Next Article in Journal
Persistent Homology for Breast Tumor Classification Using Mammogram Scans
Previous Article in Journal
Bayesian Inference for COVID-19 Transmission Dynamics in India Using a Modified SEIR Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Class of Fibonacci Matrices, Graphs, and Games

by
Valentin E. Brimkov
1,† and
Reneta P. Barneva
2,*
1
Mathematics Department, SUNY Buffalo State, Buffalo, NY 14222, USA
2
School of Business, State University of New York at Fredonia, Fredonia, NY 14063, USA
*
Author to whom correspondence should be addressed.
Valentin Brimkov is on leave from Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, 1113 Sofia, Bulgaria.
Mathematics 2022, 10(21), 4038; https://doi.org/10.3390/math10214038
Submission received: 26 September 2022 / Revised: 24 October 2022 / Accepted: 28 October 2022 / Published: 31 October 2022
(This article belongs to the Section Computational and Applied Mathematics)

Abstract

:
In this paper, we define a class of Fibonacci graphs as graphs whose adjacency matrices are obtained by alternating binary Fibonacci words. We show that Fibonacci graphs are close in size to Turán graphs and that their size-stability tradeoff defined as the product of their size and stability number is very close to the maximum possible over all bipartite graphs. We also consider a combinatorial game based on sequential vertex deletions and show that the Fibonacci graphs are extremal regarding the number of rounds in which the game can terminate.
MSC:
05C57; 05B20; 11B39; 91A43; 91A46

1. Introduction

Fibonacci sequence is among the most interesting and popular mathematical objects. The interest in this sequence is shared by experts and practitioners from different areas because of its numerous applications in different sciences and sectors of human practice, as diverse as mathematics, computer science, physics, biology, and economics, among other natural and social sciences. Various results pertinent to the Fibonacci sequence, the reporting of which goes beyond the scope of this paper, are available in the literature. Since 1963, hundreds of such works have appeared in the journal The Fibonacci Quarterly—the primary publication of the Fibonacci Association—as well as in many other esteemed professional journals. For an outline of the basic related findings the reader is referred to the monographs [1,2].
Apart from the results presenting properties of the Fibonacci sequence and its applications, a large number of new mathematical structures and developments have been devoted to the subject. Perhaps the most notable among these are the number sequences of Lucas [2], Pell [3], Padovan [4,5], and Perrin [6], along with the polynomials associated with them. In particular, some remarkable properties and applications are associated with the Pell-Lucas polynomials (see, e.g., [7,8]).
In addition to studying of sequences of numbers, the Fibonacci sequence influenced investigations of objects of different nature. In all likelihood, of a principal importance among these is the sequence of Fibonacci words, which are constructed using the Fibonacci recurrence, and which are closely related to the results of the present paper.
Fibonacci words belong to the class of Sturmian words and are known to have certain extremal properties that have been useful in obtaining lower bounds for the running time of various algorithms in combinatorial pattern matching (see, e.g., [9,10,11,12,13,14,15]).
Fibonacci words were generalized to two dimensions in [11]; 2D Fibonacci words were then used to obtain tight bounds on the number of certain 2D repetitions in two dimensional arrays, and in turn for proving tight bounds on the complexity of algorithms for their detection.
Another example of utilizing the Fibonacci sequence to a mathematical discipline different from number theory is seen in defining and studying ‘Fibonacci graphs.’ To our knowledge, the first study of graphs associated with Fibonacci sequence appeared in [16]. The introduction of those graphs, called ‘generalized Fibonacci maximum path graphs’, aimed at investigating the structure of an acyclic directed graph maximizing the number of distinct paths between two given vertices. Supposedly, the best-known class of Fibonacci graphs is the one of the Fibonacci cubes (alternatively known as Fibonacci networks) [17,18,19,20]. These are similar to the hypercube graphs, but having a Fibonacci number of vertices. Applications of these graphs have been found in parallel computing [17], routing and broadcasting in distributed computations [21] and chemical graph theory [22]. Another recent work introducing a class of Fibonacci graphs is [23]. In that paper, Fibonacci graphs are defined as ones having degree sequence consisting of n consecutive Fibonacci numbers, and the authors provide necessary and sufficient conditions for the realizability of such a sequence.
In the present paper we study a new class of graphs with Fibonacci adjacency matrices, the definition of the latter being adapted from one of the Fibonacci arrays mentioned above. We investigate various characteristics of these graphs, in particular they appear to be complete bipartite graphs possessing certain extremal or close to extremal properties. Thus, similar to Fibonacci numbers and words, these graphs are potentially applicable to analysis of the performance of algorithms for solving problems on graphs. Moreover, being bipartite, the considered Fibonacci graphs may find many of the various applications realized by bipartite graphs, such as in cryptology and secured communications [24,25], in anti-theft networks [26], in cloud computing [27], in biology and medicine [28], in data transfer [29], and in many other fields [30].
In the next section we define the classes of Fibonacci matrices and graphs which are the subject of this work and explore their properties. In particular, we show that they are complete bipartite graphs, which are close in size to the celebrated Turán graphs, and that the product of their size and stability number (called size-stability tradeoff) is very close to the maximum possible over all bipartite graphs. In Section 3, we consider a combinatorial game based on sequential vertex deletions and show that the Fibonacci graphs are extremal regarding the number of rounds in which the game can terminate. We conclude with some final remarks in Section 4.

