Graph Theory: Advanced Algorithms and Applications

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Computational and Applied Mathematics".

Deadline for manuscript submissions: 30 June 2024 | Viewed by 7620

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, Chaoyang University of Technology, Wufeng, Taichung 413310, Taiwan
Interests: graph algorithms; linux system; applications for smart phones; security on IoT
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Graph theory has grown into a significant area of mathematical research, with applications in computer network architecture, electronic circuits, interpersonal graphs, social network analysis, and many other areas that require fast algorithms for various optimization problems. For this Special Issue, we welcome all research papers on the mathematical, computational, and applied aspects of graph theory.

We invite contributions of original research to this Special Issue, “Graph Theory: Advanced Algorithms and Applications”, which aims to report and review recent developments concerning graph theory and discrete mathematics, covering the whole range of this field from theory to applications.

Prof. Dr. Ruo-Wei Hung
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • graph algorithms and theory
  • discrete applied mathematics
  • theoretical computer science
  • approximation algorithms
  • interconnection networks
  • time complexity analysis
  • big data model and analysis

Published Papers (9 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

11 pages, 385 KiB  
Article
Rainbow Connection Numbers of WK-Recursive Networks and WK-Recursive Pyramids
by Fu-Hsing Wang and Cheng-Ju Hsu
Mathematics 2024, 12(7), 944; https://doi.org/10.3390/math12070944 - 22 Mar 2024
Viewed by 381
Abstract
An edge coloring of a graph G results in G being rainbow connected when every pair of vertices is linked by a rainbow path. Such a path is defined as one where each edge possesses a distinct color. A rainbow coloring refers to [...] Read more.
An edge coloring of a graph G results in G being rainbow connected when every pair of vertices is linked by a rainbow path. Such a path is defined as one where each edge possesses a distinct color. A rainbow coloring refers to an edge coloring that guarantees the rainbow connectedness of G. The rainbow connection number of G represents the smallest quantity of colors required to achieve rainbow connectedness under a rainbow coloring scheme. Wang and Hsu (ICICM 2019: 75–79) provided upper bounds on the size of the rainbow connection numbers in WK-recursive networks WKd,t and WK-recursive pyramids WKPd,n. In this paper, we revise their results and determine the exact values of the rainbow connection numbers of WKd,2 for d=3 and 4. The rainbow connection numbers of WKd,2 are bounded between 4 and d2+2 for d>4. In addition to our previous findings, we further investigate and determine upper bounds for the size of the rainbow connection numbers of WKPd,n. This involves analyzing various aspects of the graph structure and exploring potential limitations on the rainbow connection numbers. By establishing these upper bounds, we gain deeper insights into the potential range and constraints of the rainbow connection numbers within the given context. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

20 pages, 2383 KiB  
Article
An Efficient GNSS Coordinate Classification Strategy with an Adaptive KNN Algorithm for Epidemic Management
by Jong-Shin Chen and Chun-Ming Kuo
Mathematics 2024, 12(4), 536; https://doi.org/10.3390/math12040536 - 08 Feb 2024
Viewed by 480
Abstract
In times of widespread epidemics, numerous individuals are at risk of contracting viruses, such as COVID-19, monkeypox, and pneumonia, leading to a ripple effect of impacts on others. Consequently, the Centers for Disease Control (CDC) typically devises strategies to manage the situation by [...] Read more.
In times of widespread epidemics, numerous individuals are at risk of contracting viruses, such as COVID-19, monkeypox, and pneumonia, leading to a ripple effect of impacts on others. Consequently, the Centers for Disease Control (CDC) typically devises strategies to manage the situation by monitoring and tracing the infected individuals and their areas. For convenience, “targets” and “areas” represent the following individuals and areas. A global navigation satellite system (GNSS) can assist in evaluating the located areas of the targets with pointing-in-polygon (PIP) related technology. When there are many targets and areas, relying solely on PIP technology for classification from targets to areas could be more efficient. The classification technique of k-nearest neighbors (KNN) classification is widely utilized across various domains, offering reliable classification accuracy. However, KNN classification requires a certain quantity of targets with areas (training dataset) for execution, and the size of the training dataset and classification time often exhibit an exponential relationship. This study presents a strategy for applying KNN technology to classify targets into areas. Additionally, within the strategy, we propose an adaptive KNN algorithm to enhance the efficiency of the classification procedure. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

18 pages, 517 KiB  
Article
A Validation of the Phenomenon of Linearly Many Faults on Burnt Pancake Graphs with Its Applications
by Mei-Mei Gu, Hong-Xia Yan and Jou-Ming Chang
Mathematics 2024, 12(2), 268; https://doi.org/10.3390/math12020268 - 14 Jan 2024
Viewed by 509
Abstract
“Linearly many faults” is a phenomenon observed by Cheng and Lipták in which a specific structure emerges when a graph is disconnected and often occurs in various interconnection networks. This phenomenon means that if a certain number of vertices or edges are deleted [...] Read more.
“Linearly many faults” is a phenomenon observed by Cheng and Lipták in which a specific structure emerges when a graph is disconnected and often occurs in various interconnection networks. This phenomenon means that if a certain number of vertices or edges are deleted from a graph, the remaining part either stays connected or breaks into one large component along with smaller components with just a few vertices. This phenomenon can be observed in many types of graphs and has important implications for network analysis and optimization. In this paper, we first validate the phenomenon of linearly many faults for surviving graph of a burnt pancake graph BPn when removing any edge subset with a size of approximately six times λ(BPn). For graph G, the -component edge connectivity denoted as λ(G) (resp., the -extra edge connectivity denoted as λ()(G)) is the cardinality of a minimum edge subset S such that GS is disconnected and has at least components (resp., each component of GS has at least +1 vertices). Both λ(G) and eλ()(G) are essential metrics for network reliability assessment. Specifically, from the property of “linearly many faults”, we may further prove that λ5(BPn)=λ(3)(BPn)+3=4n3 for n5; λ6(BPn)=λ(4)(BPn)+4=5n4 and λ7(BPn)=λ(5)(BPn)+5=6n5 for n6. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

12 pages, 468 KiB  
Article
Two Combinatorial Algorithms for the Constrained Assignment Problem with Bounds and Penalties
by Guojun Hu, Junran Lichen and Pengxiang Pan
Mathematics 2023, 11(24), 4883; https://doi.org/10.3390/math11244883 - 06 Dec 2023
Viewed by 609
Abstract
In the paper, we consider a generalization of the classical assignment problem, which is called the constrained assignment problem with bounds and penalties (CA-BP). Specifically, given a set of machines and a set of independent jobs, each machine has a lower and upper [...] Read more.
In the paper, we consider a generalization of the classical assignment problem, which is called the constrained assignment problem with bounds and penalties (CA-BP). Specifically, given a set of machines and a set of independent jobs, each machine has a lower and upper bound on the number of jobs that can be executed, and each job must be either executed on some machine with a given processing time or rejected with a penalty that we must pay for. No job can be executed on more than one machine. We aim to find an assignment scheme for these jobs that satisfies the constraints mentioned above. The objective is to minimize the total processing time of executed jobs as well as the penalties from rejected jobs. The CA-BP is related to some practical applications such as edge computing, which involves selecting tasks and processing them on the edge servers of an internet network. As a result, a motivation of this study is to improve the efficiency of internet networks by limiting the lower bound of the number of objects processed by each edge server. Our main contribution is modifying the previous network flow algorithms to satisfy the lower capacity constraints, for which we design two exact combinatorial algorithms to solve the CA-BP. Our methodologies and results bring novel perspectives into other research areas related to the assignment problem. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

17 pages, 733 KiB  
Article
Edge-Based Minimal k-Core Subgraph Search
by Ting Wang, Yu Jiang, Jianye Yang and Lei Xing
Mathematics 2023, 11(15), 3407; https://doi.org/10.3390/math11153407 - 04 Aug 2023
Viewed by 884
Abstract
In social networks, k-core is commonly used to measure the stability of a network. When a user in a k-core leaves the network, other users may follow the user to leave. Hence, maintaining a key user is important to keep the [...] Read more.
In social networks, k-core is commonly used to measure the stability of a network. When a user in a k-core leaves the network, other users may follow the user to leave. Hence, maintaining a key user is important to keep the stability of a network. It is known that an edge between two users models the relationship between the two users. In some scenarios, maintaining a relationship comes at a cost. Therefore, selectively in maintaining the relationships between users is crucial. In this paper, we for the first time conceive the concept of an edge-based minimal k-core model. An edge-based minimal k-core is a k-core with a minimal number of edges. In other words, removing any edge in an edge-based minimal k-core would make it not be a k-core any more. Based on this model, we proposed two problems, namely, an edge-based minimal k-core subgraph search (EMK-SS) and an edge-based minimal k-core subgraph search with a query node q (EMK-q-SS). Given a graph G, an integer k, and a query node (a key user) q, the EMK-q-SS problem is to find all the edge-based minimal k-cores containing the query node q, and the EMK-SS problem is to find all the edge-based minimal k-cores. We also theoretically prove that the two problems are both NP-complete. To deal with the proposed problems, we design two novel algorithms, namely the edge deletion algorithm and edge extension algorithm. Further, a graph partitioning technique is employed to speed up the computation. Comprehensive experiments on synthetic and real networks are conducted to demonstrate the effect and efficiency of our proposed methods. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

14 pages, 1278 KiB  
Article
Cycle Existence for All Edges in Folded Hypercubes under Scope Faults
by Che-Nan Kuo and Yu-Huei Cheng
Mathematics 2023, 11(15), 3391; https://doi.org/10.3390/math11153391 - 03 Aug 2023
Viewed by 512
Abstract
The reliability of large-scale networks can be compromised by various factors such as natural disasters, human-induced incidents such as hacker attacks, bomb attacks, or even meteorite impacts, which can lead to failures in scope of processors or links. Therefore, ensuring fault tolerance in [...] Read more.
The reliability of large-scale networks can be compromised by various factors such as natural disasters, human-induced incidents such as hacker attacks, bomb attacks, or even meteorite impacts, which can lead to failures in scope of processors or links. Therefore, ensuring fault tolerance in the interconnection network is vital to maintaining system reliability. The n-dimensional folded hypercube network structure, denoted as FQn, is constructed by adding an edge between every pair of vertices with complementary addresses from an n-dimensional hypercube, Qn. Notably, FQn exhibits distinct characteristics based on the dimensionality: it is bipartite for odd integers n3 and non-bipartite for even integers n2. Recently, in terms of the issue of how FQn performs in communication under regional or widespread destruction, we mentioned that in FQn, even when a pair of adjacent vertices encounter errors, any fault-free edge can still be embedded in cycles of various lengths. Additionally, even when the smallest communication ring experiences errors, it is still possible to embed cycles of any length. The smallest communication ring in FQn is observed to be the four-cycle ring. In order to further investigate the communication capabilities of FQn, we further discuss whether every fault-free edge will still be a part of every communication ring with different lengths when the smallest communication ring is compromised in FQn. In this study, we consider a fault-free edge e=(u,v) and F4={f1, f2,f3, f4} as the set of faulty extreme vertices for any four cycles in FQn. Our research focuses on investigating the cycle-embedding properties in FQnF4, where the fault-free edges play a significant role. The following properties are demonstrated: (1) For n4 in FQnF4, every even length cycle with a length ranging from 4 to 2n4 contains a fault-free edge e; (2) For every even n4 in FQnF4, every odd length cycle with a length ranging from n+1 to 2n5 contains a fault-free edge e. These findings provide insights into the cycle-embedding capabilities of FQn, specifically in the context of fault tolerance when considering certain sets of faulty vertices. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

33 pages, 594 KiB  
Article
Clique Transversal Variants on Graphs: A Parameterized-Complexity Perspective
by Chuan-Min Lee
Mathematics 2023, 11(15), 3325; https://doi.org/10.3390/math11153325 - 28 Jul 2023
Viewed by 648
Abstract
The clique transversal problem and its variants have garnered significant attention in the last two decades due to their practical applications in communication networks, social-network theory and transceiver placement for cellular telephones. While previous research primarily focused on determining the polynomial-time solvability or [...] Read more.
The clique transversal problem and its variants have garnered significant attention in the last two decades due to their practical applications in communication networks, social-network theory and transceiver placement for cellular telephones. While previous research primarily focused on determining the polynomial-time solvability or NP-hardness/NP-completeness of specific graphs, this paper adopts a parameterized-complexity approach. It thoroughly explores four clique transversal variants: the d-fold transversal problem, the {d}-clique transversal problem, the signed clique transversal problem and the minus clique transversal problem. The paper presents various findings regarding the parameterized complexity of the clique transversal problem and its variants. It establishes the W[2]-completeness and para-NP-completeness of the d-fold transversal problem, the {d}-clique transversal problem, the signed clique transversal problem and the minus clique transversal problem within specific graph classes. Additionally, it introduces fixed-parameter tractable algorithms for planar graphs and graphs with bounded treewidth, offering efficient solutions for these specific instances of the problems. The research further explores the relationship between planar graphs and graphs with bounded treewidth to enhance the time complexity of the d-fold clique transversal problem and the {d}-clique transversal problem. By analyzing the parameterized complexity of the clique transversal problem and its variants, this research contributes to our understanding of the computational limitations and potentially efficient algorithms for solving these problems. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

26 pages, 1096 KiB  
Article
The Longest (s, t)-Path Problem on O-Shaped Supergrid Graphs
by Fatemeh Keshavarz-Kohjerdi and Ruo-Wei Hung
Mathematics 2023, 11(12), 2712; https://doi.org/10.3390/math11122712 - 15 Jun 2023
Cited by 1 | Viewed by 1560
Abstract
The longest (s,t)-path problem on supergrid graphs is known to be NP-complete. However, the complexity of this problem on supergrid graphs with or without holes is still unknown.In the past, we presented linear-time algorithms for solving the longest [...] Read more.
The longest (s,t)-path problem on supergrid graphs is known to be NP-complete. However, the complexity of this problem on supergrid graphs with or without holes is still unknown.In the past, we presented linear-time algorithms for solving the longest (s,t)-path problem on L-shaped and C-shaped supergrid graphs, which form subclasses of supergrid graphs without holes. In this paper, we will determine the complexity of the longest (s,t)-path problem on O-shaped supergrid graphs, which form a subclass of supergrid graphs with holes. These graphs are rectangular supergrid graphs with rectangular holes. It is worth noting that O-shaped supergrid graphs contain L-shaped and C-shaped supergrid graphs as subgraphs, but there is no inclusion relationship between them. We will propose a linear-time algorithm to solve the longest (s,t)-path problem on O-shaped supergrid graphs. The longest (s,t)-paths of O-shaped supergrid graphs have applications in calculating the minimum trace when printing hollow objects using computer embroidery machines and 3D printers. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

14 pages, 308 KiB  
Article
An Algorithm for the Numbers of Homomorphisms from Paths to Rectangular Grid Graphs
by Hatairat Yingtaweesittikul, Sayan Panma and Penying Rochanakul
Mathematics 2023, 11(11), 2587; https://doi.org/10.3390/math11112587 - 05 Jun 2023
Viewed by 895
Abstract
Let G and H be graphs. A mapping f from the vertices of G to the vertices of H is known as a homomorphism from G to H if, for every pair [...] Read more.
Let G and H be graphs. A mapping f from the vertices of G to the vertices of H is known as a homomorphism from G to H if, for every pair of adjacent vertices x and y in G, the vertices f(x) and f(y) are adjacent in H. A rectangular grid graph is the Cartesian product of two path graphs. In this paper, we provide a formula to determine the number of homomorphisms from paths to rectangular grid graphs. This formula gives the solution to the problem concerning the number of walks in the rectangular grid graphs. Full article
(This article belongs to the Special Issue Graph Theory: Advanced Algorithms and Applications)
Show Figures

Figure 1

Back to TopTop