Mathematical Problems in Engineering

Mathematical Problems in Engineering / 2020 / Article
Special Issue

Control Problems of Nonlinear Systems with Applications 2020

View this Special Issue

Research Article | Open Access

Volume 2020 |Article ID 5369859 | https://doi.org/10.1155/2020/5369859

Zhenbin Liu, Yuqiang Wu, "-Label Coloring Problem with Application to Channel Allocation", Mathematical Problems in Engineering, vol. 2020, Article ID 5369859, 8 pages, 2020. https://doi.org/10.1155/2020/5369859

-Label Coloring Problem with Application to Channel Allocation

Academic Editor: Cuimei Jiang
Received03 Apr 2020
Accepted04 May 2020
Published03 Jun 2020

Abstract

In this paper, the -coloring problem of the graph is studied with application to channel allocation of the wireless network. First, by introducing two new logical operators, some necessary and sufficient conditions for solving the -coloring problem are given. Moreover, it is noted that all solutions of the obtained logical equations are corresponding to each coloring scheme. Second, by using the semitensor product, the necessary and sufficient conditions are converted to an algebraic form. Based on this, all coloring schemes can be obtained through searching all column indices of the zero columns. Finally, the obtained result is applied to analyze channel allocation of the wireless network. Furthermore, an illustration example is given to show the effectiveness of the obtained results in this paper.

1. Introduction

It is well known that the coloring problem is a basic and classical problem in graph theory. Graph coloring is originated from famous conjecture called four-colour conjecture [1] and widely used in many real-life areas [24], such as scheduling and timetabling in engineering, air traffic flow management, and channel allocation of mobiles. There are various forms of graph coloring, such as set coloring, list coloring, -coloring, and -coloring ( denotes a nonnegative integer, ). The labeling problems of graphs arise in many networking and telecommunication contexts. The channel allocation problem is first formulated as a graph coloring problem by Hale [5]. Furthermore, Griggs and Yeh formulated this problem as a graph labeling problem [6]. -label coloring is one kind of graph labeling, which has major application in channel allocation [5, 710]. Thus, it is still more interesting to introduce a new method to study the coloring problem.

Recently, Cheng et al. and Li et al. provided a new mathematical method, which is called the semitensor product with matrices [1113] to study logical systems [1423], probability logical networks [24, 25], game theory [26, 27], coloring problem [1, 10, 28], and some other related fields [2931]. Wang et al. first studied the graph problem by using the semitensor product [1]. In [1], the maximum (weight) stable set and vertex coloring problems of graphs were investigated with application to the group consensus of multiagent systems, and an algorithm was established to find all the internally stable sets for any graph. In [28], Zhong et al. investigated the minimum stable set and core of the graph and established an algorithm to find all the externally stable sets.

This paper studies the -coloring problem of the graph with application to channel allocation of the wireless network. Some necessary and sufficient conditions for solving the -coloring problem are first made by introducing two new logical operators. Moreover, it is noted that all solutions of the obtained logical equations are corresponding to each coloring scheme. Then, by using the semitensor product, the necessary and sufficient conditions are converted to an algebraic form. Based on this, all coloring schemes can be obtained through searching all column indices of the zero columns. Finally, the obtained results are applied to analyze channel allocation of the wireless network. Furthermore, an illustration example is given to show the effectiveness of the obtained results in this paper.

The rest of this paper is organized as follows. Section 2 gives some necessary preliminaries on the semitensor product of matrices and -labeling. The main results are shown in Section 3. In Section 4, we apply the obtained results to the channel allocation of the wireless network, which is followed by the conclusion in Section 5.

2. Preliminaries

In this section, we give some necessary preliminaries on the semitensor product, the pseudo-Boolean function, and graph theory, which will be used in the sequel.

First, we give some notations to be used in this paper., especially, .: the -th column of the identity matrix .Denote by the -th column of matrix and by the set of all columns of matrix .: the set of real matrices, where denotes the set of real numbers., and for simplicity, let . Identify , , which implies , where means they are equivalent.A matrix is called a logical matrix if columns of are of the form of . Denote by the set of logical matrices.If , it can be expressed as . For the sake of compactness, it is briefly denoted by .

Next, we give some definitions and results about the semitensor product.

Definition 1. (see [11]). The semitensor product of two matrices and iswhere is the least common multiple of and and is the Kronecker product.
Throughout this paper, the default matrix product is the semitensor product. The semitensor product is a generalization of the conventional matrix product. Thus, we can simply call it “product” and omit the symbol “” without confusion.

Definition 2. (see [11]). A swap matrix is an matrix defined as follows: its rows and columns are labeled by double index , the columns are arranged by the ordered multiindex , and the rows are arranged by the ordered multiindex . Then, the element at the position is

Remark 1. When , is briefly rewritten as . Furthermore, from Definition 2, can be written as the following form for all , :Now, we list some basic properties of the semitensor product [11]:(1)Let and be column vectors. Then,(2)Let be a column vector. Then,(3)Let be a logical vector. Then,where(4)Let be a logical vector and . Then,where is the -th block of . Especially, when ,

Lemma 1 .(see [11]). Any logical function with logical variables , , can be expressed in a multilinear form aswhere and is unique, called the structural matrix of .

Remark 2. The first row of the structural matrix corresponds to the truth value of the logical function .
Now, we list the structural matrices for some basic -valued logical operators [11], which will be used later.
Negation (): , which has a structural matrix as .
Conjunction (): , which has a structural matrix asDisjunction (): , which has a structural matrix asExclusive or (): , which has a structural matrix asDummy operator (): , which has a structural matrix asThe following concepts and properties will be used in the next section.

Definition 3. (see [12]). An -ary pseudo-Boolean function is a mapping from to , where .
A graph consists of a vertex (node) set and an edge set denoted by .

Lemma 2 .(see [32]). Given a simple graph , an -labeling of is an integer assignment such thatwhere , denotes the distance between and , and are two given positive integers.

3. Main Results

In this section, we investigate the -label coloring problem by the semitensor product method and present the main results of this paper.

Consider a graph with nodes . Assume that the adjacency matrix, , of is given aswhere denotes a neighbor set of node .

It is noted that for an undirected graph and in our study since the graph is a simple graph. Furthermore, let , where and , and are, respectively, Boolean addition and Boolean multiplication. It is easy to obtain that when and when .

Let . For all , assign it an integer , i.e., . We need two logical operators as

Moreover, the structural matrices are

Then, we have the following result to determine whether the -label problem is solved.

Theorem 1. Consider an undirected graph with nodes . Its -label problem is solved if and only if the logical equationsare solved. That is,is solved.

Proof. Necessity: assume that coloring of is solvable, and is the adjacent matrix of the graph . For all and , when , . It is easy to see that and , . That is, when or when .
Since , we introduce the logical operators and , and then we have is equivalent to , and is equivalent to . That is, is equivalent toThen, we have for all . Since for the undirected graph and , we obtain thatSet , where and , . Obviously, . Similarly, when , we haveTherefore, from (22) and (23), we obtain that (19) is satisfied, and the necessity is proved.
Sufficiency: suppose that (19) is satisfied. Then, for all , we haveFrom (24), if , . Then, or , i.e., , . Therefore, . Similarly, if , by (24).
Since and , we have the coloring of the graph is solvable, and the proof is complete.
It is note that, for a directed graph , we have the following corollary.

Corollary 1. Consider a directed graph with nodes . Its -label problem is solved if and only ifis solved.

Let , . Then, . Using the semitensor product and the vector form of logical variables, we have the following results.

Theorem 2. Logical equations (19) are solved if and only if there exists at least an integer such that the -th column of matrix is 0, where, and the product is

Proof. Using the semitensor product and the vector form of logical variables, there exists one matrix such that the left-hand side of equation (13) is , where , . Equation (13) is solved if and only if there exists at least an integer such that the column of matrix is 0. Now, we only need to study matrix .
Since the logical form of iswe havewhereFurthermore,where , ,and the product is
Therefore,Thus, logical equations (19) are solved if and only if there exists such thatthat is, the -th column of is zero. Then, the proof is complete.
Based on Theorem 2, we give the following algorithm to find all for the coloring solutions of the given graph.Using formula (24), compute and . SetThen, all -label coloring plans of are .

4. Illustrative Example

In this section, we give an example to illustrate the effectiveness of the results/algorithms obtained in this paper.

In order to avoid interference with each other, different channels need to be assigned to different base stations in the wireless network. Moreover, the main object of the channel allocation problem is to search an allocation scheme which has the channel as least as possible. Some mathematical models can be used to study the channel allocation problem of the wireless network, including -coloring, list coloring, set coloring, and -coloring. The most commonly used model is -coloring. Denote by the topological graph of the wireless network, where is a node set denoting base stations or their users and denotes an edge set. Now, we will use the -coloring model to analyze the channel allocation of the wireless network.

Example 1. Construct the telecommunication base stations among four cities denoted by , respectively. Denote a city by one vertex of the graph. If the base station constructed in city can cover city , then there is an edge between and . Now, the covering graph of base stations is established as shown in Figure 1. Our target is to search all schemes for channel allocation of the wireless network. In the wireless network, the channel interval is greater than or equal to 2 for two adjacent base stations and greater than or equal to 1 for two base stations with distance 2.
From Figure 1, we have its adjacency matrix as the following:According to , we have by the above definitionUsing Algorithm 1, we can compute the matrix defined in (26) by the semitensor product. Then, by Matlab, different channels which are denoted by 0, 1, 2, 3, and 4 are needed to satisfy the requirement in the channel allocation of the wireless network. Moreover, all detailed schemes are corresponding toThe corresponding channel schemes are shown in Table 1.
For example, for , . That is, channels 4, 1, 0, and 3 are, respectively, assigned to stations A, B, C, and D which satisfies the requirement in the channel allocation of the wireless network. Moreover, from the table, there are at least 4 channels to satisfy the graph.

(1)Compute matrix by (20).
(2)If there is no common such that , then has no -label coloring solution, and stop the calculation. Otherwise, find out the number such that and denote these by .
(3)For each index , let , . Let [11]

i(y1, y2, y3, y4)(A, B, C, D)

97(4, 1, 0, 3)(4, 1, 0, 3)
117(4, 0, 1, 3)(4, 0, 1, 3)
221(3, 1, 0, 4)(3, 1, 0, 4)
241(3, 0, 1, 4)(3, 0, 1, 4)
385(1, 4, 3, 0)(1, 4, 3, 0)
405(1, 3, 4, 0)(1, 3, 4, 0)
509(0, 4, 3, 1)(0, 4, 3, 1)
529(0, 3, 4, 1)(0, 3, 4, 1)

5. Conclusion

The -coloring problem of the graph is studied with application to channel allocation of the wireless network in this paper. The necessary and sufficient conditions for solving the -coloring problem are given by introducing two new logical operators. Moreover, it is noted that all solutions of the obtained logical equations are corresponding to each coloring scheme. By using the semitensor product, the necessary and sufficient conditions are converted to an algebraic form. Based on this, all coloring schemes can be obtained through searching all column indices of the zero columns. Furthermore, an illustration example on channel allocation of the wireless network is given to show the effectiveness of the obtained results in this paper. In future, we plan to study other coloring problems by using the semitensor product method, i.e., -coloring, list coloring, and set coloring.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (G61673243, G69674001, and G61403223), the Postdoctoral Science Foundation Funded Project of China (2017M612234), and the Research Fund for High-Level Personnel of Qingdao Agricultural University (631426).

References

  1. Y. Wang, C. Zhang, and Z. Liu, “A matrix approach to graph maximum stable set and coloring problems with application to multi-agent systems,” Automatica, vol. 48, no. 7, pp. 1227–1236, 2012. View at: Publisher Site | Google Scholar
  2. R. J. Lipton and R. E. Tarjan, “A separator theorem for planar graphs,” SIAM Journal on Applied Mathematics, vol. 36, no. 2, pp. 177–189, 1979. View at: Publisher Site | Google Scholar
  3. G. Serpen and A. Parvin, “On the performance of hopfield network for graph search problem,” Neurocomputing, vol. 14, no. 4, pp. 365–381, 1997. View at: Publisher Site | Google Scholar
  4. R. Tarjan, “Depth-first search and linear graph algorithms,” SIAM Journal on Computing, vol. 1, no. 2, pp. 146–160, 1972. View at: Publisher Site | Google Scholar
  5. W. K. Hale, “Frequency assignment: theory and applications,” Proceedings of the IEEE, vol. 45, 1980. View at: Google Scholar
  6. J. R. Griggs and R. K. Yeh, “Labelling graphs with a condition at distance 2,” SIAM Journal on Discrete Mathematics, vol. 5, no. 4, pp. 586–595, 1992. View at: Publisher Site | Google Scholar
  7. S. Amanathulla, S. Sahoo, and M. Pal, “-labeling numbers of square of paths, complete graphs and complete bipartite graphs,” Journal of Intelligent and Fuzzy Systems, vol. 36, 2019. View at: Google Scholar
  8. S. Ghosh, P. Sarkar, and A. Pal, “Exact algorithm for L(2, 1) labeling of cartesian product between complete bipartite graph and cycle,” Harmony Search and Nature Inspired Optimization Algorithms, vol. 741, pp. 325–334, 2018. View at: Publisher Site | Google Scholar
  9. S. Paul, M. Pal, and A. Pal, “-labeling of interval graphs,” Journal of Applied Mathematics and Computing, vol. 49, no. 1-2, pp. 419–432, 2015. View at: Publisher Site | Google Scholar
  10. M. Xu and L. Sun, “The -labeling problem via the semi-tensor product method,” in Proceedings of the 37th Chinese Control Conference, pp. 823–828, Wuhan, China, 2018. View at: Google Scholar
  11. D. Cheng, H. Qi, and Z. Li, Analysis and Control of Boolean Networks: A Semi-tensor Product Approach, Springer, London, UK, 2011.
  12. H. Li, G. Zhao, P. Guo, and Z. Liu, Analysis and Control of Finite-Value Systems, CRC Press, Boca Raton, FL, USA, 2018.
  13. H. Li, G. Zhao, M. Meng, and J. Feng, “A survey on applications of semi-tensor product method in engineering,” Science China-Information Sciences, vol. 61, no. 1, pp. 1–17, 2018. View at: Publisher Site | Google Scholar
  14. Y. Guo, P. Wang, W. Gui, and C. Yang, “Set stability and set stabilization of boolean control networks based on invariant subsets,” Automatica, vol. 61, pp. 106–112, 2015. View at: Google Scholar
  15. H. Li and Y. Wang, “Further results on feedback stabilization control design of boolean control networks,” Automatica, vol. 83, pp. 303–308, 2015. View at: Google Scholar
  16. H. Li and Y. Wang, “Lyapunov-based stability and construction of lyapunov functions for boolean networks,” SIAM Journal on Control and Optimization, vol. 55, no. 6, pp. 3437–3457, 2017. View at: Publisher Site | Google Scholar
  17. H. Li, Y. Wang, and Z. Liu, “A semi-tensor product approach to pseudo-boolean functions with application to boolean control networks,” Asian Journal of Control, vol. 16, no. 4, pp. 1073–1081, 2014. View at: Publisher Site | Google Scholar
  18. H. Li, L. Xie, and Y. Wang, “On robust control invariance of boolean control networks,” Automatica, vol. 68, pp. 392–396, 2016. View at: Publisher Site | Google Scholar
  19. H. Li, L. Xie, and Y. Wang, “Output regulation of boolean control networks,” IEEE Transactions on Automatic Control, vol. 62, no. 6, pp. 2993–2998, 2017. View at: Publisher Site | Google Scholar
  20. L. Lin, S. Zhu, Y. Liu, Z. Wang, and F. E. Alsaadi, “Output regulation of boolean control networks with nonuniform sampled-data control,” IEEE Access, vol. 7, pp. 50691–50696, 2019. View at: Publisher Site | Google Scholar
  21. M. Meng, J. Lam, X. Li, and J.-E. Li, “-gain analysis and model reduction problem for Boolean control networks,” Information Sciences, vol. 348, pp. 68–83, 2016. View at: Publisher Site | Google Scholar
  22. M. Meng, G. Xiao, C. Zhai, and G. Li, “Controllability of markovian jump boolean control networks,” Automatica, vol. 10, pp. 70–76, 2019. View at: Google Scholar
  23. J. Zhong, J. Lu, T. Huang, W. Daniel, and C. Ho, “Controllability and synchronization analysis of identical-hierarchy mixed-valued logical control networks,” IEEE Transactions on Cybernetics, vol. 47, no. 11, pp. 3482–3493, 2016. View at: Google Scholar
  24. Y. Liu, L. Wang, J. Lu, and J. Cao, “Sampled-data stabilization of probabilistic boolean control networks,” Systems & Control Letters, vol. 124, pp. 106–111, 2019. View at: Publisher Site | Google Scholar
  25. Z. Liu, Y. Wang, and H. Li, “Controllability of context-sensitive probabilistic mix-valued logical control networks with constraints,” Asian Journal of Control, vol. 17, no. 1, pp. 246–254, 2015. View at: Publisher Site | Google Scholar
  26. S. Fu, Y. Wang, and G. Zhao, “A matrix approach to the analysis and control of networked evolutionary games with bankruptcy mechanism,” Asian Journal of Control, vol. 19, no. 2, pp. 717–727, 2017. View at: Publisher Site | Google Scholar
  27. Y. Wang and D. Cheng, “Stability and stabilization of a class of finite evolutionary games,” Journal of the Franklin Institute, vol. 354, no. 3, pp. 1603–1617, 2017. View at: Publisher Site | Google Scholar
  28. J. Zhong, J. Lu, C. Huang, L. Li, and J. Cao, “Finding graph minimum stable set and core via semi-tensor product approach,” Neurocomputing, vol. 174, pp. 588–596, 2016. View at: Google Scholar
  29. Z. Liu, Y. Wang, and D. Cheng, “Nonsingularity of feedback shift registers,” Automatica, vol. 55, no. 5, pp. 247–253, 2015. View at: Publisher Site | Google Scholar
  30. B. Wang, M. Feng, and J.-E. Meng, “Matrix approach to detectability of discrete event systems,” Journal of the Franklin Institute, vol. 356, no. 12, pp. 6460–6477, 2019. View at: Publisher Site | Google Scholar
  31. J. Zhao, Z. Chen, and Z. Liu, “A novel matrix approach for the stability and stabilization analysis of colored petri nets,” Science China-Information Sciences, vol. 62, no. 9, p. 192202, 2019. View at: Publisher Site | Google Scholar
  32. F. Tao and G. Gu, “-labeling problem on distance graphs,” Journal of Southeast University, vol. 20, no. 1, pp. 122–125, 2004. View at: Google Scholar

Copyright © 2020 Zhenbin Liu and Yuqiang Wu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views77
Downloads165
Citations

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.