2. Fibonacci Matrices and Graphs

A sequence of Fibonacci words on an alphabet ( a , b ) is defined by f 1 = a , f 2 = a b , and f k + 1 = f k f k 1 for k 2 , where f k f k 1 denotes the concatenation of words f k and f k 1 . For example,
W 1 = 0 , 01 , 010 , 01001 , 01001010 , 0100101001001 , W 2 = 1 , 10 , 101 , 10110 , 10110101 , 1011010110110 ,
are the sequences of Fibonacci words on the alphabets ( 0 , 1 ) and ( 1 , 0 ) , respectively. With this construction, the length of the k th Fibonacci word equals the ( k + 1 ) st Fibonacci number F k + 1 .
A Fibonacci matrix F ( k ) , k 1 , is an F k + 1 × F k + 1 matrix. The first row and the first column of F ( k ) is the k th Fibonacci word f k from the sequence W 1 defined above. Then, for 2 i F k + 1 , row i (resp. column i) is the word f k from W 1 if the i th entry of the first row/column is 0, and it is the word f k from W 2 if the i th entry of the first row/column is 1. Thus, the first four Fibonacci matrices are:
F ( 1 ) = 0 ,   F ( 2 ) = 0 1 1 0 ,   F ( 3 ) = 0 1 0 1 0 1 0 1 0 ,   F ( 4 ) = 0 1 0 0 1 1 0 1 1 0 0 1 0 0 1 0 1 0 0 1 1 0 1 1 0
.
Recall that the adjacency matrix of an undirected graph G = ( V , E ) is a symmetric | V | × | V | matrix A whose ( i , j ) th entry equals 1 if there is an edge in E connecting vertices v i , v j V , and 0 otherwise. Note that by construction, F ( k ) is a symmetric matrix for all k 1 . We define a Fibonacci graph G F ( k ) as a graph with adjacency matrix F ( k ) for some k 1 . In the rest of this work we study some properties of Fibonacci graphs.

2.1. Structural Properties of Fibonacci Graphs

Given a graph G = ( V , E ) , | V | and | E | will be referred to as the order and size of G, respectively. G = ( V , E ) is a simple graph if it has no loops and no parallel edges. G is a bipartite graph if the set of its vertices can be partitioned into two sets V 1 and V 2 , called parts, such that every edge in E connects a vertex from V 1 and a vertex from V 2 . A bipartite graph with parts V 1 and V 2 is denoted G = ( V 1 , V 2 , E ) . G = ( V 1 , V 2 , E ) is a complete bipartite graph if there is an edge joining each vertex from V 1 to every vertex of V 2 . A complete bipartite graph with | V 1 | = p and | V 2 | = q is denoted K p , q .
Proposition 1.
For any k 2 , G F ( k ) is a simple complete bipartite graph with F k 1 F k edges.
Proof. 
By construction, F ( k ) is a 0/1 matrix, so G F ( k ) has no parallel edges. To see why G F ( k ) has no loops, consider first an arbitrary row i of F ( k ) starting with 0 in its first column, i.e., F i 1 ( k ) = 0 . By the symmetry of F ( k ) , element F i i ( k ) belongs to the i th column which is the same as row i, i.e., F 1 i ( k ) = 0 . Since the first and the i th rows are identical, their prefixes of length i are identical as well, so F i i ( k ) = F 1 i ( k ) = 0 . Now let row i start with 1, i.e., F i 1 ( k ) = 1 . Similar to the previous case, by the symmetry of F ( k ) we have F 1 i ( k ) = 1 . By the definition of Fibonacci words, a word of type W 1 has 0 in its i’th position if and only if a word of type W 2 has 1 in the i’th position. Since row 1 starts with 0, i.e., is of type W 1 , while row i is of type W 2 , it follows that F i i ( k ) = 0 . Thus, all diagonal entries of the adjacency matrix of G F ( k ) are 0’s, so G F ( k ) has no loops.
Let V 1 be the subset of vertices of G F ( k ) corresponding to rows of F ( k ) whose first entry is 0 and let V 2 be the subset of vertices corresponding to rows of F ( k ) whose first entry is 1. It is easily seen that with this partitioning the graph G F ( k ) is isomorphic to the complete bipartite graph H A ( k ) with adjacency matrix A ( k ) whose entries are defined by
A i j ( k ) = 0 , when   i , j   F k   or   i , j > F k 1 , otherwise
For example, a graph with adjacency matrix A ( 4 ) = 0 0 0 1 1 0 0 0 1 1 0 0 0 1 1 1 1 1 0 0 1 1 1 0 0 is isomorphic to the graph with adjacency matrix F ( 4 ) shown above.
Finally, by construction, the k th word in the sequence W 1 has F k 0’s and F k 1 1’s; thus, the matrix F ( k ) has F k rows comprised of the k th word of W 1 , which contains F k 1 1’s, and F k 1 rows comprised of the k th word of W 2 , which contains F k 1’s. Thus, the total number of 1’s in F ( k ) is 2 F k 1 F k , and hence the number of edges of G F ( k ) is F k 1 F k . □

