Combinatorics of Set Partitions 1st Edition Toufik Mansour instant download
Combinatorics of Set Partitions 1st Edition Toufik Mansour instant download
https://ebookname.com/product/combinatorics-of-set-
partitions-1st-edition-toufik-mansour/
https://ebookname.com/product/combinatorics-of-permutations-1st-
edition-miklos-bona/
https://ebookname.com/product/the-naqab-bedouins-a-century-of-
politics-and-resistance-mansour-nasasra/
https://ebookname.com/product/combinatorics-of-genome-
rearrangements-1st-edition-guillaume-fertin/
https://ebookname.com/product/the-alaska-state-constitution-1st-
edition-knowles/
Spinoza Complete works First Edition Benedictus De
Spinoza
https://ebookname.com/product/spinoza-complete-works-first-
edition-benedictus-de-spinoza/
https://ebookname.com/product/vaccinia-virus-and-poxvirology-
methods-and-protocols-2nd-edition-stuart-n-isaacs-auth/
https://ebookname.com/product/labour-in-southeast-asia-local-
processes-in-a-globalised-world-changing-labour-relations-in-
asia-1st-edition-becky-elmhirst-editor/
https://ebookname.com/product/childhood-family-and-sociocultural-
change-in-india-reinterpreting-the-inner-world-1st-edition-
dinesh-sharma-editor/
https://ebookname.com/product/the-scientific-outlook-1st-edition-
bertrand-russell/
A Reader in Health Policy and Management 1st Edition
Ann Mahon
https://ebookname.com/product/a-reader-in-health-policy-and-
management-1st-edition-ann-mahon/
COMBINATORICS
OF SET
PARTITIONS
Jonathan L. Gross and Jay Yellen, Graph Theory and Its Applications, Second Edition
Jonathan L. Gross and Jay Yellen, Handbook of Graph Theory
David S. Gunderson, Handbook of Mathematical Induction: Theory and Applications
Richard Hammack, Wilfried Imrich, and Sandi Klavžar, Handbook of Product Graphs,
Second Edition
Darrel R. Hankerson, Greg A. Harris, and Peter D. Johnson, Introduction to Information Theory
and Data Compression, Second Edition
Darel W. Hardy, Fred Richman, and Carol L. Walker, Applied Algebra: Codes, Ciphers, and
Discrete Algorithms, Second Edition
Daryl D. Harms, Miroslav Kraetzl, Charles J. Colbourn, and John S. Devitt, Network Reliability:
Experiments with a Symbolic Algebra Environment
Silvia Heubach and Toufik Mansour, Combinatorics of Compositions and Words
Leslie Hogben, Handbook of Linear Algebra
Derek F. Holt with Bettina Eick and Eamonn A. O’Brien, Handbook of Computational Group Theory
David M. Jackson and Terry I. Visentin, An Atlas of Smaller Maps in Orientable and
Nonorientable Surfaces
Richard E. Klima, Neil P. Sigmon, and Ernest L. Stitzinger, Applications of Abstract Algebra
with Maple™ and MATLAB®, Second Edition
Richard E. Klima and Neil P. Sigmon, Cryptology: Classical and Modern with Maplets
Patrick Knupp and Kambiz Salari, Verification of Computer Codes in Computational Science
and Engineering
William Kocay and Donald L. Kreher, Graphs, Algorithms, and Optimization
Donald L. Kreher and Douglas R. Stinson, Combinatorial Algorithms: Generation Enumeration
and Search
Hang T. Lau, A Java Library of Graph Algorithms and Optimization
C. C. Lindner and C. A. Rodger, Design Theory, Second Edition
Nicholas A. Loehr, Bijective Combinatorics
Toufik Mansour, Combinatorics of Set Partitions
Alasdair McAndrew, Introduction to Cryptography with Open-Source Software
Elliott Mendelson, Introduction to Mathematical Logic, Fifth Edition
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied
Cryptography
Stig F. Mjølsnes, A Multidisciplinary Introduction to Information Security
Jason J. Molitierno, Applications of Combinatorial Matrix Theory to Laplacian Matrices of Graphs
Richard A. Mollin, Advanced Number Theory with Applications
Richard A. Mollin, Algebraic Number Theory, Second Edition
Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times
Richard A. Mollin, Fundamental Number Theory with Applications, Second Edition
Richard A. Mollin, An Introduction to Cryptography, Second Edition
Richard A. Mollin, Quadratics
Richard A. Mollin, RSA and Public-Key Cryptography
Carlos J. Moreno and Samuel S. Wagstaff, Jr., Sums of Squares of Integers
Goutam Paul and Subhamoy Maitra, RC4 Stream Cipher and Its Variants
Dingyi Pei, Authentication Codes and Combinatorial Designs
Kenneth H. Rosen, Handbook of Discrete and Combinatorial Mathematics
Douglas R. Shier and K.T. Wallenius, Applied Mathematical Modeling: A Multidisciplinary
Approach
Alexander Stanoyevitch, Introduction to Cryptography with Mathematical Foundations and
Computer Implementations
Jörn Steuding, Diophantine Analysis
Douglas R. Stinson, Cryptography: Theory and Practice, Third Edition
Roberto Togneri and Christopher J. deSilva, Fundamentals of Information Theory and Coding
Design
W. D. Wallis, Introduction to Combinatorial Designs, Second Edition
W. D. Wallis and J. C. George, Introduction to Combinatorics
Lawrence C. Washington, Elliptic Curves: Number Theory and Cryptography, Second Edition
COMBINATORICS
OF SET
PARTITIONS
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information stor-
age or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a pho-
tocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Preface xix
Acknowledgment xxv
1 Introduction 1
1.1 Historical Overview and Earliest Results . . . . . . . . . . . 1
1.2 Timeline of Research for Set Partitions . . . . . . . . . . . . 10
1.3 A More Detailed Book . . . . . . . . . . . . . . . . . . . . . 20
1.3.1 Basic Results . . . . . . . . . . . . . . . . . . . . . . . 20
1.3.2 Statistics on Set Partitions . . . . . . . . . . . . . . . 21
1.3.3 Pattern Avoidance in Set Partitions . . . . . . . . . . 23
1.3.4 Restricted Set Partitions . . . . . . . . . . . . . . . . . 25
1.3.5 Asymptotics Results on Set Partitions . . . . . . . . . 25
1.3.6 Generating Set Partitions . . . . . . . . . . . . . . . . 26
1.3.7 Normal Ordering and Set Partitions . . . . . . . . . . 27
1.4 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
ix
B Identities 501
I Tables 537
J Notation 543
Bibliography 547
Index 573
xv
6.11 The number aτ (n) of set partitions of [n] that contain a subse-
quence pattern of size five, where n = 5, 6, . . . , 11 . . . . . . . 303
3.1 The circular representation and the line diagram of the set par-
tition 18/235/47/6 . . . . . . . . . . . . . . . . . . . . . . . . 90
3.2 A graphical representation of the set partition π = 1231242 . 96
3.3 The standard representation of 1357/26/4/89 . . . . . . . . . 96
3.4 The standard representation of 4/235/167/89 and its corre-
sponding Dyck path . . . . . . . . . . . . . . . . . . . . . . . 97
3.5 A rook placement . . . . . . . . . . . . . . . . . . . . . . . . . 99
3.6 A rook placement representation of 1357/26/4/89 . . . . . . . 100
xvii
This book gives an introduction to and an overview of the methods used in the
combinatorics of pattern avoidance and pattern enumeration in set partitions,
a very active area of research in the last decade. The first known application
of set partitions arose in the context of tea ceremonies and incense games in
Japanese upper class society around A.D. 1500. Guests at a Kado ceremony
would be smelling cups with burned incense with the goal to either identity the
incense or to identity which cups contained identical incense. There are many
variations of the game, even today. One particular game is named genji-ko,
and it is the one that originated the interest in set partitions. Five different
incense were cut into five pieces, each piece put into a separate bag, and then
five of these bags were chosen to be burned. Guests had to identify which
of the five incense were the same. The Kado ceremony masters developed
symbols for the different possibilities, so-called genji-mon. Each such symbol
consists of five vertical bars, some of which are connected by horizontal bars.
Fifty-two symbols were created, and for easier memorization, each symbol was
identified with one of the fifty-four chapters of the famous Tale of Genji by
Lady Murasaki. In time, these genji-mon and two additional symbols started
to be displayed at the beginning of each chapter of the Tale of Genji and
in turn became part of numerous Japanese paintings. They continued to be
popular symbols for family crests and Japanese kimono patterns in the early
20th century and can be found on T-shirts sold today.
Until the late 1960s, individual research papers on various aspects of set
partitions appeared, but there was no focused research interest. This changed
after the 1970s, when several groups of authors developed new research di-
rections. They studied set partitions under certain set of conditions, and not
only enumerated the total number of these objects, but also certain of their
characteristics. Other focuses were the relation between the algebra and set
partitions such as the noncrossing set partitions, the appearance of set parti-
tions in physics where the number of set partitions is a good language to find
explicit formula for normal ordering form of an expression of boson operators,
and the study of random set partition to obtain asymptotics results.
We wrote this book to provide a comprehensive resource for anybody in-
terested in this new area of research. It will combine the following in one
place:
xix
• present several links between set partitions and other areas of math-
ematics, and in normal ordering form of expressions of boson operators
in physics,
• describe a variety of tools and approaches that are also useful to other
areas of enumerative combinatorics.
Audience
The book is intended primarily for advanced undergraduate and graduate
students in discrete mathematics with a focus on set partitions. Additionally,
the book serves as a one-stop reference for a bibliography of research activities
on the subject, known results, and research directions for any researcher who
is interested to study this topic. The main chapter of the book is based on the
research papers of the author and his coauthors.
Outline
In Chapter 1 we present a historical perspective of the research on set
partitions and give very basic definitions and early results. This is followed
by an overview of the major themes of the book: Dobiński’s formula and
representations of set partitions, subword statistics on set partitions, nonsub-
word statistics on set partitions, pattern avoidance in set partitions, multi-
pattern avoidance in set partitions, asymptotics and random set partitions,
Gray codes, loopless algorithm and set partitions, and normal ordering and
set partitions. We also provide a time line for the articles in these major areas
of research.
In Chapter 2 we introduce techniques to solve recurrence relations, which
arise naturally when counting set partitions. This chapter contains several
basic examples to illustrate out techniques on solving recurrence relations.
We also provide the basic definitions and basic combinatorial techniques that
are used throughout the book such as Dyck paths, Motzkin paths, generating
trees, Lagrange inversion formula, and the principle of inclusion and exclusion.
In Chapter 3 we focussed on basic steps for set partitions. We start by
presenting Dobiński’s formula and its extensions. Then we provide different
representations of set partitions, where some of them are nonattractive rep-
resentations and other are attractive representations in the set partitions re-
search. For the nonattractive representations, we provide the full results on our
area. But for the attractive representations we only give very basic definitions
and results, leaving the full discussions to the rest of the book chapters.
Chapter 4 deals with statistics on set partitions, where we use the term
statistic exclusively for subword statistics (counting occurrences of a subword
pattern), for instance, the number times two adjacent terms in a set parti-
tion are the same. We connect early research on the rises, levels, and falls of
statistics with the enumeration of subword patterns. Also we consider subword
pattern of length three and general longer subword patterns.
Chapter 5 completes the study of the previous chapter by dealing with
statistics on set partitions, where our statistics have not been introduced “nat-
urally” by subword patterns. Here, we focus on different types of statistics,
where the research on set partitions has taken interest in them. For instance,
we deal with major index, inversions, records, weak records, sum of positions
of records on set partitions, crossings, nestings, alignments, etc. We also con-
sider the case of generalized patterns in set partitions.
In Chapter 6 we present results on pattern avoidance for subsequence,
generalized patterns and partially ordered patterns. We provide a complete
classification with respect to Wilf-equivalence for subsequence patterns with
sizes three to seven. We also provide exact formulas for patterns of sizes three
and four, and some formulas for other patterns. Our basic tools is based on
pattern-avoidance fillings of diagrams, where it has received a lot of atten-
tion, for example, in the research articles of Backelin, Krattenthaler, de Mier,
Rubey West, and Xin. We conclude the chapter with results on avoidance of
generalized patterns and partially ordered patterns.
Chapter 7 deals with multi-restrictions on set partitions. Indeed, this chap-
ter complements the previous chapter by providing a complete classification
with respect to Wilf-equivalence for two (or more) subsequence patterns with
sizes four, and for two subsequence patterns with one of size three and an-
other for sizes up to 20. Noncrossing set partitions also have received a lot of
attention in this chapter, where we provide a full classification with respect
to Wilf-equivalence for two subsequence patterns (1212, τ ) with patterns τ of
sizes four and five. We conclude the chapter with links between set partitions
and other combinatorial sequences such as left Moztkin numbers, sequence
A054391, generalized Catalan numbers, Catalan numbers, and Pell numbers.
At the end of this chapter we present other types of multi-restrictions that have
not been created from subsequence/generalized patterns such as d-regular set
partitions, distances and singletons and set partitions, and block-connected
set partitions.
The chapters build upon each other, with exception of the last three chap-
ters, which can be read (almost) independently of previous chapters. Most
chapters start with a section describing the history of the particular topic
and its relations to other pervious chapters. New methods and definitions are
illustrated with worked examples, and (sometimes) we provide Maple code.
At the end of each chapter we present a list of exercises that correspond to
the topics in the chapter, where some of them are related to published re-
search papers. Then we provide research directions that extend the results
given in the chapter. Questions posed in the research directions can be used
for projects, thesis topics, or research.
Support Features
We have included hints and answers to exercises in Appendix A. In ad-
dition, the C++ programs and their outputs can be downloaded from the
author’s web page http://math.haifa.ac.il/manbook.html. We will regularly
update the author’s web page to post references to new papers in this re-
search area as well as any corrections that might be necessary. (No matter
how hard we try, we know that there will be typos.) We invite readers to give
us feedback at tmansour@univ.haifa.ac.il.
Every book has a story of how it came into being and the people that sup-
ported the author(s) along the way. Ours is no exception. The idea for this
book came when Mark Shattuck emailed the author asking some enumera-
tion problems on set partitions, after collaborating via the Internet on a few
papers. Toufik had been working on several combinatorial problems on set
partitions and had a background in pattern avoidance in different combinato-
rial families such as permutations, words, and compositions. Combining these
lines of inquiry, he started to work on pattern avoidance in set partitions.
Several years later, after a mostly long-distance collaboration that has
made full use of modern electronic technology (e-mail and Skype1 ), this book
has taken its final shape. Along the way we have received encouragement
for our endeavor from William Y.C. Chen, Mark Dukes, Vı́t Jelı́nek, Silvia
Heubach, Arnold Knopfmacher, Augustine Munagi, Matthias Schork, Simone
Severini, Armend Sh. Shabani, Mark Shattuck, and Chunwei Song. A special
thanks to Armend Sh. Shabani for reading the previous version of this book.
And then there are the people in our lives who supported us on a daily basis
by giving us the time and the space to write this book. Their moral support
has been very important. Toufik thanks his wife Ronit for her support and
understanding when the work on the book took him away from spending time
with her and from playing with their children Itar, Atil, and Hadil. Also,
Toufik thanks our larger families for cheering us on and supporting us even
though they do not understand the mathematics that we have described.
xxv
Toufik Mansour obtained his Ph.D. degree in mathematics from the Uni-
versity of Haifa in 2001. He spent one year as a postdoctoral researcher at
the University of Bordeaux (France) supported by a Bourse Chateaubriand
scholarship, and a second year at the Chalmers Institute in Gothenburg (Swe-
den) supported by a European Research Training Network grant. He has also
received a prestigious MAOF grant from the Israeli Council for Education.
Toufik has been a permanent faculty member at the University of Haifa since
2003 and was promoted to associate professor in 2008. He spends his summers
as a visitor at institutions around the globe, for example, at the Center for
Combinatorics at Nankai University (China) where he was a faculty member
from 2004 to 2007, and at The John Knopfmacher Center for Applicable Anal-
ysis and Number Theory, University of the Witwatersrand (South Africa).
Toufik’s area of specialty is enumerative combinatorics, and more generally,
discrete mathematics and its applications to physics, biology, and chemistry.
Originally focusing on pattern avoidance in permutations, he has extended
his interest to colored permutations, set partitions, words, and compositions.
Toufik has authored or co-authored more than 200 papers in this area, many
of them concerning the enumeration of set partitions. He has given talks at
national and international conferences and is very active as a reviewer for
several journals, including Advances in Applied Mathematics, Ars Combina-
torica, Discrete Mathematics, Discrete Applied Mathematics, European Jour-
nal of Combinatorics, Journal of Integer Sequences, Journal of Combinatorial
Theory Series A, Annals of Combinatorics, and the Electronic Journal of
Combinatorics.
xxvii
Murasaki. Figure 1.1 shows the diagrams1 used in the tea ceremony game. In
1 www.viewingjapaneseprints.net/texts/topictexts/artist varia topics/genjimon7.html
Example 1.2 The set partitions of the set {1, 3, 5} are given by
{1, 3, 5}; {1, 3}, {5}; {1, 5}, {3}; {1}, {3, 5} and {1}, {3}, {5}.
Definition 1.3 Let π be any set partition of the set [n] = {1, 2, . . . , n}. We
represent π in either sequential or canonical form. In the sequential form, each
block is represented as sequence of increasing numbers and different blocks
are separated by the symbol /. In the canonical representation, we indicate
for each integer the block in which it occurs, that is, π = π1 π2 · · · πn such
that j ∈ Bπj , 1 ≤ j ≤ n. We denote the set of all set partitions of [n] by
Pn = P([n]), and the number of all set partitions of [n] by pn = |Pn |, with
p0 = 1 (as there is only one set partition of the empty set). Also, we denote
the set of all set partitions of [n] with exactly k blocks by Pn,k .
Example 1.4 The set partitions of [3] in sequential form are 1/2/3, 1/23,
12/3, 13/2, and 123, while the set partitions of [3] in canonical representation
are 123, 122, 112, 121, and 111, respectively. Thus, p3 = 5.
Example 1.5 The set partition 14/257/3/6 has canonical form 1231242. We
have that π1 = π4 = 1, as both 1 and 4 are in the first block. Likewise,
π2 = π5 = π7 = 2, as 2, 5, and 7 are in the second block.
THE END.
*** END OF THIS PROJECT GUTENBERG EBOOK LOST IN THE
WILDS ***
*** END OF THE PROJECT GUTENBERG EBOOK LOST IN THE
WILDS: A CANADIAN STORY ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com