Sort by
A Problem in Power Sets Shows P Does Not Equal NP
Dharmarajan R,
Ramachandran D
Posted: 22 April 2025
A Geometric and Visual Perspective on the Four Color Map Theorem and K5 Non-Planarity and Their Connection
Chandan Kumar Shukla
Posted: 22 April 2025
New Polynomial Identities and Some Consequences
Kunle Adegoke
Posted: 15 April 2025
The Chebiam Continuum Axiom: A Resolution to the Continuum Hypothesis Through Computational Forcing and Large Cardinals
Anant Chebiam
Posted: 09 April 2025
On The Total Version Of Triple Roman Domination In Graphs
Juan Carlos Valenzuela-Tripodoro,
Maria Antonia Mateos-Camacho,
Maria Pilar Alvarez-Ruiz,
Martin Cera
Posted: 17 March 2025
Marking Algorithms in Permutation Tableaux and Transformations on Linked Partitions
Carol Jian Wang,
Meryl Nan Wang
Posted: 17 March 2025
Generalized Closeness and Decay-Stability of Some Graphs
Darja Rupnik Poklukar,
Janez Žerovnik
Posted: 27 February 2025
p-adic Delsarte-Goethals-Seidel-Kabatianskii-Levenshtein-Pfender Bound
K. Mahesh Krishna
We introduce the notion of p-adic spherical codes (in particular, p-adic kissing number problem). We show that the one-line proof for a variant of the Delsarte-Goethals-Seidel-Kabatianskii-Levenshtein upper bound for spherical codes, obtained by Pfender, extends to p-adic Hilbert spaces.
We introduce the notion of p-adic spherical codes (in particular, p-adic kissing number problem). We show that the one-line proof for a variant of the Delsarte-Goethals-Seidel-Kabatianskii-Levenshtein upper bound for spherical codes, obtained by Pfender, extends to p-adic Hilbert spaces.
Posted: 06 February 2025
New Upper Bounds on the Number of Maximum Independent Sets of a Graph
Vadim E. Levit,
Elizabeth J. Itskovich
Posted: 31 January 2025
Resolving the Open Problem by Proving a Conjecture on the Inverse Mostar Index for c-Cyclic
Liju Alex,
Kinkar Chandra Das
Inverse topological index problems involve determining whether a graph exists with a given integer as its topological index. One such index, the Mostar index, Mo(G), is defined as: Mo(G) = Σuv∈E(G) nu(e|G) − nv(e|G), where nu(e|G) and nv(e|G) represent the number of vertices closer to vertex u than v, and closer to v than u, respectively, for an edge e = uv. The inverse Mostar index problem has gained significant attention recently. In their work, Alizadeh et al. [Solving the Mostar index inverse problem, J. Math. Chem. 62 (5) (2024) 1079–1093], proposed the following open problem: “Which nonnegative integers can be realized as Mostar indices of c-cyclic graphs, for a given positive integer c?" Subsequently, one of the present authors [On the inverse Mostar index problem for molecular graphs, Trans. Comb. 14 (1) (2024) 65–77] conjectured that, except for finitely many positive integers, all other positive integers can be realized as the Mostar index of a c-cyclic graph, where c ≥ 3. In this paper, we fully resolve this open problem by proving the aforementioned conjecture.
Inverse topological index problems involve determining whether a graph exists with a given integer as its topological index. One such index, the Mostar index, Mo(G), is defined as: Mo(G) = Σuv∈E(G) nu(e|G) − nv(e|G), where nu(e|G) and nv(e|G) represent the number of vertices closer to vertex u than v, and closer to v than u, respectively, for an edge e = uv. The inverse Mostar index problem has gained significant attention recently. In their work, Alizadeh et al. [Solving the Mostar index inverse problem, J. Math. Chem. 62 (5) (2024) 1079–1093], proposed the following open problem: “Which nonnegative integers can be realized as Mostar indices of c-cyclic graphs, for a given positive integer c?" Subsequently, one of the present authors [On the inverse Mostar index problem for molecular graphs, Trans. Comb. 14 (1) (2024) 65–77] conjectured that, except for finitely many positive integers, all other positive integers can be realized as the Mostar index of a c-cyclic graph, where c ≥ 3. In this paper, we fully resolve this open problem by proving the aforementioned conjecture.
Posted: 27 January 2025
Group Theory of the 2×2×2 Rubik’s Cube and Its Solution Algorithms
Riddhiman Bhattacharya
Posted: 27 December 2024
The Generalized Characteristic Polynomial of the Km,n-Complement of a Bipartite Graph
Weiliang Zhao,
Helin Gong
The generalized matrix of a graph G is defined as M(G) = A(G) − tD(G) (t ∈ R, A(G) and D(G) respectively denote the adjacency matrix and the degree matrix of G), and the generalized characteristic polynomial of G is merely the characteristic polynomial of M(G). Let Km,n be the complete bipartite graph. Then the Km,n-complement of a subgraph G in Km,n is defined as the graph obtained by removing all edges of an isomorphic copy of G from Km,n. In this paper, by using a determinant expansion on the sum of two matrices (one of which is a diagonal matrix), a general method for computing the generalized characteristic polynomial of the Km,n-complement of a bipartite subgraph G was provided. Furthermore, when G is a graph with rank no more than 4, the explicit formula for the generalized characteristic polynomial of the Km,n-complements of G is given.
The generalized matrix of a graph G is defined as M(G) = A(G) − tD(G) (t ∈ R, A(G) and D(G) respectively denote the adjacency matrix and the degree matrix of G), and the generalized characteristic polynomial of G is merely the characteristic polynomial of M(G). Let Km,n be the complete bipartite graph. Then the Km,n-complement of a subgraph G in Km,n is defined as the graph obtained by removing all edges of an isomorphic copy of G from Km,n. In this paper, by using a determinant expansion on the sum of two matrices (one of which is a diagonal matrix), a general method for computing the generalized characteristic polynomial of the Km,n-complement of a bipartite subgraph G was provided. Furthermore, when G is a graph with rank no more than 4, the explicit formula for the generalized characteristic polynomial of the Km,n-complements of G is given.
Posted: 23 December 2024
Line Spreads That Produce Projective Planes
Hendrik Van Maldeghem
Posted: 10 December 2024
Operators in the Hilbert Space: the Ramsey Approach
Edward Bormashenko,
Nir Shvalb
Posted: 06 December 2024
A Short Proof of Knuth's Old Sum
Kunle Adegoke
Posted: 04 December 2024
Formal Calculation of Binomial Coefficients
Peng Ji
Posted: 02 December 2024
An Improvement of the Lower Bound on the Maximum Number of Halving Lines for Sets in the Plane with an Odd Number of Points
Javier Rodrigo,
Mariló López,
Danilo Magistrali,
Estrella Alonso
Posted: 26 November 2024
Constrained Underdiagonal Paths and pattern Avoiding Permutations
Andrea Frosini,
Veronica Guerrini,
Simone Rinaldi
Posted: 21 November 2024
New Harmonic Number Series
Kunle Adegoke,
Robert Frontczak
Posted: 06 November 2024
Matrix Manipulations and Tridiagonal Structures New Schemes in Secure Data Encryption
Athar Kharal,
Syed Ahtsham Ul Haq Bokhary,
Maha Mohammad Saeed
This paper presents four novel schemes for secure data encryption utilizing mathematical transformations. The first scheme employs matrix manipulations and partitioning of numerical values derived from plain text characters, constructing a cipher through matrix additions. The second scheme introduces division operations and additional transformation layers for enhanced data obscurity. The third scheme incorporates tridiagonal matrices, creating a structured encryption process. The fourth scheme refines this approach with quotient-remainder operations and symmetric keys to construct a tridiagonal matrix cipher. Detailed algorithms for encryption and decryption are provided, with examples illustrating practical applications. This work contributes to mathematical cryptography by offering enhanced security methods for digital communication.
This paper presents four novel schemes for secure data encryption utilizing mathematical transformations. The first scheme employs matrix manipulations and partitioning of numerical values derived from plain text characters, constructing a cipher through matrix additions. The second scheme introduces division operations and additional transformation layers for enhanced data obscurity. The third scheme incorporates tridiagonal matrices, creating a structured encryption process. The fourth scheme refines this approach with quotient-remainder operations and symmetric keys to construct a tridiagonal matrix cipher. Detailed algorithms for encryption and decryption are provided, with examples illustrating practical applications. This work contributes to mathematical cryptography by offering enhanced security methods for digital communication.
Posted: 31 October 2024
of 5