2.2. Fibonacci Graphs, Turán Graphs, and Size-Stability Tradeoff

A triangle is a simple graph on three vertices such that every two of them are adjacent. A graph is triangle-free if it contains no triangles. A triangle-free graph is maximal if adding any new edge creates a triangle subgraph. It is well-known that bipartite graphs are triangle-free, and complete bipartite graphs are maximal triangle-free. Thus, for any k 2 , G F ( k ) is a maximal triangle-free graph. Turán’s theorem [31] (see also [32,33,34]) establishes that the Turán graph T ( n , 2 ) = K n / 2 , n / 2 is the unique triangle-free graph with maximum number of edges t ( n , 2 ) = n 2 4 . The following proposition shows that asymptotically, the Fibonacci graph G F ( k ) is close in size to the Turán graph T ( F k + 1 , 2 ) . We will denote the size of G = ( V , E ) by e ( G ) .
Proposition 2.
lim k t ( F k + 1 , 2 ) e ( G F ( k ) ) = ϕ 3 4 1.059 ,
where ϕ denotes the golden ratio.
Proof. 
By definition, the size of the Turán graph of order F k + 1 is F k + 1 2 4 , while by Proposition 1, the size of F ( k ) is F k 1 F k . Thus, we have
lim k t ( F k + 1 , 2 ) e ( G F ( k ) ) = lim k F k + 1 2 / 4 F k 1 F k .
Since x x < x + 1 for any x R , we have
lim k t ( F k + 1 , 2 ) e ( G F ( k ) ) = lim k F k + 1 2 / 4 F k 1 F k = lim k ( F k 1 + F k ) 2 4 F k 1 F k = = lim k F k 1 2 + 2 F k 1 F k + F k 2 4 F k 1 F k = = lim k F k 1 4 F k + 1 2 + F k 4 F k 1 = = 1 4 ϕ + 1 2 + ϕ 4 = ( ϕ + 1 ) 2 4 ϕ = ϕ 4 4 ϕ = ϕ 3 4 1.059 .
A set S of vertices of a graph G is called stable (or independent) if no two vertices from S are adjacent. The cardinality of a maximum stable set of G is the stability number of G, denoted α ( G ) . By Proposition 1, α ( G F ( k ) ) = F k for any k 1 . The size-stability tradeoff of a graph G, denoted ψ ( G ) , is the product of its size and stability number, i.e., ψ ( G ) = e ( G ) α ( G ) . Increasing the size of a graph by adding new edges results in non-increasing stability number. We consider the size-stability tradeoff for triangle-free graphs, and more specifically, for bipartite graphs. Let B n denote the class of complete bipartite graphs on n vertices and let G * B n be a graph for which ψ ( G * ) = max { ψ ( G ) : G B n } .
Lemma 1.
ψ ( G * ) = n 2 n / 3 2 n / 3 2 or ψ ( G * ) = n 2 n / 3 1 / 3 1 ( 2 n / 3 + 1 ) 2 .
Proof. 
