-
Strong edge coloring of Cayley graphs and some product graphs
Authors:
Suresh Dara,
Suchismita Mishra,
Narayanan Narayanan,
Zsolt Tuza
Abstract:
A strong edge coloring of a graph $G$ is a proper edge coloring of $G$ such that every color class is an induced matching. The minimum number of colors required is termed the strong chromatic index. In this paper, we determine the exact value of the strong chromatic index of all unitary Cayley graphs. Our investigations reveal an underlying product structure from which the unitary Cayley graphs em…
▽ More
A strong edge coloring of a graph $G$ is a proper edge coloring of $G$ such that every color class is an induced matching. The minimum number of colors required is termed the strong chromatic index. In this paper, we determine the exact value of the strong chromatic index of all unitary Cayley graphs. Our investigations reveal an underlying product structure from which the unitary Cayley graphs emerge. We then go on to give tight bounds for the strong chromatic index of the Cartesian product of two trees, including an exact formula for the product in the case of stars. Further, we give bounds for the strong chromatic index of the product of a tree with a cycle. For any tree, those bounds may differ from the actual value only by not more than a small additive constant (at most 2 for even cycles and at most 5 for odd cycles), moreover they yield the exact value when the length of the cycle is divisible by $4$.
△ Less
Submitted 9 July, 2021; v1 submitted 1 July, 2021;
originally announced July 2021.
-
Beamformed Energy Detection in the Presence of an Interferer for Cognitive mmWave Network
Authors:
Madhuri Latha Mannedu,
Sai Krishna Charan Dara,
Sachin Chaudhari,
Neeraj Varshney
Abstract:
In this paper, we propose beamformed energy detection (BFED) spectrum sensing schemes for a single secondary user (SU) or a cognitive radio to detect a primary user (PU) transmission in the presence of an interferer. In the millimeter wave (mmWave) band, due to high attenuation, there are fewer multipaths, and the channel is sparse, giving rise to fewer directions of arrivals (DoAs). Sensing in on…
▽ More
In this paper, we propose beamformed energy detection (BFED) spectrum sensing schemes for a single secondary user (SU) or a cognitive radio to detect a primary user (PU) transmission in the presence of an interferer. In the millimeter wave (mmWave) band, due to high attenuation, there are fewer multipaths, and the channel is sparse, giving rise to fewer directions of arrivals (DoAs). Sensing in only these paths instead of blind energy detection can reap significant benefits. An analog beamforming weight vector is designed such that the beamforming gain in the true DoAs of the PU signal is maximized while minimizing interference from the interferer. To demonstrate the bound on the system performance, the proposed sensing scheme is designed under the knowledge of full channel state information (CSI) at the SU for the PU-SU and Interferer-SU channels. However, as the CSI may not be available at the SU, another BFED sensing scheme is proposed, which only utilizes the estimate the DoAs. To model the estimates of DoAs, perturbations are added to the true DoAs. The distribution of the test statistic for BFED with full CSI schemes is derived under the null hypothesis so that the threshold of the Neyman-Pearson detector can be found analytically. The performance of both schemes is also compared with the traditional energy detector for multi-antenna systems.
△ Less
Submitted 1 June, 2021; v1 submitted 31 July, 2020;
originally announced July 2020.
-
Some results on domination number of the graph defined by two levels of the n-cube
Authors:
Yeshwant Pandit,
S. L. Sravanthi,
Suresh Dara,
S. M. Hegde
Abstract:
Let ${[n] \choose k}$ and ${[n] \choose l}$ $( k > l ) $ where $[n] = \{1,2,3,...,n\}$ denote the family of all $k$-element subsets and $l$-element subsets of $[n]$ respectively. Define a bipartite graph $G_{k,l} = ({[n] \choose k},{[n] \choose l},E)$ such that two vertices $S\, ε\,{[n] \choose k} $ and $T\, ε\,{[n] \choose l} $ are adjacent if and only if $T \subset S$. In this paper, we give an…
▽ More
Let ${[n] \choose k}$ and ${[n] \choose l}$ $( k > l ) $ where $[n] = \{1,2,3,...,n\}$ denote the family of all $k$-element subsets and $l$-element subsets of $[n]$ respectively. Define a bipartite graph $G_{k,l} = ({[n] \choose k},{[n] \choose l},E)$ such that two vertices $S\, ε\,{[n] \choose k} $ and $T\, ε\,{[n] \choose l} $ are adjacent if and only if $T \subset S$. In this paper, we give an upper bound for the domination number of graph $G_{k,2}$ for $k > \lceil \frac{n}{2} \rceil$ and exact value for $k=n-1$.
△ Less
Submitted 25 November, 2019; v1 submitted 30 September, 2019;
originally announced October 2019.
-
Extending some results on the second neighborhood conjecture
Authors:
Suresh Dara,
Mathew C. Francis,
Dalu Jacob,
N. Narayanan
Abstract:
A vertex in a directed graph is said to have a large second neighborhood if it has at least as many second out-neighbors as out-neighbors. The Second Neighborhood Conjecture, first stated by Seymour, asserts that there is a vertex having a large second neighborhood in every oriented graph (a directed graph without loops or digons). We prove that oriented graphs whose missing edges can be partition…
▽ More
A vertex in a directed graph is said to have a large second neighborhood if it has at least as many second out-neighbors as out-neighbors. The Second Neighborhood Conjecture, first stated by Seymour, asserts that there is a vertex having a large second neighborhood in every oriented graph (a directed graph without loops or digons). We prove that oriented graphs whose missing edges can be partitioned into a (possibly empty) matching and a (possibly empty) star satisfy this conjecture. This generalizes a result of Fidler and Yuster. An implication of our result is that every oriented graph without a sink and whose missing edges form a (possibly empty) matching has at least two vertices with large second neighborhoods. This is a strengthening of a theorem of Havet and Thomasse, who showed that the same holds for tournaments without a sink. Moreover, we also show that the conjecture is true for oriented graphs whose vertex set can be partitioned into an independent set and a 2-degenerate graph.
△ Less
Submitted 22 October, 2021; v1 submitted 7 August, 2018;
originally announced August 2018.
-
Bounds on Erd{ő}s - Faber - Lovász Conjecture - the Uniform and Regular Cases
Authors:
S. M. Hegde,
Suresh Dara
Abstract:
We consider the Erd{ő}s - Faber - Lovász (EFL) conjecture for hypergraphs. This paper gives an upper bound for the chromatic number of $r$ regular linear hypergraphs $\textbf{H}$ of size $n$. If $r \ge 4$, $χ(\textbf{H}) \le 1.181n$ and if $r=3$, $χ(\textbf{H}) \le 1.281n$
We consider the Erd{ő}s - Faber - Lovász (EFL) conjecture for hypergraphs. This paper gives an upper bound for the chromatic number of $r$ regular linear hypergraphs $\textbf{H}$ of size $n$. If $r \ge 4$, $χ(\textbf{H}) \le 1.181n$ and if $r=3$, $χ(\textbf{H}) \le 1.281n$
△ Less
Submitted 9 January, 2019; v1 submitted 21 June, 2018;
originally announced June 2018.
-
On Erdos-Faber-Lovasz Conjecture
Authors:
S. M. Hegde,
Suresh Dara
Abstract:
In 1972, Erdös - Faber - Lovász (EFL) conjectured that, if $\textbf{H}$ is a linear hypergraph consisting of $n$ edges of cardinality $n$, then it is possible to color the vertices with $n$ colors so that no two vertices with the same color are in the same edge. In 1978, Deza, Erdös and Frankl had given an equivalent version of the same for graphs: Let $G= \bigcup_{i=1}^{n} A_i$ denote a graph wit…
▽ More
In 1972, Erdös - Faber - Lovász (EFL) conjectured that, if $\textbf{H}$ is a linear hypergraph consisting of $n$ edges of cardinality $n$, then it is possible to color the vertices with $n$ colors so that no two vertices with the same color are in the same edge. In 1978, Deza, Erdös and Frankl had given an equivalent version of the same for graphs: Let $G= \bigcup_{i=1}^{n} A_i$ denote a graph with $n$ complete graphs $A_1, A_2,$ $ \dots , A_n$, each having exactly $n$ vertices and have the property that every pair of complete graphs has at most one common vertex, then the chromatic number of $G$ is $n$.
The clique degree $d^K(v)$ of a vertex $v$ in $G$ is given by $d^K(v) = |\{A_i: v \in V(A_i), 1 \leq i \leq n\}|$. In this paper we give a method for assigning colors to the graphs satisfying the hypothesis of the Erdös - Faber - Lovász conjecture using intersection matrix of the cliques $A_i$'s of $G$ and clique degrees of the vertices of $G$. Also, we give theoretical proof of the conjecture for some class of graphs. In particular we show that:
1. If $G$ is a graph satisfying the hypothesis of the Conjecture 1.2 and every $A_i$ ($1 \leq i \leq n$) has at most $\sqrt{n}$ vertices of clique degree greater than 1, then $G$ is $n$-colorable.
2. If $G$ is a graph satisfying the hypothesis of the Conjecture 1.2 and every $A_i$ ($1 \leq i \leq n$) has at most $\left \lceil {\frac{n+d-1}{d}} \right \rceil$ vertices of clique degree greater than or equal to $d$ ($2\leq d \leq n$), then $G$ is $n$-colorable.
△ Less
Submitted 17 January, 2017;
originally announced January 2017.
-
Privacy Preserving Architectures for Collaborative Intrusion Detection
Authors:
Sashank Dara,
V. N. Muralidhara
Abstract:
Collaboration among multiple organizations is imperative for contemporary intrusion detection. As modern threats become well sophisticated it is difficult for organizations to defend with threat context local to their networks alone. Availability of global \emph{threat intelligence} is must for organizations to defend against modern advanced persistent threats (APTs). In order to benefit from such…
▽ More
Collaboration among multiple organizations is imperative for contemporary intrusion detection. As modern threats become well sophisticated it is difficult for organizations to defend with threat context local to their networks alone. Availability of global \emph{threat intelligence} is must for organizations to defend against modern advanced persistent threats (APTs). In order to benefit from such global context of attacks, privacy concerns continue to be of major hindrance. In this position paper we identify real world privacy problems as precise use cases, relevant cryptographic technologies and discuss privacy preserving architectures for collaborative intrusion detection.
△ Less
Submitted 7 February, 2016;
originally announced February 2016.
-
The Dynamics of the Forest Graph Operator
Authors:
Suresh Dara,
S. M. Hegde,
Venkateshwarlu Deva,
S. B. Rao,
Thomas Zaslavsky
Abstract:
In 1966, Cummins introduced the "tree graph": the tree graph $\mathbf{T}(G)$ of a graph $G$ (possibly infinite) has all its spanning trees as vertices, and distinct such trees correspond to adjacent vertices if they differ in just one edge, i.e., two spanning trees $T_1$ and $T_2$ are adjacent if $T_2 = T_1 -e +f$ for some edges $e\in T_1$ and $f\notin T_1$. The tree graph of a connected graph nee…
▽ More
In 1966, Cummins introduced the "tree graph": the tree graph $\mathbf{T}(G)$ of a graph $G$ (possibly infinite) has all its spanning trees as vertices, and distinct such trees correspond to adjacent vertices if they differ in just one edge, i.e., two spanning trees $T_1$ and $T_2$ are adjacent if $T_2 = T_1 -e +f$ for some edges $e\in T_1$ and $f\notin T_1$. The tree graph of a connected graph need not be connected. To obviate this difficulty we define the "forest graph": let $G$ be a labeled graph of order $α$, finite or infinite, and let $\mathfrak{N}(G)$ be the set of all labeled maximal forests of $G$. The forest graph of $G$, denoted by $\mathbf{F}(G)$, is the graph with vertex set $\mathfrak{N}(G)$ in which two maximal forests $F_1$, $F_2$ of $G$ form an edge if and only if they differ exactly by one edge, i.e., $F_2 = F_1 -e +f$ for some edges $e\in F_1$ and $f\notin F_1$.
Using the theory of cardinal numbers, Zorn's lemma, transfinite induction, the axiom of choice and the well-ordering principle, we determine the $\mathbf{F}$-convergence, $\mathbf{F}$-divergence, $\mathbf{F}$-depth and $\mathbf{F}$-stability of any graph $G$. In particular it is shown that a graph $G$ (finite or infinite) is $\mathbf{F}$-convergent if and only if $G$ has at most one cycle of length 3. The $\mathbf{F}$-stable graphs are precisely $K_3$ and $K_1$. The $\mathbf{F}$-depth of any graph $G$ different from $K_3$ and $K_1$ is finite. We also determine various parameters of $\mathbf{F}(G)$ for an infinite graph $G$, including the number, order, size, and degree of its components.
△ Less
Submitted 5 January, 2016;
originally announced January 2016.
-
On Clique Convergences of Graphs
Authors:
S. M. Hegde,
V. V. P. R. V. B. Suresh Dara
Abstract:
Let $G$ be a graph and $\mathcal{K}_G$ be the set of all cliques of $G$, then the clique graph of G denoted by $K(G)$ is the graph with vertex set $\mathcal{K}_G$ and two elements $Q_i,Q_j \in \mathcal{K}_G$ form an edge if and only if $Q_i \cap Q_j \neq \emptyset$. Iterated clique graphs are defined by $K^0(G)=G$, and $K^n(G)=K(K^{n-1}(G))$ for $n>0$. In this paper we determine the number of cliq…
▽ More
Let $G$ be a graph and $\mathcal{K}_G$ be the set of all cliques of $G$, then the clique graph of G denoted by $K(G)$ is the graph with vertex set $\mathcal{K}_G$ and two elements $Q_i,Q_j \in \mathcal{K}_G$ form an edge if and only if $Q_i \cap Q_j \neq \emptyset$. Iterated clique graphs are defined by $K^0(G)=G$, and $K^n(G)=K(K^{n-1}(G))$ for $n>0$. In this paper we determine the number of cliques in $K(G)$ when $G=G_1+G_2$, prove a necessary and sufficient condition for a clique graph $K(G)$ to be complete when $G=G_1+G_2$, give a characterization for clique convergence of the join of graphs and if $G_1$, $G_2$ are Clique-Helly graphs different from $K_1$ and $G=G_1 \Box G_2$, then $K^2(G) = G$.
△ Less
Submitted 17 August, 2015;
originally announced August 2015.
-
A Proof of the Erdös - Faber - Lovász Conjecture
Authors:
Suresh M. H.,
V. V. P. R. V. B. Suresh Dara
Abstract:
In 1972, Erdös - Faber - Lovász (EFL) conjectured that, if $\textbf{H}$ is a linear hypergraph consisting of $n$ edges of cardinality $n$, then it is possible to color the vertices with $n$ colors so that no two vertices with the same color are in the same edge. In 1978, Deza, Erdös and Frankl had given an equivalent version of the same for graphs: Let $G= \bigcup _{i=1}^{n} A_i$ denote a graph wi…
▽ More
In 1972, Erdös - Faber - Lovász (EFL) conjectured that, if $\textbf{H}$ is a linear hypergraph consisting of $n$ edges of cardinality $n$, then it is possible to color the vertices with $n$ colors so that no two vertices with the same color are in the same edge. In 1978, Deza, Erdös and Frankl had given an equivalent version of the same for graphs: Let $G= \bigcup _{i=1}^{n} A_i$ denote a graph with $n$ complete graphs $A_1, A_2,$ $ \dots , A_n$, each having exactly $n$ vertices and have the property that every pair of complete graphs has at most one common vertex, then the chromatic number of $G$ is $n$. The clique degree $d^K(v)$ of a vertex $v$ in $G$ is given by $d^K(v) = |\{A_i: v \in V(A_i), 1 \leq i \leq n\}|$. In this paper we give an algorithmic proof of the conjecture using the symmetric latin squares and clique degrees of the vertices of $G$.
△ Less
Submitted 19 November, 2015; v1 submitted 14 August, 2015;
originally announced August 2015.
-
Multi-user protocols with access control for computational privacy in public clouds
Authors:
Sashank Dara
Abstract:
Computational privacy is a property of cryptographic system that ensures the privacy of data being processed at an untrusted server. Fully Homomorphic Encryption Schemes (FHE) promise to provide such property. Contemporary FHE schemes are suited for applications that have single user and server. In reality many of the cloud applications involve multiple users with various degrees of trust and the…
▽ More
Computational privacy is a property of cryptographic system that ensures the privacy of data being processed at an untrusted server. Fully Homomorphic Encryption Schemes (FHE) promise to provide such property. Contemporary FHE schemes are suited for applications that have single user and server. In reality many of the cloud applications involve multiple users with various degrees of trust and the server need not necessarily be aware of it too. We present a Complementary Key Pairs technique and protocols based on that to scale any generic FHE schemes to multi user scenarios. We also use such technique along with FHE to show how attribute based access control can be achieved while server being oblivious of the same. We analyze the protocols and their security. Our protocols don't make any assumptions on how FHE scheme itself works.
△ Less
Submitted 6 June, 2014;
originally announced June 2014.
-
Confidentiality without Encryption For Cloud Computational Privacy
Authors:
Sashank Dara
Abstract:
Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs, scalability etc. But such advantages come for a bigger cost "Security and Privacy of data" for this very reaso…
▽ More
Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs, scalability etc. But such advantages come for a bigger cost "Security and Privacy of data" for this very reason many CSC's are skeptical to move towards cloud computing models. While the advances in cryptography research are promising, there are no practical solutions yet for performing any operations on encrypted data [1]. For this very reason there is strong need for finding alternative viable solutions for us to benefit from Cloud Computing. A technique to provide confidentiality without encryption was proposed in the past namely "Chaffing and Winnowing: Confidentiality without Encryption" by Ronald L. Rivest [2]. While this technique has been proposed for packet based communication system, its not adaptable in all cloud service models like Software-as-Service, Platform-as-Service or Infrastructure-as-Service [3]. In this paper we propose an adaptation of this technique in a cloud computational setup where CSC's outsource computational intensive tasks like web log parsing, DNA Sequencing etc to a MapReduce like CSP service.
△ Less
Submitted 31 July, 2012;
originally announced August 2012.