-
Grand zigzag knight's paths
Authors:
Jean-Luc Baril,
Nathanaël Hassler,
Sergey Kirgizov,
José L. Ramírez
Abstract:
We study the enumeration of different classes of grand knight's paths in the plane. In particular, we focus on the subsets of zigzag knight's paths that are subject to constraints. These constraints include ending at $y$-coordinate 0, bounded by a horizontal line, confined within a tube, among other considerations. We present our results using generating functions or direct closed-form expressions…
▽ More
We study the enumeration of different classes of grand knight's paths in the plane. In particular, we focus on the subsets of zigzag knight's paths that are subject to constraints. These constraints include ending at $y$-coordinate 0, bounded by a horizontal line, confined within a tube, among other considerations. We present our results using generating functions or direct closed-form expressions. We derive asymptotic results, finding approximations for quantities such as the probability that a zigzag knight's path stays in some area of the plane, or for the average of the altitude of such a path. Additionally, we exhibit some bijections between grand zigzag knight's paths and some pairs of compositions.
△ Less
Submitted 24 October, 2024; v1 submitted 7 February, 2024;
originally announced February 2024.
-
The Combinatorics of Motzkin Polyominoes
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
José L. Ramírez,
Diego Villamizar
Abstract:
A word $w=w_1\cdots w_n$ over the set of positive integers is a Motzkin word whenever $w_1=\texttt{1}$, $1\leq w_k\leq w_{k-1}+1$, and $w_{k-1}\neq w_{k}$ for $k=2, \dots, n$. It can be associated to a $n$-column Motzkin polyomino whose $i$-th column contains $w_i$ cells, and all columns are bottom-justified. We reveal bijective connections between Motzkin paths, restricted Catalan words, primitiv…
▽ More
A word $w=w_1\cdots w_n$ over the set of positive integers is a Motzkin word whenever $w_1=\texttt{1}$, $1\leq w_k\leq w_{k-1}+1$, and $w_{k-1}\neq w_{k}$ for $k=2, \dots, n$. It can be associated to a $n$-column Motzkin polyomino whose $i$-th column contains $w_i$ cells, and all columns are bottom-justified. We reveal bijective connections between Motzkin paths, restricted Catalan words, primitive Łukasiewicz paths, and Motzkin polyominoes. Using the aforementioned bijections together with classical one-to-one correspondence with Dyck paths avoiding $UDU$s, we provide generating functions with respect to the length, area, semiperimeter, value of the last symbol, and number of interior points of Motzkin polyominoes. We give asymptotics and closed-form expressions for the total area, total semiperimeter, sum of the last symbol values, and total number of interior points over all Motzkin polyominoes of a given length. We also present and prove an engaging trinomial relation concerning the number of cells lying at different levels and first terms of the expanded $(1+x+x^2)^n$.
△ Less
Submitted 22 June, 2024; v1 submitted 11 January, 2024;
originally announced January 2024.
-
A lattice on Dyck paths close to the Tamari lattice
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Mehdi Naima
Abstract:
We introduce a new poset structure on Dyck paths where the covering relation is a particular case of the relation inducing the Tamari lattice. We prove that the transitive closure of this relation endows Dyck paths with a lattice structure. We provide a trivariate generating function counting the number of Dyck paths with respect to the semilength, the numbers of outgoing and incoming edges in the…
▽ More
We introduce a new poset structure on Dyck paths where the covering relation is a particular case of the relation inducing the Tamari lattice. We prove that the transitive closure of this relation endows Dyck paths with a lattice structure. We provide a trivariate generating function counting the number of Dyck paths with respect to the semilength, the numbers of outgoing and incoming edges in the Hasse diagram. We deduce the numbers of coverings, meet and join irreducible elements. As a byproduct, we present a new involution on Dyck paths that transports the bistatistic of the numbers of outgoing and incoming edges into its reverse. Finally, we give a generating function for the number of intervals, and we compare this number with the number of intervals in the Tamari lattice.
△ Less
Submitted 13 May, 2025; v1 submitted 1 September, 2023;
originally announced September 2023.
-
Grand Dyck paths with air pockets
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Rémi Maréchal,
Vincent Vajnovszki
Abstract:
Grand Dyck paths with air pockets (GDAP) are a generalization of Dyck paths with air pockets by allowing them to go below the $x$-axis. We present enumerative results on GDAP (or their prefixes) subject to various restrictions such as maximal/minimal height, ordinate of the last point and particular first return decomposition. In some special cases we give bijections with other known combinatorial…
▽ More
Grand Dyck paths with air pockets (GDAP) are a generalization of Dyck paths with air pockets by allowing them to go below the $x$-axis. We present enumerative results on GDAP (or their prefixes) subject to various restrictions such as maximal/minimal height, ordinate of the last point and particular first return decomposition. In some special cases we give bijections with other known combinatorial classes.
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Dyck paths with catastrophes modulo the positions of a given pattern
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Armen Petrossian
Abstract:
For any pattern $p$ of length at most two, we provide generating functions and asymptotic approximations for the number of $p$-equivalence classes of Dyck paths with catastrophes, where two paths of the same length are $p$-equivalent whenever the positions of the occurrences of the pattern $p$ are the same.
For any pattern $p$ of length at most two, we provide generating functions and asymptotic approximations for the number of $p$-equivalence classes of Dyck paths with catastrophes, where two paths of the same length are $p$-equivalent whenever the positions of the occurrences of the pattern $p$ are the same.
△ Less
Submitted 14 September, 2022; v1 submitted 23 February, 2022;
originally announced February 2022.
-
Enumeration of Dyck paths with air pockets
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Rémi Maréchal,
Vincent Vajnovszki
Abstract:
We introduce and study the new combinatorial class of Dyck paths with air pockets. We exhibit a bijection with the peakless Motzkin paths which transports several pattern statistics and give bivariate generating functions for the distribution of patterns as peaks, returns and pyramids. Then, we deduce the popularities and asymptotic expectations of these patterns and point out a link between the p…
▽ More
We introduce and study the new combinatorial class of Dyck paths with air pockets. We exhibit a bijection with the peakless Motzkin paths which transports several pattern statistics and give bivariate generating functions for the distribution of patterns as peaks, returns and pyramids. Then, we deduce the popularities and asymptotic expectations of these patterns and point out a link between the popularity of pyramids and a special kind of closed smooth self-overlapping curves, a subset of Fibonacci meanders. A similar study is conducted for non-decreasing Dyck paths with air pockets.
△ Less
Submitted 6 March, 2023; v1 submitted 14 February, 2022;
originally announced February 2022.
-
Lattice paths with a first return decomposition constrained by the maximal height of a pattern
Authors:
Jean-Luc Baril,
Sergey Kirgizov
Abstract:
We consider the system of equations $A_k(x)=p(x)A_{k-1}(x)(q(x)+\sum_{i=0}^k A_i(x))$ for $k\geq r+1$ where $A_i(x)$, $0\leq i \leq r$, are some given functions and show how to obtain a close form for $A(x)=\sum_{k\geq 0}A_k(x)$. We apply this general result to the enumeration of certain subsets of Dyck, Motzkin, skew Dyck, and skew Motzkin paths, defined recursively according to the first return…
▽ More
We consider the system of equations $A_k(x)=p(x)A_{k-1}(x)(q(x)+\sum_{i=0}^k A_i(x))$ for $k\geq r+1$ where $A_i(x)$, $0\leq i \leq r$, are some given functions and show how to obtain a close form for $A(x)=\sum_{k\geq 0}A_k(x)$. We apply this general result to the enumeration of certain subsets of Dyck, Motzkin, skew Dyck, and skew Motzkin paths, defined recursively according to the first return decomposition with a monotonically non-increasing condition relative to the maximal ordinate reached by an occurrence of a given pattern $π$.
△ Less
Submitted 26 October, 2021; v1 submitted 6 October, 2021;
originally announced October 2021.
-
Asymptotic bit frequency in Fibonacci words
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Vincent Vajnovszki
Abstract:
It is known that binary words containing no $k$ consecutive 1s are enumerated by $k$-step Fibonacci numbers. In this note we discuss the expected value of a random bit in a random word of length $n$ having this property.
It is known that binary words containing no $k$ consecutive 1s are enumerated by $k$-step Fibonacci numbers. In this note we discuss the expected value of a random bit in a random word of length $n$ having this property.
△ Less
Submitted 6 May, 2022; v1 submitted 25 June, 2021;
originally announced June 2021.
-
Bijections from Dyck and Motzkin meanders with catastrophes to pattern avoiding Dyck paths
Authors:
Jean-Luc Baril,
Sergey Kirgizov
Abstract:
In this note, we present constructive bijections from Dyck and Motzkin meanders with catastrophes to Dyck paths avoiding some patterns. As a byproduct, we deduce correspondences from Dyck and Motzkin excursions to restricted Dyck paths.
In this note, we present constructive bijections from Dyck and Motzkin meanders with catastrophes to Dyck paths avoiding some patterns. As a byproduct, we deduce correspondences from Dyck and Motzkin excursions to restricted Dyck paths.
△ Less
Submitted 26 April, 2021; v1 submitted 2 April, 2021;
originally announced April 2021.
-
Transformation à la Foata for special kinds of descents and excedances
Authors:
Jean-Luc Baril,
Sergey Kirgizov
Abstract:
A pure excedance in a permutation $π=π_1π_2\ldots π_n$ is a position $i<π_i$ such that there is no $j<i$ with $i\leq π_j<π_i$. We present a one-to-one correspondence on the symmetric group that transports pure excedances to descents of special kind. As a byproduct, we prove that the popularity of pure excedances equals those of pure descents on permutations, while their distributions are different…
▽ More
A pure excedance in a permutation $π=π_1π_2\ldots π_n$ is a position $i<π_i$ such that there is no $j<i$ with $i\leq π_j<π_i$. We present a one-to-one correspondence on the symmetric group that transports pure excedances to descents of special kind. As a byproduct, we prove that the popularity of pure excedances equals those of pure descents on permutations, while their distributions are different.
△ Less
Submitted 17 March, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Gray codes for Fibonacci q-decreasing words
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Vincent Vajnovszki
Abstract:
An $n$-length binary word is $q$-decreasing, $q\geq 1$, if every of its length maximal factor of the form $0^a1^b$ satisfies $a=0$ or $q\cdot a > b$.We show constructively that these words are in bijection with binary words having no occurrences of $1^{q+1}$, and thus they are enumerated by the $(q+1)$-generalized Fibonacci numbers. We give some enumerative results and reveal similarities between…
▽ More
An $n$-length binary word is $q$-decreasing, $q\geq 1$, if every of its length maximal factor of the form $0^a1^b$ satisfies $a=0$ or $q\cdot a > b$.We show constructively that these words are in bijection with binary words having no occurrences of $1^{q+1}$, and thus they are enumerated by the $(q+1)$-generalized Fibonacci numbers. We give some enumerative results and reveal similarities between $q$-decreasing words and binary words having no occurrences of $1^{q+1}$ in terms of frequency of $1$ bit. In the second part of our paper, we provide an efficient exhaustive generating algorithm for $q$-decreasing words in lexicographic order, for any $q\geq 1$, show the existence of 3-Gray codes and explain how a generating algorithm for these Gray codes can be obtained. Moreover, we give the construction of a more restrictive 1-Gray code for $1$-decreasing words, which in particular settles a conjecture stated recently in the context of interconnection networks by Eğecioğlu and Iršič.
△ Less
Submitted 6 December, 2021; v1 submitted 19 October, 2020;
originally announced October 2020.
-
Pattern statistics in faro words and permutations
Authors:
Jean-Luc Baril,
Alexander Burstein,
Sergey Kirgizov
Abstract:
We study the distribution and the popularity of some patterns in $k$-ary faro words, i.e. words over the alphabet $\{1, 2, \ldots, k\}$ obtained by interlacing the letters of two nondecreasing words of lengths differing by at most one. We present a bijection between these words and dispersed Dyck paths (i.e. Motzkin paths with all level steps on the $x$-axis) with a given number of peaks. We show…
▽ More
We study the distribution and the popularity of some patterns in $k$-ary faro words, i.e. words over the alphabet $\{1, 2, \ldots, k\}$ obtained by interlacing the letters of two nondecreasing words of lengths differing by at most one. We present a bijection between these words and dispersed Dyck paths (i.e. Motzkin paths with all level steps on the $x$-axis) with a given number of peaks. We show how the bijection maps statistics of consecutive patterns of faro words into linear combinations of other pattern statistics on paths. Then, we deduce enumerative results by providing multivariate generating functions for the distribution and the popularity of patterns of length at most three. Finally, we consider some interesting subclasses of faro words that are permutations, involutions, derangements, or subexcedent words.
△ Less
Submitted 17 May, 2021; v1 submitted 13 October, 2020;
originally announced October 2020.
-
Catalan and Schröder permutations sortable by two restricted stacks
Authors:
J. -L. Baril,
G. Cerbai,
C. Khalil,
V. Vajnovszki
Abstract:
Pattern avoiding machines were introduced recently by Claesson, Cerbai and Ferrari as a particular case of the two-stacks in series sorting device. They consist of two restricted stacks in series, ruled by a right-greedy procedure and the stacks avoid some specified patterns. Some of the obtained results have been further generalized to Cayley permutations by Cerbai, specialized to particular patt…
▽ More
Pattern avoiding machines were introduced recently by Claesson, Cerbai and Ferrari as a particular case of the two-stacks in series sorting device. They consist of two restricted stacks in series, ruled by a right-greedy procedure and the stacks avoid some specified patterns. Some of the obtained results have been further generalized to Cayley permutations by Cerbai, specialized to particular patterns by Defant and Zheng, or considered in the context of functions over the symmetric group by Berlow. In this work we study pattern avoiding machines where the first stack avoids a pair of patterns of length 3 and investigate those pairs for which sortable permutations are counted by the (binomial transform of the) Catalan numbers and the Schröder numbers.
△ Less
Submitted 22 September, 2020; v1 submitted 3 April, 2020;
originally announced April 2020.
-
Catalan words avoiding pairs of length three patterns
Authors:
Jean-Luc Baril,
Carine Khalil,
Vincent Vajnovszki
Abstract:
Catalan words are particular growth-restricted words counted by the eponymous integer sequence. In this article we consider Catalan words avoiding a pair of patterns of length 3, pursuing the recent initiating work of the first and last authors and of S. Kirgizov where (among other things) the enumeration of Catalan words avoiding a patterns of length 3 is completed. More precisely, we explore sys…
▽ More
Catalan words are particular growth-restricted words counted by the eponymous integer sequence. In this article we consider Catalan words avoiding a pair of patterns of length 3, pursuing the recent initiating work of the first and last authors and of S. Kirgizov where (among other things) the enumeration of Catalan words avoiding a patterns of length 3 is completed. More precisely, we explore systematically the structural properties of the sets of words under consideration and give enumerating results by means of recursive decomposition, constructive bijections or bivariate generating functions with respect to the length and descent number. Some of the obtained enumerating sequences are known, and thus the corresponding results establish new combinatorial interpretations for them.
△ Less
Submitted 14 April, 2021; v1 submitted 22 December, 2019;
originally announced December 2019.
-
Popularity of patterns over $d$-equivalence classes of words and permutations
Authors:
Jean-Luc Baril,
Vincent Vajnovszki
Abstract:
Two same length words are $d$-equivalent if they have same descent set and same underlying alphabet. In particular, two same length permutations are $d$-equivalent if they have same descent set. The popularity of a pattern in a set of words is the overall number of copies of the pattern within the words of the set. We show the far-from-trivial fact that two patterns are $d$-equivalent if and only…
▽ More
Two same length words are $d$-equivalent if they have same descent set and same underlying alphabet. In particular, two same length permutations are $d$-equivalent if they have same descent set. The popularity of a pattern in a set of words is the overall number of copies of the pattern within the words of the set. We show the far-from-trivial fact that two patterns are $d$-equivalent if and only if they are equipopular over any $d$-equivalence class, and this equipopularity does not follow obviously from a trivial equidistribution.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
BATMAN : plate-forme blockchain pour l'authentification et la confiance dans les WSNs
Authors:
Axel Moinet,
Benoît Darties,
Jean-Luc Baril
Abstract:
Wireless Sensor networks (WSN) today suffer from a lack of security adapted to their multiple constraints, to which authentication and trust management solutions such as PGP only partially responds. On the one hand, the constraints of autonomy and co-operation of the nodes necessary to guarantee the coherence of the network do not require a distributed solution. On the other hand, the constraints…
▽ More
Wireless Sensor networks (WSN) today suffer from a lack of security adapted to their multiple constraints, to which authentication and trust management solutions such as PGP only partially responds. On the one hand, the constraints of autonomy and co-operation of the nodes necessary to guarantee the coherence of the network do not require a distributed solution. On the other hand, the constraints of energy consumption and the low computing power of the nodes require the use of algorithms of low complexity (Zhang2014) . To our knowledge, no solution can answer both these problems at the same time. We are proposing a new solution for securing WSNs named BATMAN (Blockchain Authentication and Trust Module in Ad-hoc Networks) to reply to these challenges. We present a model of centralized management for authentication and trust, implementable on the Tezos blockchain, and evaluate through simulation the confidence estimators proposed here.
△ Less
Submitted 2 April, 2018;
originally announced April 2018.
-
Descent distribution on Catalan words avoiding a pattern of length at most three
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Vincent Vajnovszki
Abstract:
Catalan words are particular growth-restricted words over the set of non-negative integers, and they represent still another combinatorial class counted by the Catalan numbers. We study the distribution of descents on the sets of Catalan words avoiding a pattern of length at most three: for each such a pattern $p$ we provide a bivariate generating function where the coefficient of $x^ny^k$ in its…
▽ More
Catalan words are particular growth-restricted words over the set of non-negative integers, and they represent still another combinatorial class counted by the Catalan numbers. We study the distribution of descents on the sets of Catalan words avoiding a pattern of length at most three: for each such a pattern $p$ we provide a bivariate generating function where the coefficient of $x^ny^k$ in its series expansion is the number of length $n$ Catalan words with $k$ descents and avoiding $p$. As a byproduct, we enumerate the set of Catalan words avoiding $p$, and we provide the popularity of descents on this set. Some of the obtained enumerating sequences are not yet recorded in the On-line Encyclopedia of Integer Sequences.
△ Less
Submitted 18 March, 2018;
originally announced March 2018.
-
Blockchain based trust & authentication for decentralized sensor networks
Authors:
Axel Moinet,
Benoît Darties,
Jean-Luc Baril
Abstract:
Sensor networks and Wireless Sensor Networks (WSN) are key components for the development of the Internet of Things. These networks are subject of two kinds of constraints. Adaptability by the mean of mutability and evolutivity, and constrained node resources such as energy consumption, computational complexity or memory usage. In this context, none of the existing protocols and models allows reli…
▽ More
Sensor networks and Wireless Sensor Networks (WSN) are key components for the development of the Internet of Things. These networks are subject of two kinds of constraints. Adaptability by the mean of mutability and evolutivity, and constrained node resources such as energy consumption, computational complexity or memory usage. In this context, none of the existing protocols and models allows reliable peer authentication and trust level management. In the field of virtual economic transactions, Bitcoin has proposed a new decentralized and evolutive way to model and acknowledge trust and data validity in a peer network by the mean of the blockchain. We propose a new security model and its protocol based on the blockchain technology to ensure validity and integrity of cryptographic authentication data and associate peer trust level, from the beginning to the end of the sensor network lifetime.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
Patterns in treeshelves
Authors:
Jean-Luc Baril,
Sergey Kirgizov,
Vincent Vajnovszki
Abstract:
We study the distribution and the popularity of left children on sets of treeshelves avoiding a pattern of size three. (Treeshelves are ordered binary increasing trees where every child is connected to its parent by a left or a right link.) The considered patterns are sub-treeshelves, and for each such a pattern we provide exponential generating function for the corresponding distribution and popu…
▽ More
We study the distribution and the popularity of left children on sets of treeshelves avoiding a pattern of size three. (Treeshelves are ordered binary increasing trees where every child is connected to its parent by a left or a right link.) The considered patterns are sub-treeshelves, and for each such a pattern we provide exponential generating function for the corresponding distribution and popularity. Finally, we present constructive bijections between treeshelves avoiding a pattern of size three and some classes of simpler combinatorial objects.
△ Less
Submitted 23 November, 2016;
originally announced November 2016.
-
A permutation code preserving a double Eulerian bistatistic
Authors:
Jean-Luc Baril,
Vincent Vajnovszki
Abstract:
Visontai conjectured in 2013 that the joint distribution of ascent and distinct nonzero value numbers on the set of subexcedant sequences is the same as that of descent and inverse descent numbers on the set of permutations. This conjecture has been proved by Aas in 2014, and the generating function of the corresponding bistatistics is the double Eulerian polynomial. Among the techniques used by A…
▽ More
Visontai conjectured in 2013 that the joint distribution of ascent and distinct nonzero value numbers on the set of subexcedant sequences is the same as that of descent and inverse descent numbers on the set of permutations. This conjecture has been proved by Aas in 2014, and the generating function of the corresponding bistatistics is the double Eulerian polynomial. Among the techniques used by Aas are the Möbius inversion formula and isomorphism of labeled rooted trees. In this paper we define a permutation code (that is, a bijection between permutations and subexcedant sequences) and show the more general result that two $5$-tuples of set-valued statistics on the set of permutations and on the set of subexcedant sequences, respectively, are equidistributed. In particular, these results give a bijective proof of Visontai's conjecture.
△ Less
Submitted 25 June, 2016;
originally announced June 2016.
-
Right-jumps and pattern avoiding permutations
Authors:
Cyril Banderier,
Jean-Luc Baril,
Céline Moreira Dos Santos
Abstract:
We study the iteration of the process "a particle jumps to the right" in permutations. We prove that the set of permutations obtained in this model after a given number of iterations from the identity is a class of pattern avoiding permutations. We characterize the elements of the basis of this class and we enumerate these "forbidden minimal patterns" by giving their bivariate exponential generati…
▽ More
We study the iteration of the process "a particle jumps to the right" in permutations. We prove that the set of permutations obtained in this model after a given number of iterations from the identity is a class of pattern avoiding permutations. We characterize the elements of the basis of this class and we enumerate these "forbidden minimal patterns" by giving their bivariate exponential generating function: we achieve this via a catalytic variable, the number of left-to-right maxima. We show that this generating function is a D-finite function satisfying a nice differential equation of order~2. We give some congruence properties for the coefficients of this generating function, and we show that their asymptotics involves a rather unusual algebraic exponent (the golden ratio $(1+\sqrt 5)/2$) and some unusual closed-form constants. We end by proving a limit law: a forbidden pattern of length $n$ has typically $(\ln n) /\sqrt{5}$ left-to-right maxima, with Gaussian fluctuations.
△ Less
Submitted 11 March, 2019; v1 submitted 7 December, 2015;
originally announced December 2015.