Let G = ( V 1 , V 2 , E ) B n be a complete bipartite graph with | V 1 | | V 2 | . We have e ( G ) = ( n | V 2 | ) | V 2 | and α ( G ) = | V 2 | . Then ψ ( G ) = ( n | V 2 | ) | V 2 | 2 . To determine the value of | V 2 | which maximizes ψ ( G ) , consider the function f ( x ) = ( n x ) x 2 , 0 x n . We have f ( x ) = 2 n x 3 x 2 and f ( x ) = 2 n 6 x . Moreover, f ( x ) = 0 for x = 0 and x = 2 n / 3 . Since f ( 0 ) = 2 n > 0 and f ( 2 n / 3 ) = 2 n < 0 , f has a minimum at 0 and a maximum at 2 n / 3 . Hence, the maximum value of f on the interval [ 0 , n ] is f ( 2 n / 3 ) = ( n / 3 ) · ( 2 n / 3 ) 2 = 4 n 3 / 27 . It follows that the maximum value of the discrete function ψ ( G ) for G B n is reached for the complete bipartite graphs G = ( V 1 , V 2 , E ) with | V 1 | = n 2 n / 3 and | V 2 | = 2 n / 3 or with | V 1 | = n 2 n / 3 1 and | V 2 | = 2 n / 3 + 1 .
Then we have
e ( G ) = ( n 2 n / 3 ) 2 n / 3 and α ( G ) = 2 n / 3 , or
e ( G ) = ( n 2 n / 3 1 ) ( 2 n / 3 + 1 ) and α ( G ) = 2 n / 3 + 1 .
Then the possible maximum value for ψ ( G ) on graphs from B n is either ( n 2 n / 3 ) 2 n / 3 2 or ( n 2 n / 3 1 ) ( 2 n / 3 + 1 ) 2 . □
Theorem 1.
Let G * B F k be a graph for which ψ ( G * ) = max { ψ ( G ) : G B F k } . Then,
lim k ψ ( G * ) ψ ( G F k ) = 4 27 ϕ 4 1.015 .
Proof. 
Let G F k be a Fibonacci graph. We have e ( G F k ) = F k F k 1 and α ( G F k ) = F k , so ψ ( G F k ) = F k 2 F k 1 . From relation (1) of Lemma 1 and its proof it follows that for n = F k + 1
ψ ( G * ) = F k + 1 2 F k + 1 3 2 F k + 1 3 2 or ψ ( G * ) = F k + 1 2 F k + 1 3 1 2 F k + 1 3 + 1 2 ,
as in either case
ψ ( G * ) 4 F k + 1 3 / 27
and the value of ψ ( G * ) converges to 4 F k + 1 3 / 27 . Consequently, we obtain
lim k ψ ( G * ) ψ ( G F k ) = lim k 4 F k + 1 3 / 27 F k 2 F k 1 = lim k 4 27 ( F k + F k 1 ) 3 F k 2 F k 1 = = lim k 4 27 F k 3 + 3 F k 2 F k 1 + 3 F k F k 1 2 + F k 1 3 F k 2 F k 1 = = 4 27 ( ϕ + 3 + 3 / ϕ + 1 / ϕ 2 ) = 4 27 ϕ 3 + 3 ϕ 2 + 3 ϕ + 1 ϕ 2 = = 4 27 ( ϕ + 1 ) 3 ϕ 2 = 4 27 ϕ 6 ϕ 2 = 4 27 ϕ 4 1.015 .
Erdos et al. [35] proved that almost all triangle-free graphs are bipartite. Thus, Theorem 1 holds for almost all triangle-free graphs. An interesting question is whether Theorem 1 holds for all triangle-free graphs. To compare the size-stability tradeoff of Turán’s and Fibonacci graphs, recall that the number of edges t ( n , 2 ) and the stability number α ( T ( n , 2 ) ) of a Turán’s graph T ( n , 2 ) approach as n increases n 2 4 and n 2 , respectively, (see, e.g., [31,32]). Thus,
lim k ψ ( T ( F k + 1 , 2 ) ) = lim k ( t ( F k + 1 , 2 ) α ( F k + 1 , 2 ) ) =
= lim k F k + 1 2 4 · F k + 1 2 = lim k 1 8 F k + 1 3 .
Then
lim k ψ ( G * ) ψ ( T ( F k + 1 , 2 ) ) = 4 27 F k + 1 3 1 8 F k + 1 3 1.185 .
Thus, asymptotically the size-stability tradeoff for Fibonacci graphs is significantly closer to the maximum possible value than for T ( F k + 1 , 2 ) .

3. Fibonacci Graphs and Games

Various mathematical games involving Fibonacci numbers have been studied. In this section, we introduce a combinatorial game, called the vertex deletion game, whose analysis is related to Fibonacci graphs. For recent studies of other similar games, see [36,37,38,39] and the bibliography therein.
The game is defined on an arbitrary simple graph G = ( V , E ) and is played as follows. The vertices of G are partitioned into subsets V 1 and V 2 . Cleaning the graph means that all vertices in V 1 that do not have a neighbor in V 2 are deleted, and all vertices in V 2 that do not have a neighbor in V 1 are deleted. The following steps are repeated until no vertex can be deleted:
(1)
The graph is cleaned, and for each v V 1 , Player 1 deletes a neighbor of v in V 2 .
(2)
The graph is cleaned, and for each v V 2 , Player 2 deletes a neighbor of v in V 1 .
The player who deletes all the opponent’s vertices first wins. We now address the following questions:
1.
What is the maximum possible number of steps that one of the players must perform in order to win the game, over all graphs on n vertices and regardless of the strategy followed by the opponent?
2.
For which graphs is that maximum achieved?
Remark 1.
After the first cleaning the graph all neighbors of the remaining vertices in V 1 are in V 2 and vice versa. Thus, the remaining graph is bipartite and it clearly stands bipartite until the end of the game.
Lemma 2.
Let G = ( V 1 , V 2 , E ) be an incomplete bipartite graph and s be the maximal possible number of steps that one of the players must perform in order to win the game on G, regardless of the strategy followed by the opponent. Let there be no edge between u V 1 and v V 2 , and let G be the bipartite graph obtained from G by adding an edge u v . Then a player can win the game on G in no less than s steps, regardless of the strategy followed by the opponent.
Proof. 
Let us first remark that in the course of the game a vertex can be removed from the graph either if it has been deleted by a vertex of the opponent or after itself has deleted (at different steps of the game) all of its neighbors (and thus it would be removed after cleaning the graph from vertices with no neighbors).
In the framework of the game on graph G, we can distinguish between the following possibilities regarding vertices u and v.
(a)
At some steps u and v are deleted by their neighbors from the other part;
(b)
u is deleted at some step; at a later step v deletes its last neighbor and is removed after cleaning the graph, or survives up to the end of the game;
(c)
v deletes its last neighbor and is removed after cleaning the graph; u is deleted at a later step, or survives up to the end of the game;
(d)
u deletes its last neighbor and is removed after cleaning the graph; v deletes its last neighbor and is removed after the deletion of u upon cleaning the graph (the case where u is removed after v being symmetric).
Clearly, u and/or v can survive until the end of the game – either to be among the vertices which can delete neighbors at the last step, or to be among the vertices deleted at the last step.
Next we consider the game on G if the players use the same strategies as in the game on G. In Cases (a) and (b) the game goes in exactly the same way as on G and ends in the same number of steps. In Case (c), the edge u v remains in the graph until the deletion of u, with u being the only neighbor of v, the other neighbors being deleted in the same steps as in the game on G. Before that point, edge u v has no effect on the course of the game; after u v ’s removal, the game continues in the same way as on G and ends after the same number of steps. If vertex u survives until the end of the game, so does edge u v . If vertex u was deleted at the last step of the game on G (then Player 2 wins), then edge u v would vanish with u’s removal, as well, so the game ends in the same way and with the same number of steps as on G. If u was among vertices which remove the last opponents from V 2 (then Player 1 wins), then after cleaning G only the edge u v would remain and Player 2 would be in turn to play. It deletes u and wins the game in s + 1 steps. The analysis of Case (d) is similar to the one of Case (c). Again u v remains after all neighbors of u (different from v) are deleted and the game continues in the same way as on G. At a later point all neighbors of v (different from u) are deleted in the same steps as on G. Edge u v remains in the graph and the game proceeds in the rest of the graph in the same way as on G, as edge u v does not affect the process. After the last deletion (which is identical to the last one on G) and the following graph cleaning, only the edge u v remains. Its deletion takes one more step, so the player whose turn is to play wins in s + 1 steps. □
Theorem 2.
Let G = ( V , E ) be a simple connected graph on n vertices. Then the vertex deletion game on G terminates after at most log ϕ n + 1 stages, as the maximum number of stages is reached for Fibonacci graphs.
Proof. 
By Remark 1, the graph which remains after the first cleaning is bipartite. By Lemma 2, adding a new edge to an incomplete bipartite graph cannot decrease the number of steps in which a player can win the game, hence winning the game on a complete bipartite graph cannot take fewer steps than on an incomplete one on the same parts of vertices. Therefore, without loss of generality we can suppose that the game is played on a complete bipartite graph G = ( V 1 , V 2 , E ) , where V 1 are the vertices of Player 1 and V 2 are the vertices of Player 2, | V | = n , | V 1 | = n 1 , | V 2 | = n 2 , n = n 1 + n 2 . Note also that after each cleaning the remaining graph is still a complete bipartite graph on fewer vertices.
If n 1 n 2 and Player 1 starts first, then the game ends after the first step, as Player 1 deletes all vertices of V 2 and wins the game. Let n 1 < n 2 and Player 1 start first by deleting n 1 vertices from V 2 . Then Player 2 remains with n 2 n 1 vertices of V 2 . In turn, Player 2 removes n 2 n 1 vertices from V 1 , so after that Player 1 remains with n 1 ( n 2 n 1 ) = 2 n 1 n 2 vertices of V 1 . Thus, we obtain the following sequence of remaining numbers of vertices of the two players after consecutive game steps:
Player 1: n 1 , 2 n 1 n 2 , 5 n 1 3 n 2 , 13 n 1 8 n 2 , 34 n 1 21 n 2 , , F k + 1 n 1 F k n 2 ,
Player 2: n 2 , n 2 n 1 , 2 n 2 3 n 1 , 5 n 2 8 n 1 , 13 n 2 21 n 1 , , F k 1 n 2 F k n 1 ,
Both sequences are (possibly non-strictly) decreasing until a term of one of them, say, of Player 1, becomes equal to 0 or negative. At that point Player 2 wins. If the process of sequence generation is continued after the end of the game, the following terms of the first sequence keep decreasing (possibly, non-strictly) with negative values, while those of the second sequence start increasing (possibly, non-strictly) with positive values. Then at a certain point either F k 1 n 2 F k n 1 = 0 or F k + 1 n 1 F k n 2 = 0 , depending on whether for a fixed integer k, n 1 = F k 1 , n 2 = F k or n 1 = F k , n 2 = F k + 1 . In the former case (the latter one being symmetric) the following terms of the sequence of Player 1 keep decreasing with values F 2 , F 4 , F 6 , , while those of the sequence of Player 2 start increasing with values F 1 , F 3 , F 5 , . To see why, note that the general terms of the two sequences can, respectively, be written as F k F m + 1 F m F k + 1 = ( 1 ) m F k m with m even, and ( F k F m + 1 F m F k + 1 ) = ( 1 ) m + 1 F k m with m odd. The above equalities follow from the well-known d’Ocagne’s identity (see [2]).
It is easy to see that the game termination takes a maximum number log ϕ n + 1 of steps when n 1 and n 2 are two consecutive Fibonacci numbers. As a matter of fact, the steps of the considered game resemble the steps of the Euclidean algorithm performed on numbers n 1 and n 2 until a quotient of division happens to be greater than or equal to 2. At the next step the game terminates, as the player in turn has at least as many vertices as the opponent, and thus can delete all opponent’s vertices in one step. Still in the remote 1844 Gabriel Lamé [40] proved that the number of steps needed to compute the greatest common divisor of two integers a, b less than an integer n is less than or equal to M = ln n + ln 5 ln ϕ , as this upper bound is reached if a and b are two consecutive Fibonacci numbers. We have
M = log ϕ n / log ϕ e + log ϕ 5 / l o g ϕ e log ϕ ϕ / log ϕ e = = log ϕ n + log ϕ 5 = = log ϕ n + 1.67228 . . . < log ϕ n + 1 + 0.673 .
Since for the considered vertex deletion game the maximum possible number of steps s is integer, it follows that s log ϕ n + 1 .
Thus, vertex deletion game with a maximum number of steps is the one played on a Fibonacci graph G F ( k ) ( V , E ) on n = F k + 1 vertices. If Player 1 starts first, then after no more than log ϕ n + 1 steps one of the two players wins the game. More precisely, let n 1 = F k 1 , n 2 = F k , k = 2 , 3 , . Then, if k 1 is odd, Player 1 wins, otherwise Player 2 wins, as the winner has exactly one survived vertex in either case. □

4. Conclusions

In this paper, we defined Fibonacci graphs and studied their properties. In particular, we showed that Fibonacci graphs appear to be simple complete bipartite graph. We showed that the Fibonacci graphs are close in size to the notorious Turán graphs which are extremal in terms of graph size. We defined size-stability tradeoff of graphs and showed that for Fibonacci graphs this characteristic is very close to the maximum possible. We also introduced a vertex deletion game on graphs and showed that the maximum possible number of game stages is reached on Fibonacci graphs. It illustrates how Fibonacci graphs can be used to obtain bounds on the time complexity of problems defined on graphs. Studying other properties of Fibonacci graphs is seen as an engaging future task.

Author Contributions

Conceptualization, V.E.B.; formal analysis, V.E.B.; methodology, V.E.B.; validation, V.E.B. and R.P.B.; investigation, V.E.B.; writing—original draft preparation, V.E.B. and R.P.B.; resources, V.E.B. and R.P.B.; writing—review and editing, V.E.B. and R.P.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

The authors thank the four anonymous referees for their useful comments and suggestions, which helped us improve the presentation.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Koshy, T. Fibonacci and Lucas Numbers With Applications; John Wiley & Sons: New York, NY, USA, 2001. [Google Scholar]
  2. Vajda, S. Fibonacci and Lucas Numbers, and the Golden Section: Theory and Applications; Dover Publications, Inc.: Mineola, NY, USA, 2008. [Google Scholar]
  3. Bicknell, M. Primer on Pell sequence and related sequences. Fibonacci Q. 1975, 13, 345. [Google Scholar]
  4. Padovan, R.; van der Laan, H. Dom Hans van der Laan: Modern Primitive; Architectura & Natura Press: Amsterdam, The Netherlands, 1994. [Google Scholar]
  5. Stewart, I. Tales of a neglected number. Sci. Am. 1996, 274, 102–103. [Google Scholar] [CrossRef]
  6. Perrin, R. Query 1484. L’Intermédiaire Des Math. 1899, 6, 76. [Google Scholar]
  7. Horadam, A.; Mahon, J. Pell and Pell-Lucas polynomials. Fibonacci Q. 1985, 23, 7–20. [Google Scholar]
  8. Ricci, P.E. Generalized Lucas polynomials and Fibonacci polynomials. Riv. Mat. Della Univ. Parma 1995, 4, 137–146. [Google Scholar]
  9. Apostolico, A. Optimal parallel detection of squares in strings. Algorithmica 1992, 8, 285–319. [Google Scholar] [CrossRef]
  10. Apostolico, A.; Breslauer, D. An optimal O(loglogN)-time parallel algorithm for detecting all squares in a string. Siam J. Comput. 1996, 25, 1318–1331. [Google Scholar] [CrossRef] [Green Version]
  11. Apostolico, A.; Brimkov, V.E. Fibonacci arrays and their two-dimensional repetitions. Theor. Comput. Sci. 2000, 237, 263–273. [Google Scholar] [CrossRef]
  12. Apostolico, A.; Preparata, F.P. Optimal off-line detection of repetitions in a string. Theor. Comput. Sci. 1983, 22, 297–315. [Google Scholar] [CrossRef] [Green Version]
  13. Breslauer, D.; Galil, Z. An optimal O(loglogn) time parallel string matching algorithm. Siam J. Comput. 1990, 19, 1051–1058. [Google Scholar] [CrossRef] [Green Version]
  14. Crochemore, M. An optimal algorithm for computing the repetitions in a word. Inf. Process. Lett. 1981, 12, 244–250. [Google Scholar] [CrossRef]
  15. De Luca, A. Some extremal properties of the Fibonacci word. Int. J. Algebra Comput. 2013, 23, 705–728. [Google Scholar] [CrossRef]
  16. Golumbic, M.C.; Perl, Y. Generalized Fibonacci maximum path graphs. Discret. Math. 1979, 28, 237–245. [Google Scholar] [CrossRef] [Green Version]
  17. Hsu, W.J.; Page, C.; Liu, J.S. Fibonacci cubes—A class of self-similar graphs. Fibonacci Q. 1993, 31, 65–72. [Google Scholar]
  18. Hsu, W.J. Fibonacci Cubes—A New Computer Architecture for Parallel Processing; Technical Report CPS-90-04; Michigan State University: East Lansing, MI, USA, 1990. [Google Scholar]
  19. Liu, J.; Hsu, W.J. On Embedding Rings and Meshes in Fibonacci Cubes; Technical Report CPS-91-01; Michigan State University: East Lansing, MI, USA, 1991. [Google Scholar]
  20. Hsu, W.J. Fibonacci cubes—A new interconnection technology. IEEE Trans. Parallel Distrib. Syst. 1993, 4, 3–12. [Google Scholar] [CrossRef]
  21. Stojmenovic, I. Optimal deadlock-free routing and broadcasting on Fibonacci cube networks. Util. Math. 1998, 159–166. [Google Scholar]
  22. Klavzar, S.; Zigert, P. Fibonacci cubes are the resonance graphs of Fibonaccenes. Fibonacci Q. 2005, 43, 269–276. [Google Scholar]
  23. Yurttas Gunes, A.; Delen, S.; Demirci, M.; Cevik, A.S.; Cangul, I.N. Fibonacci graphs. Symmetry 2020, 12, 1383. [Google Scholar] [CrossRef]
  24. Khadri, S.K.A.; Samanta, D.; Paul, M. Approach of message communication using Fibonacci series: In cryptology. Lect. Notes Inf. Theory 2014, 2, 168–171. [Google Scholar] [CrossRef]
  25. Raphael, A.J.; Sundaram, V. Secured communication through Fibonacci numbers and Unicode symbols. Int. J. Sci. Eng. Res. 2012, 3, 1–5. [Google Scholar]
  26. Sathish, S.; Uma Maheswari, S. Application of complete bipartite graph in anti-theft network. Int. J. Sci. Res. 2015, 4, 712–714. [Google Scholar]
  27. Arunkumar, B.R.; Komala, R. Applications of bipartite graph in diverse fields including cloud computing. Int. J. Mod. Eng. Res. 2015, 5, 1–7. [Google Scholar]
  28. Pavlopoulos, G.A.; Kontou, P.I.; Pavlopoulou, A.; Bouyioukos, C.; Markou, E.; Bagos, P.G. Bipartite graphs in systems biology and medicine: A survey of methods and applications. GigaScience 2018, 7, giy014. [Google Scholar] [CrossRef]
  29. Chandrasekaran, V.M.; Praba, B.; Manimaran, A.; Kailash, G. Data transfer using complete bipartite graph. IOP Conf. Ser. Mater. Sci. Eng. 2017, 263, 042120. [Google Scholar] [CrossRef]
  30. Asratian, A.S.; Denley, T.M.; Häggkvist, R. Bipartite Graphs and Their Applications; Cambridge University Press: Cambridge, UK, 1998; Volume 131. [Google Scholar]
  31. Turán, P. On an extremal problem in graph theory. Mat. Fiz. Lapok 1941, 48, 436–452. [Google Scholar]
  32. Aigner, M. Turán’s graph theorem. Am. Math. Mon. 1995, 102, 808–816. [Google Scholar]
  33. Erdos, P. On the graph theorem of Turán. Mat. Lapok 1970, 21, 10. [Google Scholar]
  34. Mantel, W. Problem 28. Wiskd. Opgaven 1906, 10, 60–61. [Google Scholar]
  35. Erdos, P.; Kleitman, D.; Rothschild, B. Asymptotic enumeration of Kn-free graphs. In Atti del Coll. Int. sulle Teorie Comb.; Accademia Nazionale dei Lincei: Rome, Italy, 1976; Volume 2, pp. 19–27. [Google Scholar]
  36. Krüger, O. Analysis of odd\odd vertex removal games on special graphs. arXiv 2013, arXiv:1304.7997. [Google Scholar]
  37. Krüger, O. Note on odd\odd vertex removal games on bipartite graphs. Integers Electron. J. Comb. Number Theory 2014, 14, G07. [Google Scholar]
  38. O’Sullivan, C. A vertex and edge deletion game on graphs. Integers Electron. J. Comb. Number Theory 2018, 18, G03. [Google Scholar]
  39. Nowakowski, R.J.; Ottaway, P. Vertex deletion games with parity rules. Integers Electron. J. Comb. Number Theory 2005, 5, A15. [Google Scholar]
  40. Honsberger, R. A theorem of Gabriel Lamé. In Mathematical Gems II; Mathematical Association of America: Washington, DC, USA, 1976; Chapter 7; pp. 54–57. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Brimkov, V.E.; Barneva, R.P. A Class of Fibonacci Matrices, Graphs, and Games. Mathematics 2022, 10, 4038. https://doi.org/10.3390/math10214038

AMA Style

Brimkov VE, Barneva RP. A Class of Fibonacci Matrices, Graphs, and Games. Mathematics. 2022; 10(21):4038. https://doi.org/10.3390/math10214038

Chicago/Turabian Style

Brimkov, Valentin E., and Reneta P. Barneva. 2022. "A Class of Fibonacci Matrices, Graphs, and Games" Mathematics 10, no. 21: 4038. https://doi.org/10.3390/math10214038

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop