Preprint
Article

This version is not peer-reviewed.

Three Problems in Graph Imbedding to Show P Does Not Equal NP

Submitted:

17 February 2026

Posted:

27 February 2026

You are already at the latest version

Abstract
The P versus NP problem, a conjecture formulated by Stephen Cook in 1971, is one of the most challenging problems in contemporary mathematics and theoretical computer science. A concise mathematical formulation of the problem reads: is P = NP? In longer phrasing, this asks: given a problem instance, if some additional data can be recognized fast enough as logically implying the existence of a solution (to the instance), then can a so- lution be computed fast enough? we formulate three problems in graph imbedding to show P ≠ NP.
Keywords: 
;  ;  ;  ;  ;  ;  

1. Introduction

More on terminologies, symbols and notations used in this article can be found in [3] or [6] or [8]. Throughout this article, N will denote the set of positive integers, W the set of non-negative integers (i.e., W = N 0 ), Z the set of integers and R the set of real numbers.
This article has thirteen sections. Section 1 directs the reader to some references for relevant details on algorithms, the problem classes P and NP, attempted solutions and feasible solutions. Section 2 contains graph-theoretical concepts on which the three problems hinted at in the abstract are formulated.
The first of these problems is discussed in Section 3 through Section 6; the second in Section 7 through Section 9; and the third in Section 10 through Section 12.
The discussions of the three problems also include algorithms (one under each problem) that contribute to proving PNP. Each problem is shown to be in NP but not in P (Section 6, Section 9 and Section 12). The concluding remarks are in Section 13.
These discussions also draw on the following topics that can be found in some detail in the suggested references:
1.
Algorithms [3,4,5,10].
2.
Problem instance and size of an instance [1,3,4,5].
3.
A step in an algorithm [3,4,5].
4.
Polynomial-time algorithm [2,3,4,5,10].
5.
Class P and class NP of problems [2,3,4,5,9,11].
6.
Feasible solutions and proposed solutions [3,4,5,7].
7.
Certificates and certificate candidates [4,5].
8.
Atomic sub-outputs of solutions [4,5].
9.
Bijections (or, bijective maps) [6,8].

2. Essential Graph Theory

A set is a collection of definite and distinguishable objects [3,8]. Each object in a set is an element or a member of the set. It is taken for granted that if X is a given set then there are well-formed definitions that decide conclusively whether or not (i) a given object is an element of X and (ii) two given elements of X are distinct or the same. Also, such definitions are made explicit when necessary. There is a unique set that contains no members, and this is the empty set, denoted by ϕ .
The cardinality (or, size) of a set X is the number of elements in X, and is denoted by X . Obviously X 0 . If X W then X is a finite set; else X is an infinite set.
The set of all the subsets of a set X, including the empty set ϕ and the set X itself, is denoted by P X and is the power set of X. If X is finite of cardinality n then P X is finite [3,8] of cardinality 2 n . The set P X ϕ denotes the set of all nonempty subsets of X.
A simple graph G is a pair G = V , E where:
(i)
V is a finite set, each element of which is called a vertex of G and
(ii)
E is a finite set, each element of which is a nonempty subset X of V such that X 2 and is called an edge of G.
If G is a simple graph then neither V nor E can have any repeated elements. V is the vertex set of G and E is the edge set of G. V = ϕ is possible, which necessiates E = ϕ , but the converse is not true.
The expressions x V and x G will both mean x is a vertex of G. The expression x , y E will mean x , y is an edge of G where (it is understood that) x G and y G .
The order of G is denoted by G and is defined to be the number of vertices in G - i.e., G = V . The girth of G is the number of edges in G and is denoted by e G or by e as convenient.
Two distinct vertices x and y of G are adjacent in G if x , y E . If x , y E then x and y are nonadjacent. The vertex x is self-adjacent if x E . G is loop-free if it has no self-adjacent vertex (meaning, X = 2 whenever X E ).
By the above definitions, if G = V , E is a simple loop-free graph of order n, it is immediate that the girth of G cannot exceed n n 1 2 [6]. All the graphs considered in this article are assumed simple and loop-free with positive orders.
Let x G . The neighbourhood of x in G is denoted by N G x or N x , and is defined to be the set of all y V such that y is adjacent to x in G. The non-negative integer N G x ( = N x ) is the degree of x in G, and is denoted by d x G or d x .
A graph J = W , F is a subgraph of a graph G = V , E if (i) W V and (ii) F E . In this case J is said to be contained in G or G is said to contain J. J is a proper subgraph of G if J is a subgraph of G with either W V or F E . If J is a subgraph of G such that J = G (i.e., W = V ) then J is a spanning subgraph of G.
Let S be a nonempty subset of V - i.e., S P V ϕ . The subgraph of G induced by S is denoted by G S and is defined to be the graph G S = S , E S where E S is the set of all the edges x , y E such that x S and y S . The order of G S = S , E S is (obviously) S . For convenience, we will denote the girth of G S by e S (rather than e G S ) in the coming discussions, providing no ambiguity arises. In particular, if S = V x then G S will also be denoted by G x . In this case e S = e d x G where e is the girth of G.
Two graphs G 1 = V 1 , E 1 and G 2 = V 2 , E 2 are isomorphic (written G 1 G 2 ) if there exists a bijection [8] f : V 1 V 2 with the property that x and y are adjacent vertices in G 1 if and only if f x and f y are adjacent vertices in G 2 . In this case the graph-theoretic properties of G 1 are exactly those of G 2 , and vice-versa.
A graph G = V , E is said to be imbedded in a graph H if H contains a subgraph that is isomorphic to G. G is span-imbedded in H if (i) G is imbedded in H and (ii) G = H . Every graph is span-imbedded in itself.

2.1. Importing Edges into Induced Subgraphs

Let G = V , E and S P V ϕ . Suppose x 1 , y 1 , , x q , y q are distinct members of P V ϕ , each of cardinality 2, such that for each j = 1 , , q :
  • (i) x j S and y j S and
  • (ii) x j and y j are nonadjacent in the induced subgraph G S of G.
  • Then for each j = 1 , , q , an edge can be introduced between x j and y j . Obviously none of these q edges is in G. Each of these q edges introduced this way into G S will be called an edge imported into G S (or, simply, an imported edge, if the graph into which ths edge is introduced is clear from the context). Clearly these q imported edges result in a graph - say, H - such that V is the vertex set of H and G is span-imbedded in H.
Any activity of importing an edge between two nonadjacent vertices of an induced subgraph G S will be called a legal edge-import. Obviously, then, if a legal edge-import is done between two vertices x and y of G S then no more edges are allowed to be imported into G S between x and y, since we insist that every graph in this article be simple and loop-free. Every edge-import considered in this article will be assumed legal.

2.2. Note on Importing Edges

Let G = V , E be a graph. Throughout this article, the following are to be noted in the context of importing edges into G.
(i)
An edge will be imported only into an induced subgraph of G.
(ii)
If an edge x , y is given to be imported into G S for some S P V ϕ , then x and y are non-adjacent vertices of G S (and hence non-adjacent in G) prior to the import of this edge.
(iii)
We have a graph H resulting from this import of the edge x , y such that G is span-imbedded in H.
(iv)
Hereafter, given a graph G, any import of finitely many edges into any induced subgraph of G will be assumed legal, so that the graph resulting from this import process will, like G, be simple and loop-free.

3. Span-Imbedding and Cliques (SIC)

Throughout this section, assume G = V , E and G 1 . If S P V ϕ then S is a clique of G if either (i) S > 1 and the vertices of S are pairwise adjacent in G or (ii) S = 1 . G is a complete graph if V is a clique of G.
  • Proposition 3.1. Let S P V ϕ and e S denote the girth of G S . Then a finite number of edges can be imported into G S so that:
  • (C-1) G is span-imbedded in a graph H = V , F (with E F ) and
  • (C-2) S is a clique of H - i.e., the induced subgraph H S (of H) is a complete graph.
  • Proof. Suppose S is a clique of G. Then importing no edge into G S leaves G span-imbedded in itself (meaning H G ) from which (C-1) and (C-2) are immediate.
Suppose S is not a clique of G. Let S = p and t = p p 1 2 e S . Clearly t > 0 . Further, exactly t edges can be imported into G S such that the p elements of S become pairwise adjacent with no loops and no multiple edges.
These t edges can also be deemed to have been imported into G. Let E 1 denote the set of these t imported edges and let F = E E 1 . Then the import of these t edges results in the graph H = V , F with E F . (C-1) and (C-2) follow immediately. •
  • Proposition 3.2. Let S P V ϕ . Then the number of edges that can be imported into G S is not more than p p 1 2 e S where p and e S are, respectively, S and the girth of G S .
  • Proof. Let t = p p 1 2 e S . Upon importing t edges into G S , we have a graph H such that (C-1) and (C-2) of Proposition 3.1 are true. Then no more edges can be legally imported into G S since (by (iv) of Subsection 2.2) H and H S are required to be simple and loop-free. •
  • Corollary 3.3. The number of edges that can be imported into G is not more than n n 1 2 e where n = G and e is the girth of G.
  • Proof. Set S = V in Proposition 3.2. •
  • Proposition 3.4. Let G = n and e be the girth of G. Let S P V ϕ , S = p and e S be the girth of G S . Then p p 1 2 e S n n 1 2 e .
  • Proof. We use induction on n. Let T n denote the statement to prove. For n = 1 , we have e = 0 , p = 1 and e S = 0 , whence p p 1 2 e S = 0 = n n 1 2 e , proving T 1 .
Assume T q is true. We next prove T q + 1 - i.e., when n = q + 1 . We consider the following cases.
  • Case 1: p = q + 1 . Here e S = e , whence p p 1 2 e S = n n 1 2 e is immediate.
  • Case 2: p < q + 1 . Let z V S and let J = W , F denote the induced subgraph G z and let e 1 be the girth of J. Note that W = V z so that J = q . If d z is the degree of z in G, then obviously d z q and e 1 = e d z . By induction hypothesis, p p 1 2 e S q q 1 2 e 1 for J (owing to S P W ϕ ). This gives p p 1 2 e S q q 1 2 e d z = q q 1 2 e + d z q q 1 2 e + q .
Now, q q 1 2 e + q = q q 1 2 e + 2 q 2 = q + 1 q 2 e . Using n = q + 1 , it is straightforward that p p 1 2 e S n n 1 2 e , completing the induction. •
  • Proposition 3.5. To each S P V ϕ , there exists a unique t W such that the import of t edges into G S endows the properties (C-1) and (C-2) (seen in the statement of Proposition 3.1) to G and S, respectively.
  • Proof. From the proof of Proposition 3.1, the existence of t W that endows (C-1) to G and (C-2) to S is clear, as is t = p p 1 2 e S (where p = S ). More than t edges cannot be imported legally into G S (Proposition 3.2) whereas if fewer than t edges are imported into G S then S will not acquire the property (C-2), whence t is unique for S. •

3.1. Clique-Upgradation Number

The unique t corresponding to S in Proposition 3.5 is the clique-upgradation number of S, and is denoted by ω + S .
  • Proposition 3.6. (i) Each nonempty subset S of V has a clique-upgradation number ω + S W .
  • (ii) ω + S = p p 1 2 e S where p = S and e S denotes the girth of G S .
  • Proof. (i) follows from Proposition 3.1 and the definition of clique-upgradation number.
  • (ii) Clearly ω + S p p 1 2 e S . Suppose the conclusion were false. Then (by Proposition 3.2) we would have ω + S = p p 1 2 e S q for some q N . Let the graph resulting from the import of ω + S edges (into G S ) be H. Then H S , which by the definition of ω + S is complete after the edge-import process, would have e S + p p 1 2 e S q edges, which number is less than p p 1 2 . But this patently contradicts the completeness of H S . •
Let G be of order n and girth e. For G, we define the set L G as L G = k W : 0 k n n 1 2 e . For each k L G , we define the set G ω + k as G ω + k = S P V ϕ : ω + S = k . Two given members of G ω + k are deemed distinct if they are distinct nonempty subsets of V. The following are immediate:
(i)
G ω + k is a finite set for each k L G .
(ii)
There exists k L G such that G ω + k is nonempty.
(iii)
It may happen that G ω + m = ϕ for some m L G .
For the remainder of this section, let G = V , E be of order n and girth e, and let r = n n 1 2 e .
  • Proposition 3.7. (i) The set union k = 0 r G ω + k equals P V ϕ .
  • (ii) If k 1 , k 2 L G with k 1 k 2 then G ω + k 1 G ω + k 2 = ϕ .
  • Proof. (i) k = 0 r G ω + k P V ϕ is clear from the definition of G ω + k .
On the other hand, suppose S P V ϕ with S = p and let e S be the girth of G S . By Proposition 3.2 and the definition of ω + S it follows ω + S = p p 1 2 e S . Invoking Proposition 3.4, we have S G ω + m for some m W with 0 m r , from which P V ϕ k = 0 r G ω + k as well.
  • (ii) If S G ω + k 1 then ω + S = k 1 k 2 , whence S G ω + k 2 . •
  • Corollary 3.8. Σ k = 0 r G ω + k = 2 n 1 .
  • Proof. Consequence of Proposition 3.6 and Proposition 3.7. •
  • Proposition 3.9. G ω + k 2 n 1 r + 1 for some k L n .
  • Proof. If each of the r + 1 non-negative integers G ω + 0 , , G ω + r were less than 2 n 1 r + 1 then we would have Σ k = 0 r G ω + k < r + 1 2 n 1 r + 1 , from which Σ k = 0 r G ω + k < 2 n 1 . But this contradicts Corollary 3.8. •

4. Compuation and Decision Variants of a Problem in SIC

A variant of a problem Q is a formulation of Q that seeks a desired type of solution to a given instance of Q . Types of variants that are widely studied and used are: optimization, computation and decision.
An optimization variant of Q is a formulation of Q that asks for a solution of an optimum measure (which is either the maximum or the minimum of the concerned measure) to each instance of Q [1].
A computation variant of Q is a formulation that asks for a solution (to each instance of Q ) subject to finitely many conditions.
A decision variant of Q is a formulation of Q using a decision question that asks for either a “yes” or a “no” answer to each instance. The basic ingredients [1] of a decision variant are: the set of instances, the set of attempted solutions (i.e., certificate candidates [4,5]) and the predicate that decides whether an input certificate candidate yields a solution.
We shall be concerned only with computation and decision variants of the three problems we discuss in the coming sections. It is common to formulate a computation problem Q as a decision problem to find out if Q is in NP (see [2,3,4,5,9,11]).

4.1. Compuation Variant of the Problem PSIC

The following is a computation variant of the problem we name PSIC:
  • If G = V , E is a graph of order n and girth e, then find a nonempty set G ω + k P V ϕ such that G ω + k 2 n 1 r + 1 where r = n n 1 2 e and 0 k r .

4.2. A Decision Variant of PSIC

  • Inputs: (i) Graph G = V , E , (ii) n = G N , (iii) e = E , (iv) r = n n 1 2 e .
  • Question: Does there exist a nonempty set G ω + k P V ϕ such that G ω + k 2 n 1 r + 1 for some k W with 0 k r ?
  • Output: YES (a desired set G ω + k exists) or NO (no such set G ω + k exists), as appropriate.
  • Note. There is no need of a certificate candidate since n N ensures the output is YES by dint of Proposition 3.9. As for the inputs (i) through (iv), it is mandatory that they be free from any error, as also that they be logically consistent with one another.

5. Algorithm PSIC-in-NP

The following algorithm will be referred to as PSIC-in-NP. The input is G , n , e , r . G, n, e and r, as well as the decision question and the required output, are given in Subsection 4.2.
                        Algorithm PSIC-in-NP
  • BEGIN
1. print “YES, there exists G ω + k P V ϕ with G ω + k 2 n 1 r + 1
       since G is of positive order” and STOP
  • STOP
  • Proposition 5.1. The algorithm PSIC-in-NP is feasible and correct.
  • Proof. The algorithm evidently returns only one output. Printing each decision clearly terminates in a finite number of steps. Consequently, PSIC-in-NP is feasible.
Next, we assert its correctness. Since n N , the YES decision is correct by Proposition 3.9. •
  • Proposition 5.2. Given an input G , n , e , r , PSIC-in-NP runs in polynomial time in n.
  • Proof. The total number (say, T c ) of steps executed by the algorithm PSIC-in-NP is the sum of the numbers of steps for all the lines executed. Suppose that one execution of the line j requires t j steps and that this line is executed exactly r j times when the algorithm is executed once. Then t j r j is the number of steps consumed by the line j in one execution of the algorithm.
In one execution of the algorithm, line 1 is executed once. Hence, t 1 r 1 = t 1 . Then T c = t 1 .
The number of steps required for line 1 is at most n 2 . Hence T c n 2 . •

6. PSIC Is in NP but Not in P

Let G , n , e and r be as in Subsection 4.2.
  • Proposition 6.1. The ratio 2 n 1 r + 1 cannot be bounded by a n b for any positive real constants a and b as n increases over N .
  • Proof. Were the conclusion false, then there would exist real constants c > 1 and d > 1 such that 2 n 1 r + 1 c n d for all n N . Simple calculations from here lead to 2 n 2 c + 1 n d + 2 . This leads to n l o g 2 n d + 3 for all n 2 c + 1 . But this contradicts the fact that n l o g 2 n is unbounded as n increases over N . •
  • Proposition 6.2. The problem PSIC is in NP.
  • Proof. Consequence of Proposition 5.1 and Proposition 5.2.
  • Proposition 6.3. The problem PSIC is not in P.
  • Proof. Let C be a given feasible algorithm that outputs a desired set G ω + k (where G is the given input graph of order n).
Let G ω + k = q . Note that q 2 n 1 r + 1 by Proposition 3.9. The q members of G ω + k are the atomic sub-outputs [4,5] of this solution to the instance G. Name these sub-outputs S 1 , , S q in the order that C follows in computing G ω + k .
For j = 1 , , q 1 , having taken t j steps for only the computation of S j , suppose C takes another t j + 1 steps to compute S j + 1 ; in other words, once C executes t j steps to compute S j , then beginning with the next step, C executes t j + 1 steps to compute S j + 1 , allowing that any of the already-computed sub-outputs S 1 through S j may be used anywhere in the computation of S j + 1 . Obviously, then, each t j 1 and t q 1 .
If T C is the total number of steps taken by C to compute and output the members S 1 through S q of G ω + k , then T C t 1 + + t q q 2 n 1 r + 1 . By Proposition 6.1, C cannot run in polynomial time (in n), from which the conclusion follows. •

7. Span-Imbedding and Dominating Sets (SID)

Throughout this section, assume G = V , E and G 1 . A nonempty subset D of V is a dominating set of G if either D = V or each element of V D is adjacent (in G) to some element of D.
  • Proposition 7.1. Let D P V ϕ . Then a finite number of edges can be imported into G so that:
  • (D-1) G is span-imbedded in a graph H = V , F (with E F ) and
  • (D-2) D is a dominating set of H.
  • Proof. Suppose D is a dominating set of G. Then importing no edge into G leaves G span-imbedded in itself (meaning H G ), from which (D-1) and (D-2) follow.
Suppose D is not a dominating set of G. Then let A denote the set of all the elements of V D that are not adjacent to any element of D. Let A = p and write A = y 1 , , y p . Clearly p > 0 . Fix an element x D . Import the p edges x , y j , ( j = 1 , , p ) into G. (D-1) and (D-2) follow immediately. •
  • Proposition 7.2. To each D P V ϕ , there corresponds a least t W such that the import of t edges into G endows the properties (D-1) and (D-2) (seen in the statement of Proposition 7.1) to G and D, respectively.
  • Proof. Consequence of Proposition 7.1. •

7.1. Domination-Upgradation Number

The least t W corresponding to D in Proposition 7.2 is the domination-upgradation number (or, dom-upgradation number) of D, and is denoted by γ + D .
  • Proposition 7.3. (i) Each nonempty subset D of V has a dom-upgradation number γ + D .
  • (ii) γ + D V D .
  • Proof. (i) Follows from Proposition 7.2 and the definition of dom-upgradation number.
  • (ii) If D is a dominating set of G then γ + D = 0 V D .
So suppose D is not a dominating set of G. Let A be the set y 1 , , y p seen in the proof of Proposition 7.1. Clearly A V D and so A V D .
Importing an edge from each element of A to a fixed element of D results in a graph H such that D is a dominating set of H. Next, if fewer than p edges are imported into G then at least one element of A will remain nonadjacent to every element of D and so D cannot be a dominating set of H; so γ + D A .
Next, having imported an edge from each element of A to the fixed element of D, avoiding the import of any other edge results in a graph H of which D is clearly a dominating set. So γ + D A .
Thus γ + D = A V D . •
Let G be of order n and girth e. For G, let the set L G be as defined immediately after the proof of Proposition 3.6. For each k L G , we define the set G γ + k as G γ + k = D P V ϕ : γ + D = k . Two given members of G γ + k are deemed distinct if they are distinct nonempty subsets of V. The following are immediate:
(i)
G γ + k is a finite set for each k L G .
(ii)
There exists k L G such that G γ + k is nonempty.
(iii)
It may happen that G γ + m = ϕ for some m L G .
For the remainder of this section, let G = V , E be of order n and girth e, and let r = n n 1 2 e .
  • Proposition 7.4. (i) The set union k = 0 r G γ + k equals P V ϕ .
  • (ii) If k 1 , k 2 L G with k 1 k 2 then G γ + k 1 G γ + k 2 = ϕ .
  • Proof. (i) k = 0 r G γ + k P V ϕ is clear from the definition of G γ + k .
On the other hand, suppose D P V ϕ . Let D = p . Since 0 γ + D r (in view of Corollary 3.3) and p n , we have D G γ + m for some m W with 0 m r , from which P V ϕ k = 0 r G γ + k as well.
  • (ii) If D G γ + k 1 then γ + D = k 1 k 2 , from which D G γ + k 2 . •
  • Corollary 7.5. Σ k = 0 r G γ + k = 2 n 1 .
  • Proof. Consequence of Proposition 7.3 and Proposition 7.4. •
  • Proposition 7.6. G γ + k 2 n 1 r + 1 for some k L n .
  • Proof. If each of the r + 1 non-negative integers G γ + 0 , , G γ + r were less than 2 n 1 r + 1 then we would have Σ k = 0 r G γ + k < r + 1 2 n 1 r + 1 , from which Σ k = 0 r G γ + k < 2 n 1 . But this contradicts Corollary 7.5. •

7.2. Computation Variant of a Problem in SID

The following is a computation variant of the problem we name PSID:
  • If G = V , E is a graph of order n and girth e then find a nonempty set G γ + k P V ϕ such that G γ + k 2 n 1 r + 1 where r = n n 1 2 e and 0 k r .

7.3. A Decision Variant of PSID

  • Inputs: (i) Graph G = V , E , (ii) n = G N , (iii) e = E , (iv) r = n n 1 2 e .
  • Question: Does there exist a nonempty set G γ + k P V ϕ such that G γ + k 2 n 1 r + 1 for some k W with 0 k r ?
  • Output: YES (a desired set G γ + k exists) or NO (no such set G γ + k exists), as appropriate.
  • Note. There is no need of a certificate candidate since n N ensures the output is YES by dint of Proposition 7.6. As for the inputs (i) through (iv), it is mandatory that they be free from any error, as also that they be logically consistent with one another.

8. Algorithm PSID-in-NP

The following algorithm will be referred to as PSID-in-NP. The input is G , n , e , r . G, n, e and r, as well as the decision question and the required output, are given in Subsection 7.3.
                        Algorithm PSID-in-NP
  • BEGIN
  • 1. print “YES, there exists G γ + k P V ϕ with G γ + k 2 n 1 r + 1
      since G is of positive order” and STOP
  • STOP
  • Proposition 8.1. The algorithm PSID-in-NP is feasible and correct.
  • Proof. The algorithm evidently returns only one output. Printing the decision clearly terminates in a finite number of steps. Consequently, PSID-in-NP is feasible.
Next, we assert its correctness. Since n N , the YES decision is correct by Proposition 7.6. •
  • Proposition 8.2. Given an input G , n , e , r , PSID-in-NP runs in polynomial time in n.
  • Proof. The total number (say, T d ) of steps executed by the algorithm PSID-in-NP is the sum of the numbers of steps for all the lines executed. Suppose that one execution of the line j requires t j steps and that this line is executed exactly r j times when the algorithm is executed once. Then t j r j is the number of steps consumed by the line j in one execution of the algorithm.
In one execution of the algorithm, line 1 is executed once and so T d = t 1 . The number of steps required for line 1 is at most n 2 . Hence T d n 2 . •

9. PSID Is in NP but Not in P

  • Proposition 9.1. The problem PSID is in NP.
  • Proof. Consequence of Proposition 8.1 and Proposition 8.2. •
  • Proposition 9.2. The problem PSID is not in P.
  • Proof. Let D be a given feasible algorithm that outputs a desired set G γ + k (where G is the given input graph of order n).
Let G γ + k = q . Note that q 2 n 1 r + 1 by Proposition 7.6. The q members of G γ + k are the atomic sub-outputs of this solution to the instance G. Name these sub-outputs S 1 , , S q in the order that D follows in computing the members of G γ + k .
For j = 1 , , q 1 , having taken t j steps for only the computation of S j , suppose D takes another t j + 1 steps to compute S j + 1 ; in other words, once D executes t j steps to compute S j then beginning with the next step D executes t j + 1 steps to compute S j + 1 , allowing that any of the already-computed sub-outputs S 1 through S j may be used anywhere in the computation of S j + 1 . Obviously, then, each t j 1 and t q 1 .
If T D is the total number of steps taken by D to compute and output the members S 1 through S q of G γ + k , then T D t 1 + + t q q 2 n 1 r + 1 . By Proposition 6.1, D cannot run in polynomial time (in n), from which the conclusion follows. •

10. Span-Imbedding and Hamiltonian Graphs (SIH)

Throughout this section, assume G = V , E . A path in G is a sequence x 1 , , x k of k distinct vertices of G such that x j , x j + 1 E for each j = 1 , , k 1 . A cycle or a closed path in G is a path x 1 , , x k in G having the additional properties that k 3 and x k , x 1 E . Such a cycle is also called a k-cycle. A k-cycle in G where k = G is a spanning cycle or Hamiltonian cycle in G. G is a Hamiltonian graph if there is a Hamiltonian cycle in G.
  • Proposition 10.1. Let G 3 . Let S P V ϕ .
  • (i) If S 3 , then a finite number of edges can be imported into G S so that:
  • (H-1) G is span-imbedded in a graph H = V , F (with E F ) and
  • (H-2) the induced subgraph H S (of H) is a Hamiltonian graph.
  • (ii) If S 2 then (H-2) seen in (i) above is never true.
  • Proof. (i) Suppose G S is Hamiltonian. This necessiates S 3 . Then importing no edge into G S leaves G is span-imbedded in itself (i.e., H G ) from which (H-1) and (H-2) follow immediately.
Suppose G S is not Hamiltonian. Let S = p . Write S = y 1 , , y p . For each j = 1 , , p 1 , if y j and y j + 1 are adjacent in G S then do not import any edge between y j and y j + 1 ; else import one edge between y j and y j + 1 .
Next, import an edge between y p and y 1 if they are not adjacent in G S ; else do not import any edge between the two.
Let E 1 denote the set of all the edges imported into G S by the above process. Note that E E 1 = ϕ . Let F = E E 1 . We now have a graph H = V , F .
Clearly, then, G is span-imbeddded in H. Further, the vertices y 1 , , y p (in that order) form a Hamiltonian cycle in H S . (H-1) and (H-2) follow immediately.
  • (ii) If S 2 then the elements of S can never form a Hamiltonian cycle by themselves. •
  • Proposition 10.2. To each S P V ϕ such that S 3 , there corresponds a least t W such that the import of t edges into G S endows the properties (H-1) and (H-2) (seen in the statement of Proposition 10.1) to G and H S , respectively.
  • Proof. Consequence of Proposition 10.1. •

10.1. Hamilton-Upgradation Number

The least t corresponding to S in Proposition 10.2 is the Hamilton-upgradation number or H-upgradation number of S, and is denoted by θ + S .
  • Proposition 10.3. Let G = V , E have order n 3 .
  • (i) Each nonempty subset S of V such that S 3 has a H-upgradation number θ + S .
  • (ii) θ + S p p 1 2 e S where p = S and e S denotes the girth of G S .
  • Proof. (i) Follows from Proposition 10.1 and the definition of H-upgradation number.
  • (ii) Suppose the conclusion were false. Then θ + S = p p 1 2 e S + k for some k N . Let H be the graph resulting from importing p p 1 2 e S + k edges into G S . Then there would be p p 1 2 + k edges in H S , a patent impossibility since H S is simple and loop-free of order p. •
Let G be of order n 3 and girth e. For G, we define the set L G as in Subsection 3.1. For each k L G , we define the set G θ + k as G θ + k = S P V ϕ : θ + S = k . Two given members of G θ + k are deemed distinct if they are distinct nonempty subsets of V. The following are immediate:
(i)
G θ + k is a finite set for each k L G .
(ii)
There exists k L G such that G θ + k is nonempty.
(iii)
It may happen that G θ + m = ϕ for some m G .
(iv)
If S G θ + k for some k L n then S 3 .
For the remainder of this section, G = V , E is of order n 3 and girth e, and r = n n 1 2 e .
  • Proposition 10.4. (i) The set union k = 0 r G θ + k equals S P V : S 3 .
  • (ii) If k 1 , k 2 L G with k 1 k 2 then G θ + k 1 G θ + k 2 = ϕ .
  • Proof. (i) The inclusion k = 0 r G θ + k S P V : S 3 is clear from the definition of G θ + k .
On the other hand, suppose S V and S ϕ with S = p 3 and let e S be the girth of G S . By Proposition 10.3(ii), θ + S p p 1 2 e S . Since p n , invoking Proposition 3.4 we have S G θ + m for some m W with 0 m r , from which S P V : S 3 k = 0 r G θ + k as well.
  • (ii) If S G θ + k 1 then θ + S = k 1 k 2 , from which S G θ + k 2 . •
  • Corollary 10.5. Σ k = 0 r G θ + k = 2 n 1 n n n 1 2 .
  • Proof. Consequence of Proposition 10.3 and Proposition 10.4. •
  • Proposition 10.6. G θ + k 2 n 1 n n n 1 2 r + 1 for some k L n .
  • Proof. Let Ω n denote the real number 2 n 1 n n n 1 2 r + 1 . If G θ + k < Ω n for each k L G then Σ k = 0 r G θ + k < r + 1 Ω n would ensue, giving Σ k = 0 r G θ + k < 2 n 1 n n n 1 2 , patently contradicting Corollary 10.5. •

10.2. Computation Variant of a Problem in SIH

The following is a computation variant of the problem we name PSIH:
  • If G = V , E is a graph of order n 3 and girth e then find a nonempty set G θ + k S P V : S 3 such that G θ + k 2 n 1 n n n 1 2 r + 1 where r = n n 1 2 e and 0 k r .

10.3. A Decision Variant of PSIH

  • Inputs: (i) Graph G = V , E , (ii) n = G N , (iii) e = E , (iv) r = n n 1 2 e
  • Question: Is there a nonempty set G θ + k S P V : S 3 with G θ + k 2 n 1 n n n 1 2 r + 1 for some k W with 0 k r ?
  • Certificate candidate: C G = n .
  • Output: YES (a desired set G θ + k exists) or NO (no such set G θ + k exists), as appropriate.

11. Algorithm PSIH-in-NP

The following algorithm will be referred to as PSIH-in-NP. The input is G , n , e , r . G, n, e and r, as well as the decision question and the required output, are given in Subsection 10.3.
                        Algorithm PSIH-in-NP
  • BEGIN
  • 1. if  n 3
  • 2. then print “YES, exists G θ + k S P V : S 3 with G θ + k 2 n 1 n n n 1 2 r + 1
          since n 3 ” and STOP
  • 3. else print “NO, no nonempty set G θ + k S P V : S 3 with G θ + k 2 n 1 n n n 1 2 r + 1
          since n 2 ” and STOP
  • 4. endif
  • STOP
  • Proposition 11.1. The algorithm PSIH-in-NP is feasible and correct.
  • Proof. Line 1 of the algorithm checks if n 3 . This check clearly terminates in a finite number of steps.
The possible outputs are all accounted for in two lines - line 2 and line 3. So the algorithm returns only finitely many outputs. Printing each decision clearly terminates in a finite number of steps. Consequently, PSIH-in-NP is feasible.
Next, we assert its correctness. If n 3 , then the algorithm decides YES. This is correct by Proposition 10.6.
If n 2 , then the algorithm decides NO. This output is correct by Proposition 10.1(ii). •
  • Proposition 11.2. Given an input G , n , e , r , PSIH-in-NP runs in polynomial time in n.
  • Proof. The total number (say, T h ) of steps executed by the algorithm PSIH-in-NP is the sum of the numbers of steps for all the lines executed. Suppose that one execution of the line j requires t j steps and that this line is executed exactly r j times when the algorithm is executed once. Then t j r j is the number of steps consumed by the line j in one execution of the algorithm.
In one execution of the algorithm, each line is executed once if at all. Hence, for j = 1 , , 4 , t j r j = t j .
We suppose each endif line takes constant time, independent of n.
The number of steps required for line 1 is at most n 2 . Likewise for lines 2 and 3. Hence T h 3 n 2 + 1 . •
  • Proposition 11.3. To each instance G of PSIH such that G = n 3 there is a certificate that is verified by PSIH-in-NP in polynomial time in the size (n) of G.
  • Proof. C G = n 3 is the required certificate. •

12. PSIH Is in NP but Not in P

Let G , n , e and r be as in Subsection 10.3.
  • Proposition 12.1. The ratio 2 n 1 n n n 1 2 r + 1 cannot be bounded by a n b for any positive real constants a and b as n increases over N .
  • Proof. Were the conclusion false, then 2 n 1 n n n 1 2 r + 1 c n d for some real constants c > 1 and d > 1 and for all n N . Simple calculations from here lead to 2 n < c + 2 n 2 d , giving 2 n < n 2 d + 1 for all n N such that n > c + 2 . Then n l o g 2 n < 2 d + 1 would ensue, But this contradicts the fact that n l o g 2 n cannot be bounded as n increases over N . •
  • Proposition 12.2. The problem PSIH is in NP.
  • Proof. Consequence of Proposition 11.1, Proposition 11.2 and Proposition 11.3. •
  • Proposition 12.3. The problem PSIH is not in P.
  • Proof. Let H be a given feasible algorithm that outputs a desired set G θ + k (where G is the given input graph of order n).
Let G θ + k = q . Note that q 2 n 1 n n n 1 2 r + 1 by Proposition 10.6. The q members of G θ + k are the atomic sub-outputs of this solution to the instance G. Name these sub-outputs S 1 , , S q in the order that H follows in computing G θ + k .
For j = 1 , , q 1 , having taken t j steps for only the computation of S j , suppose H takes another t j + 1 steps to compute S j + 1 ; in other words, once H executes t j steps to compute S j then beginning with the next step H executes t j + 1 steps to compute S j + 1 , allowing that any of the already-computed sub-outputs S 1 through S j may be used anywhere in the computation of S j + 1 . Obviously, then, each t j 1 and t q 1 .
If T H is the total number of steps taken by H to compute and output the members S 1 through S q of G θ + k , then T H t 1 + + t q q 2 n 1 n n n 1 2 r + 1 . By Proposition 12.1, H cannot run in polynomial time (in n), from which the conclusion follows. •

13. Conclusions

PNP follows from Proposition 6.2 and Proposition 6.3; or from Proposition 9.1 and Proposition 9.2; or from Proposition 12.2 and Proposition 12.3.

Acknowledgments

This research was fully funded by Niels Abel Foundation (NAF), Palakkad, Kerala State, India. The authors are especially grateful to everyone of the referees – all anonymous – who returned highly favourable reports about the correctness of the proofs in this article, as a result of which NAF gave the authors substantial financial rewards.

References

  1. Bovet, D. P. and Crescenzi, P., 1994, Introduction to the theory of complexity, Prentice Hall, London, UK.
  2. Cook, S., 2000, The P versus NP problem, Available online: http://www.claymath.org/millennium/P vs NP/pvsNP.pdf.
  3. Cormen, T. H., Leiserson, C. E., Rivest, R. L. and Stein, C., 2009, Introduction to Algorithms, MIT Press, USA.
  4. Dharmarajan, R. and Ramachandran, D., A problem in Moon-Moser graphs to show P does not equal NP, Glob. J. Pure Appl. Math. 21 (1) (2025) 51-73.
  5. Dharmarajan, R. and Ramachandran, D., A problem in power sets shows P does not equal NP, Available online: http://www.preprint.org. [CrossRef]
  6. J.M. Harris, J.L. Hirst, M.J. Mossinghoff, Combinatorics and Graph Theory, second ed., Springer, New York, 2008. [CrossRef]
  7. Savage, J. E., 1998, Models of Computation, Addison Wesley, Reading, USA.
  8. Stoll, R. R., 2012, Set Theory and Logic, Courier Corporation, USA.
  9. Trakhtenbrot, B. A., 1984, “A Survey of Russian Approaches to Perebor (Brute-Force Search) Algorithms,” IEEE Ann. Hist. Comput. 6(4), pp. 384-400. [CrossRef]
  10. Wilf, H. S., 1994, Algorithms and Complexity, Internet Edition, Summer.
  11. Woeginger, G. J., 2003, “Exact algorithms for NP-hard problems: A survey,” Combinatorial Optimization - Proc. 5th Intl. Workshop, Aussois, France, pp. 185–207.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated