Pub Date : 2025-01-23DOI: 10.1016/j.amc.2025.129301
Monika Suchomelová, Michal Beneš, Miroslav Kolář
The article analyzes behavior of the solution of the hyperbolic curvature flow by means of a class of analytical solutions and by computational studies performed by a semi-discrete finite-volume scheme. A class of analytical solutions is derived and used for the verification of the computational algorithm by numerical convergence to it. An original tangential redistribution is proposed to stabilize the numerical scheme. Its derivation requires a four-dimensional transformation of the evolution law. The role of tangential redistribution is demonstrated on computational examples. Computational studies show evolution of the initially convex and non-convex curves, and include cases when singularities predicted by theory start to develop.
{"title":"Computational aspects of hyperbolic curvature flow","authors":"Monika Suchomelová, Michal Beneš, Miroslav Kolář","doi":"10.1016/j.amc.2025.129301","DOIUrl":"10.1016/j.amc.2025.129301","url":null,"abstract":"<div><div>The article analyzes behavior of the solution of the hyperbolic curvature flow by means of a class of analytical solutions and by computational studies performed by a semi-discrete finite-volume scheme. A class of analytical solutions is derived and used for the verification of the computational algorithm by numerical convergence to it. An original tangential redistribution is proposed to stabilize the numerical scheme. Its derivation requires a four-dimensional transformation of the evolution law. The role of tangential redistribution is demonstrated on computational examples. Computational studies show evolution of the initially convex and non-convex curves, and include cases when singularities predicted by theory start to develop.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129301"},"PeriodicalIF":3.5,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-23DOI: 10.1016/j.amc.2025.129314
Shangzhao Li , Xiran Zhang , Jing Chen , Shaojun Dai
Let G act block-transitively on a design. If G is solvable, then (1) if , then , , where ; (2) if , then , , where and .
{"title":"A note on block-transitive 2 − (v,k,1) designs","authors":"Shangzhao Li , Xiran Zhang , Jing Chen , Shaojun Dai","doi":"10.1016/j.amc.2025.129314","DOIUrl":"10.1016/j.amc.2025.129314","url":null,"abstract":"<div><div>Let <em>G</em> act block-transitively on a <span><math><mn>2</mn><mo>−</mo><mo>(</mo><mi>v</mi><mo>,</mo><mn>12</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span> design. If <em>G</em> is solvable, then (1) if <span><math><mn>3</mn><mo>|</mo><mi>v</mi></math></span>, then <span><math><mi>v</mi><mo>=</mo><msup><mrow><mn>3</mn></mrow><mrow><mi>n</mi></mrow></msup></math></span>, <span><math><mi>G</mi><mo>≤</mo><mi>A</mi><mi>Γ</mi><mi>L</mi><mo>(</mo><mn>1</mn><mo>,</mo><msup><mrow><mn>3</mn></mrow><mrow><mi>n</mi></mrow></msup><mo>)</mo></math></span>, where <span><math><msup><mrow><mi>p</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>≡</mo><mn>1</mn><mspace></mspace><mo>(</mo><mrow><mi>mod</mi></mrow><mspace></mspace><mn>44</mn><mo>)</mo></math></span>; (2) if <span><math><mn>3</mn><mo>∤</mo><mi>v</mi></math></span>, then <span><math><mi>v</mi><mo>=</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>n</mi></mrow></msup></math></span>, <span><math><mi>G</mi><mo>≤</mo><mi>A</mi><mi>Γ</mi><mi>L</mi><mo>(</mo><mn>1</mn><mo>,</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>)</mo></math></span>, where <span><math><mi>p</mi><mo>≠</mo><mn>2</mn></math></span> and <span><math><msup><mrow><mi>p</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>≡</mo><mn>1</mn><mspace></mspace><mo>(</mo><mrow><mi>mod</mi></mrow><mspace></mspace><mn>132</mn><mo>)</mo></math></span>.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129314"},"PeriodicalIF":3.5,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-23DOI: 10.1016/j.amc.2025.129310
Marcin Stawiski
Call a vertex or an edge colouring of a graph distinguishing, if is not preserved by any non-identity automorphism. For a graph H, we say that a graph G is H-free if there is no induced subgraph of G, which is isomorphic to H. Gorzkowska, Kargul, Musiał and Pal proved that for every natural number n greater than 2 each finite connected -free graph on at least six vertices has a distinguishing edge colouring using at most colours. We extend this result to all locally finite connected -free graphs on at least six vertices.
{"title":"Distinguishing infinite star-free graphs","authors":"Marcin Stawiski","doi":"10.1016/j.amc.2025.129310","DOIUrl":"10.1016/j.amc.2025.129310","url":null,"abstract":"<div><div>Call a vertex or an edge colouring of a graph <em>distinguishing</em>, if is not preserved by any non-identity automorphism. For a graph <em>H</em>, we say that a graph <em>G</em> is <em>H-free</em> if there is no induced subgraph of <em>G</em>, which is isomorphic to <em>H</em>. Gorzkowska, Kargul, Musiał and Pal proved that for every natural number <em>n</em> greater than 2 each finite connected <span><math><msub><mrow><mi>K</mi></mrow><mrow><mn>1</mn><mo>,</mo><mi>n</mi></mrow></msub></math></span>-free graph on at least six vertices has a distinguishing edge colouring using at most <span><math><mi>n</mi><mo>−</mo><mn>1</mn></math></span> colours. We extend this result to all locally finite connected <span><math><msub><mrow><mi>K</mi></mrow><mrow><mn>1</mn><mo>,</mo><mi>n</mi></mrow></msub></math></span>-free graphs on at least six vertices.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129310"},"PeriodicalIF":3.5,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-23DOI: 10.1016/j.amc.2025.129306
K.R. Arun , A. Krishnamurthy, H. Maharna
In this work, we design and analyze an asymptotic preserving (AP), semi-implicit finite volume scheme for the scaled compressible isentropic Euler system with a singular pressure law known as the congestion pressure law. The congestion pressure law imposes a maximal density constraint of the form , and the scaling introduces a small parameter ε in order to control the stiffness of the density constraint. As , the solutions of the compressible system converge to solutions of the so-called free-congested Euler equations that couples compressible and incompressible dynamics. We show that the proposed scheme is positivity preserving and energy stable. In addition, we also show that the numerical densities satisfy a discrete variant of the constraint. By means of extensive numerical case studies, we verify the efficacy of the scheme and show that the scheme is able to capture the two dynamics in the limiting regime, thereby proving the AP property.
{"title":"An asymptotic preserving and energy stable scheme for the Euler system with congestion constraint","authors":"K.R. Arun , A. Krishnamurthy, H. Maharna","doi":"10.1016/j.amc.2025.129306","DOIUrl":"10.1016/j.amc.2025.129306","url":null,"abstract":"<div><div>In this work, we design and analyze an asymptotic preserving (AP), semi-implicit finite volume scheme for the scaled compressible isentropic Euler system with a singular pressure law known as the congestion pressure law. The congestion pressure law imposes a maximal density constraint of the form <span><math><mn>0</mn><mo>≤</mo><mi>ϱ</mi><mo><</mo><mn>1</mn></math></span>, and the scaling introduces a small parameter <em>ε</em> in order to control the stiffness of the density constraint. As <span><math><mi>ε</mi><mo>→</mo><mn>0</mn></math></span>, the solutions of the compressible system converge to solutions of the so-called free-congested Euler equations that couples compressible and incompressible dynamics. We show that the proposed scheme is positivity preserving and energy stable. In addition, we also show that the numerical densities satisfy a discrete variant of the constraint. By means of extensive numerical case studies, we verify the efficacy of the scheme and show that the scheme is able to capture the two dynamics in the limiting regime, thereby proving the AP property.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129306"},"PeriodicalIF":3.5,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-23DOI: 10.1016/j.amc.2025.129309
Qianxi Yang, Yanlong Yang
In human society, various factors influence decision-making, including memory, reputation, aspiration, etc. In recent years, research has increasingly focused on considering these factors and designing mechanisms to promote cooperation. However, few previous studies have simultaneously considered the effects of memory and reputation on cooperative evolution. Additionally, research on cooperation evolution based on memory mechanisms often focuses either on the strategy stability of the players themselves or on the strategy stability of the learning objects, but not both. Our study introduces an update mechanism based on combinatorial memory and high-reputation learning objects. This mechanism accounts for reputation and memory, where the memory effect includes the strategy stability of both the players and the learning objects. Specifically, at the stage of selecting learning objects, players prefer high-reputation individuals. We introduce a global selection weight, η, which allows players to select learning objects not only locally but also globally. At the stage of updating the strategy, each player simultaneously considers their own historical memory and the memory of their learning objects, with the parameter γ representing the memory weight of the learning objects. Monte Carlo simulations show that update rules that simultaneously consider both combinatorial memory and high-reputation learning objects are more effective in promoting cooperation than considering either factor alone. Furthermore, a small memory weight of the learning objects and a small global selection weight create an optimal environment for cooperation. Our study offers a novel approach to addressing social dilemmas and mitigating defection, emphasizing the critical roles of reputation and memory in the propagation of altruistic behavior.
{"title":"Effects of an update mechanism based on combinatorial memory and high-reputation learning objects on the evolution of cooperation","authors":"Qianxi Yang, Yanlong Yang","doi":"10.1016/j.amc.2025.129309","DOIUrl":"10.1016/j.amc.2025.129309","url":null,"abstract":"<div><div>In human society, various factors influence decision-making, including memory, reputation, aspiration, etc. In recent years, research has increasingly focused on considering these factors and designing mechanisms to promote cooperation. However, few previous studies have simultaneously considered the effects of memory and reputation on cooperative evolution. Additionally, research on cooperation evolution based on memory mechanisms often focuses either on the strategy stability of the players themselves or on the strategy stability of the learning objects, but not both. Our study introduces an update mechanism based on combinatorial memory and high-reputation learning objects. This mechanism accounts for reputation and memory, where the memory effect includes the strategy stability of both the players and the learning objects. Specifically, at the stage of selecting learning objects, players prefer high-reputation individuals. We introduce a global selection weight, <em>η</em>, which allows players to select learning objects not only locally but also globally. At the stage of updating the strategy, each player simultaneously considers their own historical memory and the memory of their learning objects, with the parameter <em>γ</em> representing the memory weight of the learning objects. Monte Carlo simulations show that update rules that simultaneously consider both combinatorial memory and high-reputation learning objects are more effective in promoting cooperation than considering either factor alone. Furthermore, a small memory weight of the learning objects and a small global selection weight create an optimal environment for cooperation. Our study offers a novel approach to addressing social dilemmas and mitigating defection, emphasizing the critical roles of reputation and memory in the propagation of altruistic behavior.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129309"},"PeriodicalIF":3.5,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is devoted to the theoretical and numerical analysis of the null controllability of a coupled ODE-heat system internally and at the boundary with Neumann boundary control. First, we establish the null controllability of the ODE-heat with distributed control using Carleman estimates. Then, we conclude by the strategy of space domain extension. Finally, we illustrate the analysis with some numerical experiments.
{"title":"Null controllability of an ODE-heat system with coupled boundary and internal terms","authors":"Idriss Boutaayamou , Fouad Et-tahri , Lahcen Maniar","doi":"10.1016/j.amc.2025.129303","DOIUrl":"10.1016/j.amc.2025.129303","url":null,"abstract":"<div><div>This paper is devoted to the theoretical and numerical analysis of the null controllability of a coupled ODE-heat system internally and at the boundary with Neumann boundary control. First, we establish the null controllability of the ODE-heat with distributed control using Carleman estimates. Then, we conclude by the strategy of space domain extension. Finally, we illustrate the analysis with some numerical experiments.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129303"},"PeriodicalIF":3.5,"publicationDate":"2025-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-22DOI: 10.1016/j.amc.2025.129308
Pengcheng Zhang , Yajuan Liu , Shiyu Jiao , Chen Yang
This paper mainly investigates the observer-based non-fragile control issue for a class of T-S fuzzy switched systems under cyber attacks. Firstly, the system under consideration comprises a finite number of subsystems governed by the switching logic subject to the persistent dwell-time constraints, with each local subsystem represented by a T-S fuzzy model. Secondly, the switching logic with persistent dwell-time constraints is also used to make assumptions about the frequency and duration of attacks, and the system under cyber attacks is constructed as a double-layer switched system that satisfies two independent rules simultaneously. In addition, a non-fragile control strategy relying on observed states is developed, and the criterion for the global exponential stability and the synthesis conditions for the observer/controller are established by constructing a Lyapunov function associated with two switching signals. Finally, an electric circuit model is simulated to demonstrate the feasibility of the method.
{"title":"Observer-based non-fragile control for T-S fuzzy switched systems against cyber attacks: A double-layer PDT switching method","authors":"Pengcheng Zhang , Yajuan Liu , Shiyu Jiao , Chen Yang","doi":"10.1016/j.amc.2025.129308","DOIUrl":"10.1016/j.amc.2025.129308","url":null,"abstract":"<div><div>This paper mainly investigates the observer-based non-fragile control issue for a class of T-S fuzzy switched systems under cyber attacks. Firstly, the system under consideration comprises a finite number of subsystems governed by the switching logic subject to the persistent dwell-time constraints, with each local subsystem represented by a T-S fuzzy model. Secondly, the switching logic with persistent dwell-time constraints is also used to make assumptions about the frequency and duration of attacks, and the system under cyber attacks is constructed as a double-layer switched system that satisfies two independent rules simultaneously. In addition, a non-fragile control strategy relying on observed states is developed, and the criterion for the global exponential stability and the synthesis conditions for the observer/controller are established by constructing a Lyapunov function associated with two switching signals. Finally, an electric circuit model is simulated to demonstrate the feasibility of the method.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129308"},"PeriodicalIF":3.5,"publicationDate":"2025-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-21DOI: 10.1016/j.amc.2025.129298
Wei Liu, Kai Li
A coupling of compressible Darcy-Brinkman flow and advection-diffusion transport problem is considered in fractured media. Treating the fracture as hyperplane, we obtain a two-layer reduced coupled model and the whole considered media is divided into low dimensional fracture-interfaces and surrounding high dimensional subdomains. To improve efficiency, two decoupled algorithms are constructed to solve the reduced coupled model. One decoupled algorithm is proposed based on interpolating vectors as inner boundaries and the other is constructed by interpolating scalars as iterative terms. By using both algorithms, the models in each subdomain are solved in parallel. The BDF2 formula and modified upwind scheme are employed to maintain the accuracy. For advection-diffusion model, we develop a novel bound-preserving scheme to keep the concentration within combined with finite volume method by the Lagrange multiplier approach. The accuracy and efficiency of the proposed algorithms are verified by numerical experiments including three-dimensional case and benchmark testing.
{"title":"Decoupled bound-preserving algorithms for compressible Darcy-Brinkman flow with advection-diffusion transport problem in fractured media","authors":"Wei Liu, Kai Li","doi":"10.1016/j.amc.2025.129298","DOIUrl":"10.1016/j.amc.2025.129298","url":null,"abstract":"<div><div>A coupling of compressible Darcy-Brinkman flow and advection-diffusion transport problem is considered in fractured media. Treating the fracture as hyperplane, we obtain a two-layer reduced coupled model and the whole considered media is divided into low dimensional fracture-interfaces and surrounding high dimensional subdomains. To improve efficiency, two decoupled algorithms are constructed to solve the reduced coupled model. One decoupled algorithm is proposed based on interpolating vectors as inner boundaries and the other is constructed by interpolating scalars as iterative terms. By using both algorithms, the models in each subdomain are solved in parallel. The BDF2 formula and modified upwind scheme are employed to maintain the accuracy. For advection-diffusion model, we develop a novel bound-preserving scheme to keep the concentration within <span><math><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></math></span> combined with finite volume method by the Lagrange multiplier approach. The accuracy and efficiency of the proposed algorithms are verified by numerical experiments including three-dimensional case and benchmark testing.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129298"},"PeriodicalIF":3.5,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-20DOI: 10.1016/j.amc.2025.129295
Yaoping Wang, Shasha Li, Zeng Zhao
Given a graph and a set with , an S-path in G is a path that connects all vertices of S. Let represent the maximum number of edge-disjoint S-paths in G. The k-path-edge-connectivity of G is then defined as min, where . Therefore, is precisely the edge-connectivity . In this paper, we focus on the k-path-edge-connectivity of the complete balanced bipartite graph for all . We show that if or , and n is odd, then ; otherwise, .
{"title":"k-path-edge-connectivity of the complete balanced bipartite graph","authors":"Yaoping Wang, Shasha Li, Zeng Zhao","doi":"10.1016/j.amc.2025.129295","DOIUrl":"10.1016/j.amc.2025.129295","url":null,"abstract":"<div><div>Given a graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> and a set <span><math><mi>S</mi><mo>⊆</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo></math></span> with <span><math><mo>|</mo><mi>S</mi><mo>|</mo><mo>≥</mo><mn>2</mn></math></span>, an <em>S-path</em> in <em>G</em> is a path that connects all vertices of <em>S</em>. Let <span><math><msub><mrow><mi>ω</mi></mrow><mrow><mi>G</mi></mrow></msub><mo>(</mo><mi>S</mi><mo>)</mo></math></span> represent the maximum number of edge-disjoint <em>S</em>-paths in <em>G</em>. The <em>k-path-edge-connectivity</em> <span><math><msub><mrow><mi>ω</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span> of <em>G</em> is then defined as min<span><math><mo>{</mo><msub><mrow><mi>ω</mi></mrow><mrow><mi>G</mi></mrow></msub><mo>(</mo><mi>S</mi><mo>)</mo><mo>:</mo><mi>S</mi><mo>⊆</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mspace></mspace><mi>a</mi><mi>n</mi><mi>d</mi><mspace></mspace><mo>|</mo><mi>S</mi><mo>|</mo><mo>=</mo><mi>k</mi><mo>}</mo></math></span>, where <span><math><mn>2</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mo>|</mo><mi>V</mi><mo>|</mo></math></span>. Therefore, <span><math><msub><mrow><mi>ω</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span> is precisely the edge-connectivity <span><math><mi>λ</mi><mo>(</mo><mi>G</mi><mo>)</mo></math></span>. In this paper, we focus on the <em>k</em>-path-edge-connectivity of the complete balanced bipartite graph <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi><mo>,</mo><mi>n</mi></mrow></msub></math></span> for all <span><math><mn>3</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mn>2</mn><mi>n</mi></math></span>. We show that if <span><math><mi>k</mi><mo>=</mo><mi>n</mi></math></span> or <span><math><mi>k</mi><mo>=</mo><mi>n</mi><mo>+</mo><mn>1</mn></math></span>, and <em>n</em> is odd, then <span><math><msub><mrow><mi>ω</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>(</mo><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi><mo>,</mo><mi>n</mi></mrow></msub><mo>)</mo><mo>=</mo><mo>⌊</mo><mfrac><mrow><mi>n</mi><mi>k</mi></mrow><mrow><mn>2</mn><mo>(</mo><mi>k</mi><mo>−</mo><mn>1</mn><mo>)</mo></mrow></mfrac><mo>⌋</mo><mo>−</mo><mn>1</mn></math></span>; otherwise, <span><math><msub><mrow><mi>ω</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>(</mo><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi><mo>,</mo><mi>n</mi></mrow></msub><mo>)</mo><mo>=</mo><mo>⌊</mo><mfrac><mrow><mi>n</mi><mi>k</mi></mrow><mrow><mn>2</mn><mo>(</mo><mi>k</mi><mo>−</mo><mn>1</mn><mo>)</mo></mrow></mfrac><mo>⌋</mo></math></span>.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129295"},"PeriodicalIF":3.5,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-20DOI: 10.1016/j.amc.2025.129304
Qingqin Wu , Weifan Wang , Jiangxu Kong
A graph is 1-planar if it can be drawn in the plane so that each edge is crossed by at most one other edge. A graph is k-degenerate if each of its subgraphs contains a vertex of degree no greater than k. It was known that 1-planar graphs are 7-degenerate. In this paper, we show that every 1-planar graph without 5-cycles is 5-degenerate, which extends some known results on the 5-degeneracy of some 1-planar graphs.
{"title":"1-Planar graphs with no 5-cycles are 5-degenerate","authors":"Qingqin Wu , Weifan Wang , Jiangxu Kong","doi":"10.1016/j.amc.2025.129304","DOIUrl":"10.1016/j.amc.2025.129304","url":null,"abstract":"<div><div>A graph is 1-planar if it can be drawn in the plane so that each edge is crossed by at most one other edge. A graph is <em>k</em>-degenerate if each of its subgraphs contains a vertex of degree no greater than <em>k</em>. It was known that 1-planar graphs are 7-degenerate. In this paper, we show that every 1-planar graph without 5-cycles is 5-degenerate, which extends some known results on the 5-degeneracy of some 1-planar graphs.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129304"},"PeriodicalIF":3.5,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143035330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}