Next Article in Journal
Analyzing Richtmyer–Meshkov Phenomena Triggered by Forward-Triangular Light Gas Bubbles: A Numerical Perspective
Next Article in Special Issue
Exploring Clique Transversal Problems for d-degenerate Graphs with Fixed d: From Polynomial-Time Solvability to Parameterized Complexity
Previous Article in Journal
Perturbed Dirac Operators and Boundary Value Problems
Previous Article in Special Issue
The Restricted Edge-Connectivity of Strong Product Graphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Finding Set Extreme 3-Uniform Hypergraphs Cardinality through Second-Order Signatures

by
Evgeniya Egorova
1,†,
Vladislav Leonov
1,†,
Aleksey Mokryakov
2,*,† and
Vladimir Tsurkov
1,†
1
Federal Research Center “Computer Science and Control”, Russian Academy of Sciences, 119333 Moscow, Russia
2
Institute of Information Technology and Digital Transformation, Kosygin Russian State University (Technologies. Design. Art.), 119071 Moscow, Russia
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Axioms 2024, 13(6), 364; https://doi.org/10.3390/axioms13060364
Submission received: 16 April 2024 / Revised: 26 May 2024 / Accepted: 26 May 2024 / Published: 29 May 2024
(This article belongs to the Special Issue Advances in Graph Theory and Combinatorial Optimization)

Abstract

:
This paper continues the study of second-order signature properties—the characterization of the extreme 3-uniform hypergraph. Previously, bases were used to count extreme 3-uniform hypergraphs. However, the algorithm using this mechanism is extremely labor-intensive. The structure of the signature allows us to use it as a more efficient basis for the same problem. Here, we establish the nature of the mutual correspondence between the kind of second-order signature and extreme hypergraphs, and we present a new algorithm to find the power of the set of extreme 3-uniform hypergraphs through the set of their characteristic-signatures. New results obtained with the proposed tool are also presented.

1. Introduction

The theory of hypergraphs separated from graph theory in the second half of the last century. It was pioneered by Berge [1]. He introduced the concept of hypergraphs and formulated the first problems related to them [2]. A number of researchers immediately directed their eyes to the new subject and, by analogy with graphs, generalized some of the available results to the theory of hypergraphs. The constructed theory, as is now well seen, has a wide field of practical applications. Let us note only some of them: computer network modeling and design [3,4], including wireless nets [5]; the modeling of transport networks and calculation of loads on them [6]; social interaction analysis [7] and filtering music tracks [8,9]; database design [10] and neural network design [11,12,13]; cryptography [14,15,16,17]; and data visualization [18]. At the same time, hypergraphs themselves are rather amorphous structures, which led to the necessity to distinguish between various classes of hypergraphs with essentially different parameters and constraints: hypertrees [19], hypernetworks [6], and uniform hypergraphs [20,21,22,23,24,25] (also known as complexes [26]).
Hypergraph models are widely used in solving a number of problems: extreme problems [27,28], covers [29,30], coloring [21,22], pathfinding [31,32,33], the internal structure of a hypergraph—its topology [20,34], hypergraph storage [35,36,37,38,39], and structures of random hypergraphs [40,41].
It should be noted that in the classes of problems on coverings, on interior topology, and on storage, there arises a question related to the estimation of the set of hypergraphs of a particular kind. A number of fundamental works are devoted to the problems of estimating the power of graphs [42,43,44,45,46,47,48], but for hypergraphs such work has not been carried out in general; presumably, it is connected with the extremely indeterminate structure of hypergraphs, which led to a number of estimates in particular cases. In this way, the problems of enumerating hypergraphs and the problems of determining the power of a set only for certain classes of hypergraphs were solved [49,50,51,52,53].
Usually, to work with hypergraphs, an incidence matrix or a list of hyperedges is used. In the case of a large number of vertices, the matrix becomes very sparse, and the list of edges makes it possible to construct the hypergraph structure itself, but for many algorithms is not possible to directly apply it. For k-uniform hypergraphs [54], a number of algorithms use a representation in the form of an adjacency matrix. However, the amount of RAM used for it is proportional to n k bytes, where n is the number of vertices of the hypergraph. In addition to those indicated, there is another representation: a vector of degrees of vertices of a uniform hypergraph [23,36,37,55]; however, it has its own drawback: the ambiguity of the correspondence between the vector and the hypergraph realized from it, that is, for one vector there can be several implementations. It is worth noting that there is a separate class of uniform hypergraphs—extremal ones. These are hypergraphs that have a one-to-one correspondence with their vectors. In other words, their vector of vertex degrees corresponds to only one uniform hypergraph of the corresponding dimension [38].
For this class of hypergraphs, a new construction was developed: “base” [54]. In an extremal hypergraph, vertices are numbered in descending order of vertex degree, and vertices in hyperedges are ordered in ascending order of vertex numbers. Then, a partial order relationship can be established between hyperedges, which is defined according to the following principle: one hyperedge is smaller than another if each vertex number of the first edge is less than or equal to the number of the corresponding vertex from the second edge. The “base” contains only “maximal” edges that are included in the hypergraph and do not have a single large edge from this hypergraph. Thus, the “base” takes up less space in memory than a list of hyperedges, but it is not convenient for all algorithms from a practical point of view.
In [39], we describe another approach to the representation of an extremal 2-uniform hypergraph: the signature. It is given as a non-negative integer having exactly 1 digit less than the vertices in the hypergraph in binary representation. Also, here we prove a theorem about the power of the set of extremal 2-uniform hypergraphs that can be constructed on n vertices. In addition, algorithms for transforming signatures into the adjacency matrix and vice versa are described here. This allows us to proceed to the choice of the most appropriate extremal 2-uniform hypergraph for storage depending on the problem.
In [56,57], a new representation is given for an extremal 3-uniform hypergraph, and operations under signatures are described.
In works [14,15,16,17], the possibility of using extreme uniform hypergraphs as a key element for a new method of data encryption is presented. This method is topological; the higher the order of uniformity of the hypergraph, the larger the key space at the same number of vertices involved. To analyze the topological approach to encryption, it is necessary to be able to more precisely estimate the power of the key space, and in fact we are talking about the power of the set of extreme k-uniform hypergraphs. Unfortunately, at the moment, all of the estimates for this set are oversampled except for the case k = 2 , i.e., extreme graphs. In the case k = 3 , the results are known for n < 17 , which is not enough to find theoretical power estimates for the set of extreme 3-uniform hypergraphs. The counting method itself is directly related to the representation of an extreme hypergraph—a base. The structure of the base makes it quite easy to enumerate all its possible variants but makes it almost a simple enumeration. Thanks to the second-order signature representation, which appeared in the works of [56,57], as well as operations on these representations of extreme 3 uniform hypergraphs, we are able to propose a new, more efficient algorithm for calculating the cardinality of a set.
Although work on high-order signatures is still in progress, we can still develop algorithms for finding the power of the set of second-order signatures, which will also help us in solving the problem of enumerating extreme 3 uniform hypergraphs.
In this work, the algorithm used in [49] will be analyzed, and its analogue, working on the basis of second-order signatures, will be presented.

