analysis by textbook system, textbook, and the number of the graph drawn on a coordinate plane on the representation and interpretation of the graph. As a result, the textbook contains more items on interpretation than the representation of the graph, and students showed a learning effect on the graph unit but showed a neutral response to the impact of learning. This basic and essential paper shed light on developing the practical and more creative textbook which has diversity and characteristic respectively, while adjusting the scope of the elements of the graph's representations and interpretations and providing proper level and quality content.