{"title":"Symbol Separation in Double Occurrence Words","authors":"N. Jonoska, M. Saito, Hwee Kim, Brad Mostowski","doi":"10.1142/s0129054120500343","DOIUrl":"https://doi.org/10.1142/s0129054120500343","url":null,"abstract":"A double occurrence word (DOW) is a word in which every symbol appears exactly twice. We define the symbol separation of a DOW [Formula: see text] to be the number of letters between the two copies of a symbol, and the separation of [Formula: see text] to be the sum of separations over all symbols in [Formula: see text]. We then analyze relationship among size, reducibility and separation of DOWs. Specifically, we provide tight bounds of separations of DOWs with a given size and characterize the words that attain those bounds. We show that all separation numbers within the bounds can be realized. We present recursive formulas for counting the numbers of DOWs with a given separation under various restrictions, such as the number of irreducible factors. These formulas can be obtained by inductive construction of all DOWs with the given separation.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Identification of Node Importance Based on Agglomeration in Cycle-Related Networks","authors":"Aysun Asena Kunt, Zeynep Nihan Berberler","doi":"10.1142/s0129054120500379","DOIUrl":"https://doi.org/10.1142/s0129054120500379","url":null,"abstract":"The identification of node importance in complex networks is of theoretical and practical significance for improving network robustness and invulnerability. In this paper, the importance of each node is evaluated and important nodes are identified in cycles and related networks by node contraction method based on network agglomeration. This novel method considers both the degree and the position of the node for the identifying the importance of the node. The effectiveness and the feasibility of this method was also validated through experiments on different types of complex networks.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126266771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special Issue Developments in Language Theory 2018 - Preface","authors":"S. Seki","doi":"10.1142/s0129054120020025","DOIUrl":"https://doi.org/10.1142/s0129054120020025","url":null,"abstract":"","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Complexity of Binary Threshold Sequences Derived from Generalized Polynomial Quotient with Prime-Power Modulus","authors":"Lianhua Wang, Xiaoni Du","doi":"10.1142/s0129054120500264","DOIUrl":"https://doi.org/10.1142/s0129054120500264","url":null,"abstract":"In this paper, firstly we extend the polynomial quotient modulo an odd prime p to its general case with modulo pr and r ≥ 1. From the new quotient proposed, we define a class of pr+1-periodic binar...","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"11 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120909816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"k-Fibonacci Cubes: A Family of Subgraphs of Fibonacci Cubes","authors":"Ö. Eğecioğlu, Elif Saygı, Zülfükar Saygı","doi":"10.1142/s0129054120500318","DOIUrl":"https://doi.org/10.1142/s0129054120500318","url":null,"abstract":"Hypercubes and Fibonacci cubes are classical models for interconnection networks with interesting graph theoretic properties. We consider k-Fibonacci cubes, which we obtain as subgraphs of Fibonacc...","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130432084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weak Separation Problem for Tree Languages","authors":"S. Alirezazadeh, Khadijeh Alibabaei","doi":"10.1142/s0129054120500276","DOIUrl":"https://doi.org/10.1142/s0129054120500276","url":null,"abstract":"Forest algebras are defined for investigating languages of forests [ordered sequences] of unranked trees, where a node may have more than two [ordered] successors. They consist of two monoids, the ...","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"33 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting","authors":"Juyan Li, Chunguang Ma, Zhen Gu","doi":"10.1142/s0129054120500252","DOIUrl":"https://doi.org/10.1142/s0129054120500252","url":null,"abstract":"Proxy Re-Encryption (PRE) is a cryptographic primitive that allows a proxy to turn an Alice’s ciphertext into a Bob’s ciphertext on the same plaintext. All of the PRE schemes are public key encrypt...","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130522477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zi Jing Chern, K. Subramanian, Azhana Ahmad, W. C. Teh
{"title":"A New Study of Parikh Matrices Restricted to Terms","authors":"Zi Jing Chern, K. Subramanian, Azhana Ahmad, W. C. Teh","doi":"10.1142/s0129054120500306","DOIUrl":"https://doi.org/10.1142/s0129054120500306","url":null,"abstract":"Parikh matrices as an extension of Parikh vectors are useful tools in arithmetizing words by numbers. This paper presents a further study of Parikh matrices by restricting the corresponding words t...","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128683122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Alamro, Mai Alzamel, C. Iliopoulos, S. Pissis, Steven Watts, W. Sung
{"title":"Efficient Identification of k-Closed Strings","authors":"H. Alamro, Mai Alzamel, C. Iliopoulos, S. Pissis, Steven Watts, W. Sung","doi":"10.1007/978-3-319-65172-9_49","DOIUrl":"https://doi.org/10.1007/978-3-319-65172-9_49","url":null,"abstract":"","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Palindromic Characteristic of Committed Graphs and Some Model Theoretic Properties","authors":"A. Cevik","doi":"10.1142/s0129054120500203","DOIUrl":"https://doi.org/10.1142/s0129054120500203","url":null,"abstract":"We bring into attention the interplay between model theory of committed graphs (1-regular graphs) and their palindromic characteristic in the domain of formal languages. We prove some model theoret...","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}