2. Definitions

The algorithms and results considered in the following relate to the counting of extreme 3-uniform hypergraphs. To work with them, it is worth to briefly describe their peculiarities and mutual and characteristic features.
Definition 1.
A hypergraph is a set of vertices and a set of hyper edges, each of which is incident to a certain set of vertices [2].
Since hypergraphs are unbounded, it is important for many studies to consider k-uniform hypergraphs.
Definition 2.
A k-uniform hypergraph (hereafter, UH) is a hypergraph in which each hyperedge is incident to exactly k vertices.
Uniform hypergraphs, having another name, can be found in topology (complexes of order k 1 [26,36]) and in graph theory (simple graphs without loops).
Hypergraphs in computer memory are traditionally represented in several ways: a list of hyper edges, an adjacency matrix, and an incident matrix. Each has both advantages and disadvantages. They are mainly compared in the categories of memory footprint and applicability to different algorithms.
In [37], we present another form of hypergraph storage: a vector of degrees of its vertices. Since we do not consider directed hypergraphs at this stage, the degree of a vertex is taken to be the sum of the weights of all hyperbranes incident to the vertex. However, this characteristic allows us to efficiently store information about a hypergraph but does not allow us to unambiguously reconstruct it from such a vector since for most hypergraphs there is at least one non-isomorphic hypergraph having the same vector of vertex degrees.
This led to the study of a separate class: extreme uniform hypergraphs ( E U H ). This class is characterized by the fact that each E U H corresponds mutually unambiguously to its vector of vertex degrees and has no non-isomorphic hypergraphs with the same vector. Also, in E U H the coordinates are ordered by decreasing degrees.
For E U H , there are several characteristics that allow one to describe it uniquely. In [54], the “base” was considered.
There are two approaches to determine the “base”: through the adjacency matrix of a uniform hypergraph and through the list of edges. Let us use the second way.
Let the k-extreme uniform hypergraph be given in which all vertices are numbered from 1 to n in decreasing order of vertex degree. Then, each hypergraph can be denoted by a set of k indices of the form { p 1 , p 2 , , p k } , with  p 1 < p 2 < p k . The definition of the base is directly related to the partial order constructed on the set of such index sets.
We will assume that a hyperedge p is smaller than a hyperedge q if for each pair of indices of the associated sets { p 1 , p 2 , , p k } and { q 1 , q 2 , , q k } , the condition p i q i is satisfied.
The relation p > q is defined similarly.
Definition 3.
Let H ( V n , S ) E U H n k , where V n is the set of vertices and S is the set of hyperedges. A hyperedge p S and its associated tuple of indices { p 1 , p 2 , , p k } are called maximal in H if
(1) 
q S either q < p or the partial order relation between p and q is not established;
(2) 
{ t 1 , t 2 , , t k } < { p 1 , p 2 , , p k } t S .
Definition 4.
The set of all maximal index sets on H is the “base” of H— E U H .
Also, one way to specify E U H is to use a random base since there is one and only one E U H for each base.
Definition 5.
Let B be a base containing some number of the elements of dimension k. Let us construct all index tuples for which any element of the base is maximal. For the obtained set of index tuples, we can obtain the associated set of hyperedges S B ; then, the hypergraph H ( V n , S B ) is E U H n k .
In [39], the <<signature>> for E U H n 2 is presented. In [56], an extension of the notion of signature is presented: a second-order signature, or vector of signatures, for  E U H n 3 .
A brief description of the basis is given in the introduction. Here, we will present an explanation of the nature of the signature and the signature vector.
In the adjacency matrix E U H n 2 , all cells have values 0 and 1. Except for the main diagonal, all ones and all zeros are separated by a broken line running along the boundaries of the cells: 1 is closer to the smaller indices of the matrix, and 0 is closer to the larger ones. Coding the segments of this broken line with 0’s and 1’s depending on the direction of movement sets the signature.
Example 1.
Let E U H 10 2 H = H ( V 10 , S ) , where S is an associated set of tuples { { 1 , 2 } , { 1 , 3 } , { 1 , 4 } , { 1 , 5 } , { 1 , 6 } , { 1 , 7 } , { 1 , 8 } , { 1 , 9 } , { 1 , 10 } , { 2 , 3 } , { 2 , 4 } , { 2 , 5 } , { 2 , 6 } , { 2 , 7 } , { 2 , 8 } , { 2 , 9 } , { 2 , 10 } , { 3 , 4 } , { 3 , 5 } , { 3 , 6 } , { 3 , 7 } , { 3 , 8 } , { 4 , 5 } , { 4 , 6 } } :
1. 
A hypergraph is shown in Figure 1;
2. 
Its adjacency matrix is shown in Figure 2;
3. 
Its base B ( H ) = { { 2 , 10 } , { 3 , 8 } , { 4 , 6 } } ;
4. 
Its signature σ ( H ) = 110010010 2 = 402 10 .
For E U H n 3 , a cubic adjacency matrix is required. But its behavior is similar to that of the square adjacency matrix E U H n 2 : 1 and 0 are also grouped into 2 non-overlapping clusters (1 closer to cell x 111 , 0 closer to cell x n n n ). If we divide the cubic matrix into slices, relative to one of the dimensions, we obtain n-slices, for each of which we can construct a signature. The only difference between such signatures is that in a slice we consider only cells with two other indices larger than the slice index. The set of obtained signatures forms a vector of signatures. It should be noted that the last pair of coordinates of such a vector will always be zero, so it is unnecessary to add them to the vector.
Example 2.
Consider the adjacency matrix (see Figure 3) of the hypergraph H ( V 6 , S ) , where S = { { 1 , 2 , 3 }  , {1, 2, 4}, {1, 2, 5}, {1, 2, 6}, {1, 3, 4}, {1, 3, 5}, {1, 3, 6}, {1, 4, 5}, {2, 3, 4}, {2, 3, 5}, {2, 4, 5},  { 3 , 4 , 5 } } . Here, the dark colour indicates empty cells that cannot correspond to any hyperedge of any U H in the adjacency matrix. The cells that are not used to form the second-order signature are highlighted in medium grey.
The second-order signature for H— σ 2 = ( 1101 2 , 011 2 , 01 2 , 0 2 ) = ( 13 , 3 , 1 , 0 ) is shown in Figure 4.
Base B ( H ) = { { 1 , 3 , 6 } , { 3 , 4 , 5 } } .
Figure 3. The adjacency matrix for E U H 6 3 from Example 2.
Figure 3. The adjacency matrix for E U H 6 3 from Example 2.
Axioms 13 00364 g003
Figure 4. σ 2 ( σ 1 , σ 2 , σ 3 , σ 4 ) for E U H 6 3 from Example 2.
Figure 4. σ 2 ( σ 1 , σ 2 , σ 3 , σ 4 ) for E U H 6 3 from Example 2.
Axioms 13 00364 g004
In [56], we also introduced the notion of a truncated signature and defined the relation of including one signature into another through the notion of truncation.
The truncation operation allows us to specify constraints for the next numbered signature. And the inclusion relation describes all of the signatures that can have an index greater than that of the included signature in the vector of signatures.

3. Results

3.1. An Approach to Calculating the Cardinality of a Set of Extremal 3-Uniform Hypergraphs through “Base” Counting

Here, we will consider an algorithm for finding the cardinality of the set E U H n 3 . Unlike the set E U H n 2 , for which the cardinality ( 2 n 1 ) is precisely known, theoretical estimates have not yet been obtained for the set E U H n 3 . Only experimental data are known, obtained through listing another characteristic E U H n 3 — “base”.
Base, like signature, is a one-to-one characteristic for E U H n k . Moreover, it can be specified for any k, in contrast to the signature, which is currently defined only for k = 2 and k = 3 .
The algorithm presented in [49] can be briefly described as an enumeration algorithm with the construction of lengthening chains of single-element bases that create a composite base. To form the base, a set of all combinations of index sets is pre-created: C k n is the set of all combinations of k integers, from 1 to n, ordered in ascending order ( C k n is ordered in lexicographical order, for example, if  n = 5 and k = 3 ; then, C k n = { { 1 , 2 , 3 } , {1, 2, 4}, {1, 2, 5}, {1, 3, 4}, {1, 3, 5}, {1, 4, 5}, {2, 3, 4}, {2, 3, 5}, {2, 4, 5}, { 3 , 4 , 5 } } ).
The algorithm is recursive and looks like this:
Algorithm 1 initiation: CalcBases(k, n, −1, 1).
Algorithm 1 CalcBases: Calculating the power of a set of bases.
Require:  k > 1 k is dimension of E U H ;
Require:  n k n is number of vertices E U H ;
Require:  B [ ] B —a set of elements from C k n , ordered in ascending order in lexicographical order, in which for each pair of elements the partial order relation is not defined;
Require:  p > 0 p—sequence number of the last checked element from C k n ;
Require:  l c 0 l c —accumulated chain length;
Require:  B N [ ] B N [ ] —a null array to store the number of bases consisting of the corresponding number of elements.
for  i p ; i < len ( C k n ) ; i++ do
    if IsBase(B, C k n [ i ]  then
         B N [ i l c ] ++
        CalcBases(k, n, i + 1 , l c + 1 , GroupBase(B, C k n [ i ] ))
    end if
end for
The IsBase function checks each element of the first argument for a partial order relationship with the second argument. If the relationship exists for at least one pair of elements, then the function is returned as false; otherwise, it is returned as true.
The GroupBase function returns a new base—the union of the first argument, the old base; and the second argument—the new base element.
It is also important to note that the maximum number of elements in the base has so far only been estimated for the cases k = 2 and k = 3 . In [49], the following estimates for the maximum base length are obtained M L B n k :
M L B n 2 = 1 2 n ,
M L B n 3 = 1 8 n ( n 2 ) .
For extreme uniform hypergraphs of a higher order, there are no exact estimates. In this case, we can hypothesize that M L B n k is of the form O ( n k ) or is more complicated.
Direct analysis of the complexity of the obtained algorithm is difficult due to its recursive nature, as is the barely predictable process of the branching of chains of constructed bases. Therefore, in order to evaluate the growth of computational complexity, let us look at the experimental data obtained using the developed algorithm. Table 1 has the following form: the first column contains n—the number of hypergraph vertices; the second column contains the number of different bases found on n; the third column specifies the time spent on the algorithm execution; and the last column shows the ratio between the spent seconds at n and n 1 .
It can be seen that when the number of vertices is small ( n < 12 ), the computation time is small and may contain a number of overheads associated with the representation of the algorithm in the program, as well as random fluctuations of the influence of the operating system. With a larger number of vertices, it is easy to see that the running time of the algorithm grows faster than the exponential function, which allows us to estimate the complexity of the algorithm as greater than the exponential one.

3.2. Counting Included First-Order Signatures

Having obtained an estimate of the complexity of the base counting algorithm, we will try to create an algorithm for finding extremal 3-uniform hypergraphs by finding second-order signatures.
To do this, we will use the already described property of signatures—the relation of inclusion of first-order signatures. The main property of including signatures is that each of the included signatures allows you to partially set E U H n 3 at its own level. In this case, to describe the entire E U H n 3 it is necessary to specify n 2 first-order signatures, which together form a second-order signature.
Recall the logic of how the signature inclusion relation works.
Let the signature σ be given on p digits. Let us build a truncated signature σ ^ containing one less digit (we discard the first digit of σ ) and set the highest digit of σ ^ equal to 1 to 0. The signatures included in σ must satisfy the following condition: for each 0 k p 1 , the sum of the highest k binary digits does not exceed the sum of the highest k binary digits of σ ^ .
Each signature at one level restricts the possible signatures at the next level. For example, as shown in the [56] for σ = 25 , the signatures 0 , 1 , 2 , 2 , 3 , 4 , 5 , 8 , 9 will be included. And the signature σ = 2 p 1 includes all signatures from 0 to 2 p 1 1 .
Note that σ = 2 k : σ ^ = 0 .
If for a given signature of the form 2 n 1 we construct all possible signatures included in it, and for each included signature we repeat the search for the included ones, and so on until all new signatures are equal to 0, then we obtain all of the possible vectors of signatures describing all E U H n 3 . The algorithm for counting all second-order signatures is presented below.
To fully describe this algorithm, we need to define the function for checking the included signatures. To do this, we first define the function of finding the highest digit of a number because to determine whether a signature is enabled, we need to remove the highest digit from the main signature. And when comparing signatures, it is necessary to start from the highest single bit.
Now, you can also set the function to check if the signature is enabled.
Algorithm 2 initiation: CalcSignatures2( 2 n 1 1 ).
Let us estimate the complexity of the resulting Algorithm 2.
First, let us consider the MaxBit Algorithm 3 since it has only one cycle that is executed at most n, where n is the number of digits in the considered signature. Accordingly, its complexity in the worst case is O ( n ) .
For the IsSinS Algorithm 4, the complexity is similarly computed and is also O ( n ) .
Algorithm 2 CalcSignatures2: Counting the power of the set of second-order signatures given by the first coordinate.
Require: 
s 0                   ▹s—signature (first coordinate of the second-order signature).
r e s 1
m b MaxBit(s)
n s s m b
for  j 1 ; j < n s + 1 ; j++ do
    if IsSinS( n s , j) then
         r e s r e s + CalcSignatures 2 ( j )
    end if
end for
  return res
Algorithm 3 MaxBit: finding the highest digit of a number.
Require: 
a 0
p 0
while (a >> 1) > 0 do
     a a >> 1
     p p + 1
end while
  return 1 << p
For the basic Algorithm 2, the complexity is determined by its main loop. The loop tries half of all signatures from the one being checked, checks for each of them, and then calls the main algorithm from the smaller signature.
That is, to call the function to find the number of possible second-order signatures built on n vertices, we obtain the following number of operations T 2 n 1 1 :
T 2 n 1 1 = m = 0 2 n 2 1 T m log 2 m < m = 0 2 n 2 1 T m log 2 2 n 1 = ( n 1 ) m = 0 2 n 2 1 T m .
It should be noted that T 0 = T 1 = O ( 1 ) . Suppose that T i T i 1 . Then,
T 2 n 1 1 < ( n 1 ) T 2 n 2 1 2 n 2 1 0 2 2 n 2 < ( n 1 ) T 2 n 2 1 2 n 3 2 n 2 = = ( n 1 ) ! t = 0 n 2 2 n 2 t 2 n 3 t = ( n 1 ) ! 2 t = 0 n 3 ( n 2 t ) + ( n 3 t ) = ( n 1 ) ! 2 ( n 3 ) ( n 2 ) .
Remark 1.
The resulting complexity score (1) of Algorithm 2 is an overestimate since not every signature is smaller in value than the other one included in it.
Algorithm 4 IsSinS: checking relation of inclusion between signatures.
Require: 
a 0                   ▹a—first signature
Require: 
b 0                   ▹b—testing sinature
if   a < b  then
     return 0
end if
if  a = b  then
     return 1
end if
c 0
a p MaxBit ( a )
while ( c 0 ) && a p  do
    if a & a p  then
         c c + 1
    end if
    if b & a p  then
         c c 1
    end if
     a p a p >> 1
end while
if  c 0  then
     return 1
else
     return 0
end if
When running the algorithm, it should be understood that the output is the sum of all possible chains of subordinate signatures that are possible given the initial signature that defines the lower slice of the adjacency matrix with significant cells. The result of the algorithm counting the included signatures for different initial values is presented in Table 2.
In Table 2, you can see a relationship between the values:
Theorem 1.
Let S be a vector of the number of signatures included for σ 0 = 1 , 2 n 1 1 ¯ ; then, it can be divided into four equal length quartiles from q 0 = ( s 0 , , s 2 n 3 1 ) to q 3 = ( s 2 n 2 + 2 n 3 , , s 2 n 1 1 ) , with the values in q 1 corresponding to the values in q 2 .
Proof. 
Consider the i-th signatures from quartiles q 1 and q 2 . They differ by the first two bits (see Table 3); if the two higher bits of the signature from q 1 are 0 and 1, then the signatures from the second quartile have the first bits 1 and 0, respectively. Let σ 1 i be a signature from quartile q 1 , standing in it at number i, and let  σ 2 i be a signature from quartile q 2 at the same number; then, σ ^ 1 i = σ ^ 2 i , i.e., the truncation of these signatures will be the same. This naturally leads to the equality σ σ 1 i 2 ( n ) = σ σ 2 i 2 ( n ) .    □
Example 3.
If we look at the Table 2, we can see an example of the quartile division of the number of included signatures. Consider the vectors of values for all signatures less than the maximum for the current n.
  • n = 3 —the maximal signature is equal to 2 3 1 1 = 3 :
q 0 = ( 1 ) , q 1 = ( 1 ) , q 2 = ( 1 ) , q 3 = ( 2 ) .
  • n = 4 —the maximal signature is equal to 2 4 1 1 = 7 :
q 0 = ( 1 , 1 ) , q 1 = ( 1 , 2 ) , q 2 = ( 1 , 2 ) , q 3 = ( 3 , 5 ) .
  • n = 5 —the maximal signature is equal to 2 5 1 1 = 15 :
q 0 = ( 1 , 1 , 1 , 2 ) , q 1 = ( 1 , 2 , 3 , 5 ) , q 2 = ( 1 , 2 , 3 , 5 ) , q 3 = ( 4 , 8 , 11 , 16 ) .
  • n = 6 —the maximal signature is equal to 2 6 1 1 = 31 :
q 0 = ( 1 , 1 , 1 , 2 , 1 , 2 , 3 , 5 ) , q 1 = ( 1 , 2 , 3 , 5 , 4 , 8 , 11 , 16 )
q 2 = ( 1 , 2 , 3 , 5 , 4 , 8 , 11 , 16 ) , q 3 = ( 5 , 11 , 17 , 27 , 21 , 39 , 50 , 66 ) .
As we can see, in each case q 1 = q 2 .
In general, the algorithm for finding included signatures is also essentially an algorithm that builds chains of signatures included in one another. This effect can be used to further improve the algorithm for counting second-order signatures since no significant increase in speed was achieved compared to the basic algorithm.
Let us consider the principles of using this property in practice.
  • It is necessary to implement a structure for storing previously obtained values, for signatures that are smaller than the one under study by two binary orders.
  • For a new signature, only a quarter of the time it is necessary to look for the inclusion of other signatures.
Next theorem is derived from Theorem 1.
Theorem 2.
Let us here call σ σ 0 2 ( n ) the set of all second-order signatures of n 2 coordinates whose first coordinate is equal to σ 0 —the signature defining the lower significant layer of the adjacency matrix. Then, the power of the set σ σ 0 2 ( n ) has the following form:
σ σ 0 2 ( n ) = σ σ 0 2 ( n 1 ) , if σ 0 < 2 n 2 , σ σ 0 2 n 3 2 ( n 1 ) , if 2 n 2 σ 0 < 2 n 2 + 2 n 3 , σ i σ 0 σ σ i 2 ( n 1 ) , if σ 0 > 2 n 2 + 2 n 3 .
Proof. 
The first equation is valid because each signature is smaller than the previous one by at least one bit. At the same time, if the highest bit is 0, it means that at least one vertex in the extreme hypergraph is isolated and does not affect the construction of the hypergraph itself. That is, on n vertices in this configuration we can build exactly as many extreme hypergraphs as on n 1 , provided that we have removed the isolated vertex.
The second equation follows from Theorem 1.
The latter expression is given by the algorithm for finding the power as a recursive appeal to the power of the set of second-order signatures having one less coordinate and defined by the first coordinate included in the signature σ 0 .    □
Example 4.
Let us consider the functioning of the theorem on the example of the second half of Table 2. According to Theorem 2, we already know the first values for the number of signatures included in the signatures from 0 to 15. The third quarter is duplicated from the second quarter according to Theorem 1. It remains for us to find the last quarter of the table. To do this, we need to obtain all the signatures included in the signatures from 24 to 31. Let us show them in Table 4. We can see that the found values repeat the last quarter of Table 2.
Based on the obtained theorem, we can refine Algorithm 5 (CalcSignatures2M) for finding the power of the set of second-order signatures with a given first coordinate as follows: let us add the storage of values for previously found sets to the function of searching for new signatures, and let us add a division into quartiles when choosing an action for a signature.
Algorithm 5 initiation: CalcSignatures2M( 2 n 1 , 2 n ).
This algorithm must be run for each of the unknown signatures, starting from the previous n, that is, to find the second half of σ σ 0 2 ( n + 1 ) , it is necessary to know σ σ 0 2 ( n ) . This allows one, firstly, to approach the finding of values sequentially and to save intermediate results, and secondly, it significantly accelerates the calculation itself since to find the power of the set of all possible second-order signatures on n 2 coordinates it is enough to find 2 n 2 values.
The application of this algorithm is shown in Table 5.
Algorithm 5 CalcSignatures2M: Modified power calculation of the set of second-order signatures generated by a specified signature.
Require: 
s                                                                      ▹s—signature.
Require: 
l e v e l                                             ▹ l e v e l —maximum signature value + 1 relative to the current signature.
Require: 
R                        ▹R—global data array with dimension 2 l e v e l , where the found set powers are stored, indexed according to the value of the generating signature ( R [ 0 ] = R [ 1 ] = 1 ).
if  R [ s ] > 0  then
  return   R [ s ]
end if
r e s 1
m b = MaxBit ( s )
n s s m b
l 1 l e v e l >> 1
l 2 l e v e l >> 2
if  s < l 1 + l 2  then
  return  R [ s l 2 ]
end if
for  j 1 ; j < n s + 1 ; j++ do
    if IsSinS( n s , j) > 0 then
         r e s = r e s + CalcSignatures 2 M ( j , l e v e l )
    end if
end for
  return res
The complexity estimation of Algorithm 5 is similar to the previous one, but it is worth noting that the recursive call for each included signature occurs no more than once. The reason is that the number of subordinate signatures is calculated only once for each signature under investigation. In addition, for each vertex level, only signatures from quartile q 3 need to be considered, which also lowers the number of operations. In fact, for each of the signatures we have to find all the signatures included once while checking them for inclusion; hence, the number of operations T 2 n 1 1 can be estimated as
T 2 n 1 1 = ( n 1 ) 2 n 2 .
Remark 2.
Thus, we can estimate the complexity of Algorithm 5 as O n 2 n 2 .
To find values at n > 18 , we need to switch to 128-bit numbers, which by some estimation will suffice up to n = 27 .
Remark 3.
The considered algorithm can be easily parallelized into threads provided that OpenMP technology is used, which allows one to productively distribute iterations of the for loop between threads that will use different processor cores. For example, Table 5 shows the time when processing data on a 20-core Core i7-12700H processor. When analyzing the performance of parallelizing iterations, you should keep in mind the architecture of the processor and the inequality of its cores.

4. Discussion

We have obtained an elegant and more efficient algorithm for finding the power of the set E U H n 3 . This problem makes not only theoretical but also practical sense if we remember that this parameter is taken into account when used as a key in the topological encryption algorithm [14].
It should be understood that the second-order signature is described only for 3-uniform hypergraphs, which does not currently allow us to construct an appropriate algorithm for E U H n k when k > 3 .
Therefore, the main directions for the development of further research are assumed to be the definition of high-order signatures, and eventually the general form of the signature σ k . It is also planned to continue studying the properties of the first- and second-order signatures, which will possibly improve the existing algorithms for determining the power of the set E U H n 3 , as well as open the way and the rule of their enumeration.
However, it should be noted that the basic CalcBases algorithm, although inferior to the new one in performance, allows us to separately find the number of bases that have the same number of elements. This can further help in understanding the overall logic of bases, and the structure of E U H n 3 itself. In addition, this algorithm allows us to search for bases for E U H n 4 and a higher order, while the counting time is significantly increased. For example, we obtained the following values for the power of the set E U H n 4 (Table 6). Hence, we should not completely abandon the algorithms on bases and should continue to investigate them from the point of view of further optimization.

Author Contributions

Conceptualization, A.M.; validation, E.E., V.L. and V.T.; formal analysis, E.E.; investigation, A.M. and E.E.; writing—original draft preparation, A.M. and V.L.; and writing—review and editing, V.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UHUniform hypergraph
EUHExtreme uniform hypergraph
RAMRandom access memory

References

  1. Berge, C. Hypergraphs Generalizing Bipartite Graphs; North-Holland: Amsterdam, The Netherlands, 1989; pp. 507–509. [Google Scholar]
  2. Berge, C. Hypergraphs; North-Holland: Amsterdam, The Netherlands, 1989. [Google Scholar]
  3. Ould-Khaoua, M. Hypergraph-Based Interconnection Networks for Large Multicomputers; University of Glasgow: Glasgow, UK, 1994. [Google Scholar]
  4. Yang, M.; Yang, Y. A Hypergraph Approach to Linear Network Coding in Multicast Networks. IEEE Trans. Parallel Distrib. Syst. 2010, 21, 968–982. [Google Scholar] [CrossRef]
  5. Mikov, A.I.; Mikov, A.A. Properties of Geometric Hypergraphs of Wireless Computer Networks. Informatiz. Svyaz 2020, 4, 60–66. [Google Scholar]
  6. Popkov, V.K. On Modeling City Traffic Systems with Hypernetworks. Autom. Remote Control 2011, 72, 1309–1318. [Google Scholar] [CrossRef]
  7. Zi-Ke, Z.; Chuang, L. A hypergraph model of social tagging networks. J. Stat. Mech. Theory Exp. 2010, 2010, 10005. [Google Scholar]
  8. Wang, F.; Wang, X.; Shao, B.; Li, T.; Ogihara, M. Tag Integrated Multi-Label Music Style Classification with Hypergraph. ISMIR 2009, 10, 363–368. [Google Scholar]
  9. Pliakos, K.; Kotropoulos, C. Personalized music tagging using ranking on hypergraphs. In Proceedings of the 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP), Athens, Greece, 21–23 May 2014; pp. 628–631. [Google Scholar]
  10. Mokrozub, V.G.; Nemtinov, V.A.; Mordvin, A.S.; Ilyasov, A.A. Application of n-oriented Hypergraphs and Relational Databases for Structural and Parametric Synthesis of Technical Systems. Prikl. Inform. 2010, 4, 115–122. [Google Scholar]
  11. Feng, Y.; You, H.; Zhang, Z.; Ji, R.; Gao, Y. Hypergraph Neural Networks. Proc. Aaai Conf. Artif. Intell. 2019, 33, 3558–3565. [Google Scholar] [CrossRef]
  12. Yi, J.; Park, J. Hypergraph Convolutional Recurrent Neural Network. In Proceedings of the KDD ’20: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, New York, NY, USA, 6–10 July 2020; pp. 3366–3376. [Google Scholar]
  13. Wang, F.; Pena-Pena, K.; Qian, W.; Arce, G.R. T-HyperGNNs: Hypergraph Neural Networks via Tensor Representations. In IEEE Transactions on Neural Networks and Learning Systems; IEEE: Piscataway, NJ, USA, 2024; pp. 1–15. [Google Scholar]
  14. Egorova, E.K.; Mokryakov, A.V.; Suvorova, A.A.; Tsurkov, V.I. Algorithm of Multidimensional Data Transmission Using Extremal Uniform Hypergraphs. J. Comput. Syst. Sci. Int. 2021, 60, 69–74. [Google Scholar] [CrossRef]
  15. Kamenev, A.R.; Irbitskii, I.S.; Pashkovskaya, E.A. Key search methods for encryption algorithms on graphs. In Proceedings of the Abstracts of Presentations at the XLVIII International Youth Scientific Conference Gagarin Readings (Pero, Moscow, 2022), Moscow, Russia, 12–15 April 2022; p. 252. (In Russian). [Google Scholar]
  16. Lezhinskii, M.V. The conception of topologically oriented hash-functions. In Proceedings of the Abstracts of Presentations at the XLVIII International Youth Scientific Conference Gagarin Readings (Pero, Moscow, 2022), Moscow, Russia, 12–15 April 2022; pp. 260–261. (In Russian). [Google Scholar]
  17. Suvorova, A.A.; Beretskii, I.S. A stream encryption algorithm on extremal k-uniform hypergraphs. In Proceedings of the Abstracts of Presentations at the International Youth Scientific Conference Gagarin Readings-2020 (MAI, Moscow, 2020), Moscow, Russia, 14–17 April 2020; pp. 510–511. (In Russian). [Google Scholar]
  18. Oliver, P.; Zhang, E.; Zhang, Y. Scalable Hypergraph Visualization. IEEE Trans. Vis. Comput. Graph. 2024, 30, 595–605. [Google Scholar] [CrossRef]
  19. Br städt, A.; Chepoi, V.D.; Dragan, F.F. The algorithmic use of hypertree structure and maximum neighbourhood orderings. Discret. Appl. Math. 1998, 82, 43–77. [Google Scholar] [CrossRef]
  20. Bobu, A.V.; Kupriyanov, A.E.; Raigorodskii, A.M. On the Number of Edges of a Uniform Hypergraph with a Range of Allowed Intersections. Probl. Inf. Transm. 2017, 53, 319–342. [Google Scholar] [CrossRef]
  21. Dinur, I.; Regev, O.; Smyth, C. The Hardness of 3-Uniform Hypergraph Coloring. Combinatorica 2005, 25, 519–535. [Google Scholar] [CrossRef]
  22. Cherkashin, D.; Kozic, J. A Note on Random Greedy Coloring of Uniform Hypergraphs. Random Struct. Algorithms 2015, 47, 407–413. [Google Scholar] [CrossRef]
  23. Egorova, E.K.; Mokryakov, A.V.; Yesenkov, A.S. Operations Over k-Homogeneous Hypergraphs and their Vectors of the Degrees of the Vertices. J. Comput. Syst. Sci. Int. 2020, 59, 381–386. [Google Scholar] [CrossRef]
  24. Davies, S.; Maenhaut, B.; Mitchell, J. I Perfect 1-factorisations of complete k-uniform hypergraphs. Australas. J. Comb. 2023, 85, 35–48. [Google Scholar]
  25. Ghosh, D.; Győri, E.; Nagy-György, J.; Paulos, A.; Xiao, C.; Zamora, O.I. Book free 3-uniform hypergraphs. Discret. Math. 2023, 347, 113828. [Google Scholar] [CrossRef]
  26. Aleksandrov, P.S. Combinatorial Topology; Gostekhteorizdat: Leningrad, Soviet Union, 1947; 660p. (In Russian) [Google Scholar]
  27. Raigorodskii, A.M.; Cherkashin, D.D. Extremal Problems in Hypergraph Colourings. Russ. Math. Surv. 2020, 75, 146. [Google Scholar] [CrossRef]
  28. Coregliano, L.N.; Razborov, A.A. Semantic limits of dense combinatorial objects. Russ. Math. Surv. 2020, 75, 627–723. [Google Scholar] [CrossRef]
  29. Boros, E.; Caro, Y.; Füredi, Z.; Yuster, R. Covering Non-uniform Hypergraphs. J. Comb. Theory Ser. 2001, 82, 270–284. [Google Scholar] [CrossRef]
  30. Balobanov, A.E.; Shabanov, D.A. On the Number of Independent Sets in Simple Hypergraphs. Math. Notes 2018, 103, 33–41. [Google Scholar] [CrossRef]
  31. Shirdel, G.H.; Vaez-Zadeh, B. Finding the shortest path for a Hypergraph. Discret. Math. Algorithms Appl. 2022, 14, 2150120. [Google Scholar] [CrossRef]
  32. Gao, J.; Zhao, Q.; Ren, W.; Swami, A.; Ramanathan, R.; Bar-Noy, A. Dynamic Shortest Path Algorithms for Hypergraphs. IEEE/Acm Trans. Netw. 2015, 23, 1805–1817. [Google Scholar] [CrossRef]
  33. Nguyen, S.; Pretolani, D.; Markenzon, L. On some path problems on oriented hypergraphs. Inform. ThéOrique Appl. 1998, 32, 1–20. [Google Scholar] [CrossRef]
  34. Bondarenko, V.A.; Nikolaev, A.V. A Class of Hypergraphs and Vertices of Cut Polytope Relaxations. Dokl. Math. 2012, 85, 46–47. [Google Scholar] [CrossRef]
  35. Pogrebnoi, V.K.; Pogrebnoi, A.V. Investigation of the polynomiality of the method for calculating the integral descriptor of the graph structure. Izv. Tomsk. Politekh. Univ. 2013, 323, 146–151. [Google Scholar]
  36. Mokryakov, A.V.; Tsurkov, V.I. Reconstructing 2-Complexes by a Nonnegative Integer-Valued Vector. Autom. Remote Control 2011, 72, 2541–2552. [Google Scholar] [CrossRef]
  37. Kostyanoi, D.S.; Mokryakov, A.V.; Tsurkov, V.I. Hypergraph Recovery Algorithms from a Given Vector of Vertex Degrees. J. Comput. Syst. Sci. Int. 2014, 53, 511–516. [Google Scholar] [CrossRef]
  38. Mironov, A.A. Geometry of the points in the space Rn that can be realized in a graph. Usp. Mat. Nauk 1977, 32, 232–233. [Google Scholar]
  39. Goltsova, T.Y.; Egorova, E.K.; Mokryakov, A.V.; Tsurkov, V.I. Signatures of Extremal 2-Unifrom Hypergraphs. J. Comput. Syst. Sci. Int. 2021, 60, 904–912. [Google Scholar] [CrossRef]
  40. Denisov, I.O.; Shabanov, D.A. On the Concentration of the Independence Numbers of Random Hypergraphs. Diskretn. Mat. 2021, 33, 32–46. [Google Scholar] [CrossRef]
  41. Zakharov, P.A.; Shabanov, D.A. On the Maximal Cut in a Random Hypergraph. Dokl. Math. 2021, 104, 336–339. [Google Scholar] [CrossRef]
  42. Pólya, G. Kombinatorische Anzahlbestimmungen für Gruppen, Graphen und chemische Verbindungen. Acta Math. 1937, 68, 145–254. [Google Scholar] [CrossRef]
  43. Gilbert, E.N. Enumeration of Labelled Graphs. Canad. J. Math. 1956, 8, 405–411. [Google Scholar] [CrossRef]
  44. Nijenhuis, A.; Wilf, H.S. The Enumeration of Connected Graphs and Linked Diagrams. J. Comb. Theory. Ser. A. 1979, 27, 356–359. [Google Scholar] [CrossRef]
  45. Harary, F.; Palmer, E.M. Graphical Enumeration; Elsevier: Amsterdam, The Netherlands, 1973. [Google Scholar]
  46. Mironov, A.A.; Tsurkov, V.I. Network Models with Fixed Parameters at the Communication Nodes. 1. J. Comput. Syst. Sci. Int. 1995, 33, 107–116. [Google Scholar]
  47. Mironov, A.A.; Tsurkov, V.I. Network Models with Fixed Parameters at the Communication Nodes. 2. J. Comput. Syst. Sci. Int. 1994, 32, 1–11. [Google Scholar]
  48. Prüfer, H. Neuer Beweis eines Satzes über Permutationen. Arch. Math. Phys. 1918, 27, 742–744. [Google Scholar]
  49. Beretskii, I.S.; Egorova, E.K.; Mokryakov, A.V.; Tsurkov, V.I. Combination of Bases and an Evaluation of the Set of Extremal 3-Uniform Hypergraphs. J. Comput. Syst. Sci. Int. 2023, 62, 815–825. [Google Scholar] [CrossRef]
  50. Alon, N. Transversal numbers of uniform hypergraphs. Graphs Comb. 1990, 6, 1–4. [Google Scholar] [CrossRef]
  51. Qian, J. Enumeration of unlabeled uniform hypergraphs. Discret. Math. 2014, 326, 66–74. [Google Scholar] [CrossRef]
  52. Mironov, A.A. Minimax under Transportation Constraints; Kluwer Academic Publishers: London, UK, 1999; 309p. [Google Scholar]
  53. Mironov, A.A. Uniform generalized graphs. Dokl. Akad. Nauk. 1996, 351, 465–468. [Google Scholar]
  54. Mokryakov, A.V. Hypergraphs as Algebraic Structures. J. Comput. Syst. Sci. Int. 2011, 50, 734–740. [Google Scholar] [CrossRef]
  55. Mironov, A.A.; Mokryakov, A.V.; Sokolov, A.A. About Realization of Integer Non-Negative Numbers Tuple into 2-Dimensional Complexes. Appl. Comput. Math. 2007, 6, 58–68. [Google Scholar]
  56. Goltsova, T.Y.; Egorova, E.K.; Leonov, V.Y.; Mokryakov, A.V. First and Second Order Signatures of Extreme Uniform Hypergraphs and Their Relationship with Vectors of the Vertex Degrees. J. Comput. Syst. Sci. Int. 2023, 62, 663–676. [Google Scholar] [CrossRef]
  57. Egorova, E.; Mokryakov, A.; Tsurkov, V. Algebra of Signatures for Extreme 2-Uniform Hypergraphs. Axioms 2023, 12, 1123. [Google Scholar] [CrossRef]
Figure 1. Hypergraph H from Example 1.
Figure 1. Hypergraph H from Example 1.
Axioms 13 00364 g001
Figure 2. Adjacency matrix for H from Example 1.
Figure 2. Adjacency matrix for H from Example 1.
Axioms 13 00364 g002
Table 1. The number of bases and the time taken to find them at different n.
Table 1. The number of bases and the time taken to find them at different n.
n B n 3 Time, c. t n / t n 1
32<0.001
45<0.001
516<0.001
6660.0022
73520.0042
824310.0112.75
921,7600.0211.9
10252,5860.0452.14
113,803,6480.0621.4
1274,327,1450.1812.9
131,885,102,0803.619.9
1462,062,015,500118.532.9
152,652,584,509,440530044.7
16147,198,472,495,020304,63657.5
Table 2. Number of enabled signatures for signature σ 0 in the range from 0 to 31.
Table 2. Number of enabled signatures for signature σ 0 in the range from 0 to 31.
σ 0 Count σ σ 0 σ 0 Count σ σ 0
01161
11172
21183
32195
41204
52218
632211
752316
81245
922511
1032617
1152727
1242821
1382939
14113050
15163166
Table 3. Bitwise representation of signatures from q 1 and q 2 when n = 6 .
Table 3. Bitwise representation of signatures from q 1 and q 2 when n = 6 .
σ 1 i BIN( σ 1 i ) σ 2 i BIN( σ 2 i )
8010001610000
9010011710001
10010101810010
11010111910011
12011002010100
13011012110101
14011102210110
15011112310111
Table 4. Included signatures and their cardinality for σ 0 = 48 , 63 ¯ .
Table 4. Included signatures and their cardinality for σ 0 = 48 , 63 ¯ .
σ 0 σ i σ 0 σ σ i 2
24 ( 0 , 1 , 2 , 4 , 8 ) 1 + 1 + 1 + 1 + 1 = 5
25 ( 0 , 1 , 2 , 3 , 4 , 5 , 8 , 9 ) 1 + 1 + 1 + 2 + 1 + 2 + 1 + 2 = 11
26 ( 0 , 1 , 2 , 3 , 4 , 5 , 6 , 8 , 9 , 10 ) 1 + 1 + 1 + 2 + 1 + 2 + 3 + 1 + 2 + 3 = 17
27 ( 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 ) 1 + 1 + 1 + 2 + 1 + 2 + 3 + 5 + 1 + 2 + 3 + 5 = 27
28 ( 0 , 1 , 2 , 3 , 4 , 5 , 6 , 8 , 9 , 10 , 12 ) 1 + 1 + 1 + 2 + 1 + 2 + 3 + 1 + 2 + 3 + 4 = 21
29 ( 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 ) 1 + 1 + 1 + 2 + 1 + 2 + 3 + 5 + 1 + 2 + 3 + 5 + 4 + 8 = 39
30 ( 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 ) 1 + 1 + 1 + 2 + 1 + 2 + 3 + 5 + 1 + 2 + 3 + 5 + 4 + 8 + 11 = 50
31 ( 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 ) 1 + 1 + 1 + 2 + 1 + 2 + 3 + 5 + 1 + 2 + 3 + 5 + 4 + 8 + 11 + 16 = 66
Table 5. The cardinality of second-order signatures set generated by the signature σ n = 2 n 1 1 , where n—the number of vertices from E U H n 3 , and the time taken to find them at different n.
Table 5. The cardinality of second-order signatures set generated by the signature σ n = 2 n 1 1 , where n—the number of vertices from E U H n 3 , and the time taken to find them at different n.
n σ n σ 2 n 1 1 2 ( n ) Time, c.Parallel Time, c.
332<0.001<0.001
475<0.001<0.001
51516<0.001<0.001
63166<0.001<0.001
763352<0.001<0.001
81272431<0.001<0.001
925521,7600.001<0.001
10511252,5860.0020.001
1110233,803,6480.0030.002
122,04774,327,1450.0080.003
1340951,885,102,0800.0280.006
14819162,062,015,5000.1010.015
1516,3832,652,584,509,4400.4280.047
1632,767147,198,472,495,0201.7290.171
1765,53510,606,175,914,819,5846.7420.725
18131,071992,340,657,705,109,41627.9812.994
Table 6. The number of E U H n 4 and the time taken to find them at different n.
Table 6. The number of E U H n 4 and the time taken to find them at different n.
n B n 3 Time, c.
42<0.001
56<0.001
632<0.001
7352<0.001
893040.002
9683,4640.04
10161,960,2206
11143,145,033,0043827
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Egorova, E.; Leonov, V.; Mokryakov, A.; Tsurkov, V. Finding Set Extreme 3-Uniform Hypergraphs Cardinality through Second-Order Signatures. Axioms 2024, 13, 364. https://doi.org/10.3390/axioms13060364

AMA Style

Egorova E, Leonov V, Mokryakov A, Tsurkov V. Finding Set Extreme 3-Uniform Hypergraphs Cardinality through Second-Order Signatures. Axioms. 2024; 13(6):364. https://doi.org/10.3390/axioms13060364

Chicago/Turabian Style

Egorova, Evgeniya, Vladislav Leonov, Aleksey Mokryakov, and Vladimir Tsurkov. 2024. "Finding Set Extreme 3-Uniform Hypergraphs Cardinality through Second-Order Signatures" Axioms 13, no. 6: 364. https://doi.org/10.3390/axioms13060364

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop