Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Wedderburn–Etherington number

From Wikipedia, the free encyclopedia
(Redirected fromWedderburn-Etherington number)
Number that can be used to count certain kinds of binary trees

Inmathematics andcomputer science, theWedderburn–Etherington numbers are aninteger sequence named afterIvor Malcolm Haddon Etherington[1][2] andJoseph Wedderburn[3] that can be used to count certain kinds ofbinary trees. The first few numbers in the sequence are

0, 1, 1, 1, 2, 3, 6, 11, 23, 46, 98, 207, 451, 983, 2179, 4850, 10905, 24631, 56011, ... (OEISA001190)

Combinatorial interpretation

[edit]
Otter trees and weakly binary trees, two types of rooted binary tree counted by the Wedderburn–Etherington numbers

These numbers can be used to solve several problems incombinatorial enumeration. Thenth number in the sequence (starting with the number 0 forn = 0)counts

  • The number of unorderedrooted trees withn leaves in which all nodes including the root have either zero or exactly two children.[4] These trees have been called Otter trees,[5] after the work of Richard Otter on their combinatorial enumeration.[6] They can also be interpreted as unlabeled and unrankeddendrograms with the given number of leaves.[7]
  • The number of unordered rooted trees withn nodes in which the root has degree zero or one and all other nodes have at most two children.[4] Trees in which the root has at most one child are called planted trees, and the additional condition that the other nodes have at most two children defines the weakly binary trees. Inchemical graph theory, these trees can be interpreted asisomers ofpolyenes with a designated leaf atom chosen as the root.[8]
  • The number of different ways of organizing asingle-elimination tournament forn players (with the player names left blank, prior to seeding players into the tournament).[9] The pairings of such a tournament may be described by an Otter tree.
  • The number of different results that could be generated by different ways of grouping the expressionxn{\displaystyle x^{n}} for a binary multiplication operation that is assumed to becommutative but neitherassociative noridempotent.[4] For instancex5{\displaystyle x^{5}} can be grouped into binary multiplications in three ways, asx(x(x(xx))){\displaystyle x(x(x(xx)))},x((xx)(xx)){\displaystyle x((xx)(xx))}, or(xx)(x(xx)){\displaystyle (xx)(x(xx))}. This was the interpretation originally considered by both Etherington[1][2] and Wedderburn.[3] An Otter tree can be interpreted as a grouped expression in which each leaf node corresponds to one of the copies ofx{\displaystyle x} and each non-leaf node corresponds to a multiplication operation. In the other direction, the set of all Otter trees, with a binary multiplication operation that combines two trees by making them the two subtrees of a new root node, can be interpreted as thefreecommutative magma on one generatorx{\displaystyle x} (the tree with one node). In this algebraic structure, each grouping ofxn{\displaystyle x^{n}} has as its value one of then-leaf Otter trees.[10]

Formula

[edit]

The Wedderburn–Etherington numbers may be calculated using therecurrence relation

a2n1=i=1n1aia2ni1{\displaystyle a_{2n-1}=\sum _{i=1}^{n-1}a_{i}a_{2n-i-1}}
a2n=an(an+1)2+i=1n1aia2ni{\displaystyle a_{2n}={\frac {a_{n}(a_{n}+1)}{2}}+\sum _{i=1}^{n-1}a_{i}a_{2n-i}}

beginning with the base casea1=1{\displaystyle a_{1}=1}.[4]

In terms of the interpretation of these numbers as counting rooted binary trees withn leaves, the summation in the recurrence counts the different ways of partitioning these leaves into two subsets, and of forming a subtree having each subset as its leaves. The formula for even values ofn is slightly more complicated than the formula for odd values in order to avoid double counting trees with the same number of leaves in both subtrees.[7]

Growth rate

[edit]

The Wedderburn–Etherington numbers growasymptotically as

anρ+ρ2B(ρ2)2πρnn3/2,{\displaystyle a_{n}\approx {\sqrt {\frac {\rho +\rho ^{2}B'(\rho ^{2})}{2\pi }}}{\frac {\rho ^{-n}}{n^{3/2}}},}

whereB is thegenerating function of the numbers andρ is itsradius of convergence, approximately 0.4027 (sequenceA240943 in theOEIS), and where the constant given by the part of the expression in the square root is approximately 0.3188 (sequenceA245651 in theOEIS).[11]

Applications

[edit]

Young & Yung (2003) use the Wedderburn–Etherington numbers as part of a design for anencryption system containing a hiddenbackdoor. When an input to be encrypted by their system can be sufficientlycompressed byHuffman coding, it is replaced by the compressed form together with additional information that leaks key data to the attacker. In this system, the shape of the Huffman coding tree is described as an Otter tree and encoded as a binary number in the interval from 0 to the Wedderburn–Etherington number for the number of symbols in the code. In this way, the encoding uses a very small number of bits, the base-2 logarithm of the Wedderburn–Etherington number.[12]

Farzan & Munro (2008) describe a similar encoding technique for rooted unordered binary trees, based on partitioning the trees into small subtrees and encoding each subtree as a number bounded by the Wedderburn–Etherington number for its size. Their scheme allows these trees to be encoded in a number of bits that is close to the information-theoretic lower bound (the base-2 logarithm of the Wedderburn–Etherington number) while still allowing constant-time navigation operations within the tree.[13]

Iserles & Nørsett (1999) use unordered binary trees, and the fact that the Wedderburn–Etherington numbers are significantly smaller than the numbers that count ordered binary trees, to significantly reduce the number of terms in a series representation of the solution to certaindifferential equations.[14]

See also

[edit]

References

[edit]
  1. ^abEtherington, I. M. H. (1937), "Non-associate powers and a functional equation",Mathematical Gazette,21 (242):36–39, 153,doi:10.2307/3605743,JSTOR 3605743,S2CID 126360684.
  2. ^abEtherington, I. M. H. (1939), "On non-associative combinations",Proc. R. Soc. Edinburgh,59 (2):153–162,doi:10.1017/S0370164600012244.
  3. ^abWedderburn, J. H. M. (1923), "The functional equationg(x2)=2ax+[g(x)]2{\displaystyle g(x^{2})=2ax+[g(x)]^{2}}",Annals of Mathematics,24 (2):121–140,doi:10.2307/1967710,JSTOR 1967710.
  4. ^abcdSloane, N. J. A. (ed.)."Sequence A001190".TheOn-Line Encyclopedia of Integer Sequences. OEIS Foundation..
  5. ^Bóna, Miklós;Flajolet, Philippe (2009), "Isomorphism and symmetries in random phylogenetic trees",Journal of Applied Probability,46 (4):1005–1019,arXiv:0901.0696,Bibcode:2009arXiv0901.0696B,doi:10.1239/jap/1261670685,MR 2582703,S2CID 5452364.
  6. ^Otter, Richard (1948), "The number of trees",Annals of Mathematics, Second Series,49 (3):583–599,doi:10.2307/1969046,JSTOR 1969046,MR 0025715.
  7. ^abMurtagh, Fionn (1984), "Counting dendrograms: a survey",Discrete Applied Mathematics,7 (2):191–199,doi:10.1016/0166-218X(84)90066-0,MR 0727923.
  8. ^Cyvin, S. J.; Brunvoll, J.; Cyvin, B.N. (1995), "Enumeration of constitutional isomers of polyenes",Journal of Molecular Structure: THEOCHEM,357 (3):255–261,doi:10.1016/0166-1280(95)04329-6.
  9. ^Maurer, Willi (1975), "On most effective tournament plans with fewer games than competitors",The Annals of Statistics,3 (3):717–727,doi:10.1214/aos/1176343135,JSTOR 2958441,MR 0371712.
  10. ^This equivalence between trees and elements of the free commutative magma on one generator is stated to be "well known and easy to see" byRosenberg, I. G. (1986), "Structural rigidity. II. Almost infinitesimally rigid bar frameworks",Discrete Applied Mathematics,13 (1):41–59,doi:10.1016/0166-218X(86)90068-5,MR 0829338.
  11. ^Landau, B. V. (1977), "An asymptotic expansion for the Wedderburn-Etherington sequence",Mathematika,24 (2):262–265,doi:10.1112/s0025579300009177,MR 0498168.
  12. ^Young, Adam;Yung, Moti (2003), "Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts",Proceedings of the 8th Australasian Conference on Information Security and Privacy (ACISP'03),Lecture Notes in Computer Science, vol. 2727, Springer, pp. 297–311,doi:10.1007/3-540-45067-X_26,ISBN 978-3-540-40515-3.
  13. ^Farzan, Arash;Munro, J. Ian (2008), "A uniform approach towards succinct representation of trees",Algorithm theory—SWAT 2008, Lecture Notes in Computer Science, vol. 5124, Springer, pp. 173–184,doi:10.1007/978-3-540-69903-3_17,ISBN 978-3-540-69900-2,MR 2497008.
  14. ^Iserles, A.; Nørsett, S. P. (1999),"On the solution of linear differential equations in Lie groups",Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences,357 (1754):983–1019,Bibcode:1999RSPTA.357..983I,doi:10.1098/rsta.1999.0362,MR 1694700,S2CID 90949835.

Further reading

[edit]
Classes ofnatural numbers
Powers and related numbers
Of the forma × 2b ± 1
Other polynomial numbers
Recursively defined numbers
Possessing a specific set of other numbers
Expressible via specific sums
2-dimensional
centered
non-centered
3-dimensional
centered
non-centered
pyramidal
4-dimensional
non-centered
Combinatorial numbers
Divisor functions
Prime omega functions
Euler's totient function
Aliquot sequences
Primorial
Otherprime factor ordivisor related numbers
Numeral system-dependent numbers
Arithmetic functions
anddynamics
Digit sum
Digit product
Coding-related
Other
P-adic numbers-related
Digit-composition related
Digit-permutation related
Divisor-related
Other
Generated via asieve
Sorting related
Graphemics related
Retrieved from "https://en.wikipedia.org/w/index.php?title=Wedderburn–Etherington_number&oldid=1295794833"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp