SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Euler’s theorem and
    applications
           Martin B ODIN
     martin.bodin@ens-lyon.org




                                 Euler’s theorem and applications – p. 1
The theorem




              Euler’s theorem and applications – p. 2
The theorem
Theorem. Given a plane graph, if v is the number of vertex,
e, the number of edges, and f the number of faces,

                     v−e+f =2




                                              Euler’s theorem and applications – p. 2
The Theorem
Proof. Consider the plane graph G.




                                     Euler’s theorem and applications – p. 3
The Theorem
Proof. Consider the plane graph G.




We consider T , a minimal graph from G, connex.




                                             Euler’s theorem and applications – p. 3
The Theorem
Proof. Consider the plane graph G.




We consider T , a minimal graph from G, connex.
T is a tree.
Thus eT = v − 1, where eT is the number of T ’s edge.

                                            Euler’s theorem and applications – p. 3
The Theorem
Proof. Consider the plane graph G.




Then we consider the dual graph.




                                     Euler’s theorem and applications – p. 3
The Theorem
Proof. Consider the plane graph G.




Then we consider the dual graph.
And the dual D of T .



                                     Euler’s theorem and applications – p. 3
The Theorem
Proof. Consider the plane graph G.




Then we consider the dual graph.
And the dual D of T .
D in a also a tree.
Thus eD = f − 1.
                                     Euler’s theorem and applications – p. 3
The Theorem
Proof. Consider the plane graph G.




Now, we have eT   + eD = e.
                  e = (v − 1) + (f − 1)

                                          Euler’s theorem and applications – p. 3
The Theorem
Proof. Consider the plane graph G.




Now, we have eT   + eD = e.

                     v−e+f =2

                                     Euler’s theorem and applications – p. 3
Applications




               Euler’s theorem and applications – p. 4
Applications
Given a plane graph, there exists an edge of
degree at more 5.




                                      Euler’s theorem and applications – p. 4
Applications
Given a plane graph, there exists an edge of
degree at more 5.
Given a finite set of points non all in the same
line, there exists a line that contains only two of
them.




                                          Euler’s theorem and applications – p. 4
Thanks For Your
      Listenning !
Any questions ?




                        Euler’s theorem and applications – p. 5

Weitere ähnliche Inhalte

Was ist angesagt?

5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.Jan Plaza
 
Epanaliptiko pros spiros_giannakaros_2021
Epanaliptiko pros spiros_giannakaros_2021Epanaliptiko pros spiros_giannakaros_2021
Epanaliptiko pros spiros_giannakaros_2021Christos Loizos
 
Ex1 h applications
Ex1 h applicationsEx1 h applications
Ex1 h applicationsgiovanniL
 
Accessing the tuples
Accessing the tuplesAccessing the tuples
Accessing the tuplesannalakshmir2
 
Linear approximations
Linear approximationsLinear approximations
Linear approximationsTarun Gehlot
 
5.2. Function composition
5.2. Function composition5.2. Function composition
5.2. Function compositionJan Plaza
 
5.6 Function inverse. A handout.
5.6 Function inverse. A handout.5.6 Function inverse. A handout.
5.6 Function inverse. A handout.Jan Plaza
 
5.1 Defining and visualizing functions. Dynamic slides.
5.1 Defining and visualizing functions. Dynamic slides.5.1 Defining and visualizing functions. Dynamic slides.
5.1 Defining and visualizing functions. Dynamic slides.Jan Plaza
 

Was ist angesagt? (15)

5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.
 
Epanaliptiko pros spiros_giannakaros_2021
Epanaliptiko pros spiros_giannakaros_2021Epanaliptiko pros spiros_giannakaros_2021
Epanaliptiko pros spiros_giannakaros_2021
 
09 Unif Exp Gamma
09 Unif Exp Gamma09 Unif Exp Gamma
09 Unif Exp Gamma
 
Limits BY ATC
Limits BY ATCLimits BY ATC
Limits BY ATC
 
Functions 2
Functions 2Functions 2
Functions 2
 
Tot d isomorphism1
Tot d isomorphism1Tot d isomorphism1
Tot d isomorphism1
 
Exam 3 Math 189
Exam 3 Math 189Exam 3 Math 189
Exam 3 Math 189
 
Lab assignment -_6
Lab assignment -_6Lab assignment -_6
Lab assignment -_6
 
Ex1 h applications
Ex1 h applicationsEx1 h applications
Ex1 h applications
 
Accessing the tuples
Accessing the tuplesAccessing the tuples
Accessing the tuples
 
Linear approximations
Linear approximationsLinear approximations
Linear approximations
 
5.2. Function composition
5.2. Function composition5.2. Function composition
5.2. Function composition
 
5.6 Function inverse. A handout.
5.6 Function inverse. A handout.5.6 Function inverse. A handout.
5.6 Function inverse. A handout.
 
Nonlinear dynamics
Nonlinear dynamicsNonlinear dynamics
Nonlinear dynamics
 
5.1 Defining and visualizing functions. Dynamic slides.
5.1 Defining and visualizing functions. Dynamic slides.5.1 Defining and visualizing functions. Dynamic slides.
5.1 Defining and visualizing functions. Dynamic slides.
 

Andere mochten auch

Transrating_Efficiency
Transrating_EfficiencyTransrating_Efficiency
Transrating_EfficiencyAniruddh Tyagi
 
haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transformAniruddh Tyagi
 
This year
This yearThis year
This yearjaffa99
 
en_ETSI_302769v010101v
en_ETSI_302769v010101ven_ETSI_302769v010101v
en_ETSI_302769v010101vAniruddh Tyagi
 
den302307.v1.1.1.pe20041001_040602-041001
den302307.v1.1.1.pe20041001_040602-041001den302307.v1.1.1.pe20041001_040602-041001
den302307.v1.1.1.pe20041001_040602-041001Aniruddh Tyagi
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomonAniruddh Tyagi
 
Phd Consumer Insight Plans Book
Phd Consumer Insight Plans BookPhd Consumer Insight Plans Book
Phd Consumer Insight Plans BookChristabel B.
 
security vulnerabilities of dvb chipsets
security vulnerabilities of dvb chipsetssecurity vulnerabilities of dvb chipsets
security vulnerabilities of dvb chipsetsAniruddh Tyagi
 

Andere mochten auch (13)

Transrating_Efficiency
Transrating_EfficiencyTransrating_Efficiency
Transrating_Efficiency
 
en_302769v010101v
en_302769v010101ven_302769v010101v
en_302769v010101v
 
intro_dgital_TV
intro_dgital_TVintro_dgital_TV
intro_dgital_TV
 
haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transform
 
This year
This yearThis year
This year
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
beginner.en.print
beginner.en.printbeginner.en.print
beginner.en.print
 
en_ETSI_302769v010101v
en_ETSI_302769v010101ven_ETSI_302769v010101v
en_ETSI_302769v010101v
 
den302307.v1.1.1.pe20041001_040602-041001
den302307.v1.1.1.pe20041001_040602-041001den302307.v1.1.1.pe20041001_040602-041001
den302307.v1.1.1.pe20041001_040602-041001
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
 
Phd Consumer Insight Plans Book
Phd Consumer Insight Plans BookPhd Consumer Insight Plans Book
Phd Consumer Insight Plans Book
 
security vulnerabilities of dvb chipsets
security vulnerabilities of dvb chipsetssecurity vulnerabilities of dvb chipsets
security vulnerabilities of dvb chipsets
 
Foursquare
FoursquareFoursquare
Foursquare
 

Mehr von Aniruddh Tyagi (20)

whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4
 
BUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTERBUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTER
 
digital_set_top_box2
digital_set_top_box2digital_set_top_box2
digital_set_top_box2
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transform
 
DCT
DCTDCT
DCT
 
EBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFFEBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFF
 
ADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMODADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMOD
 
DVB_Arch
DVB_ArchDVB_Arch
DVB_Arch
 
tyagi 's doc
tyagi 's doctyagi 's doc
tyagi 's doc
 
quantization_PCM
quantization_PCMquantization_PCM
quantization_PCM
 
ECMG & EMMG protocol
ECMG & EMMG protocolECMG & EMMG protocol
ECMG & EMMG protocol
 
7015567A
7015567A7015567A
7015567A
 
Basic of BISS
Basic of BISSBasic of BISS
Basic of BISS
 
fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1
 
quantization
quantizationquantization
quantization
 
DVBSimulcrypt2
DVBSimulcrypt2DVBSimulcrypt2
DVBSimulcrypt2
 
Euler formula
Euler formulaEuler formula
Euler formula
 
RSA
RSARSA
RSA
 
IntrRSCode
IntrRSCodeIntrRSCode
IntrRSCode
 
video compression
video compressionvideo compression
video compression
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

euler theorm

  • 1. Euler’s theorem and applications Martin B ODIN martin.bodin@ens-lyon.org Euler’s theorem and applications – p. 1
  • 2. The theorem Euler’s theorem and applications – p. 2
  • 3. The theorem Theorem. Given a plane graph, if v is the number of vertex, e, the number of edges, and f the number of faces, v−e+f =2 Euler’s theorem and applications – p. 2
  • 4. The Theorem Proof. Consider the plane graph G. Euler’s theorem and applications – p. 3
  • 5. The Theorem Proof. Consider the plane graph G. We consider T , a minimal graph from G, connex. Euler’s theorem and applications – p. 3
  • 6. The Theorem Proof. Consider the plane graph G. We consider T , a minimal graph from G, connex. T is a tree. Thus eT = v − 1, where eT is the number of T ’s edge. Euler’s theorem and applications – p. 3
  • 7. The Theorem Proof. Consider the plane graph G. Then we consider the dual graph. Euler’s theorem and applications – p. 3
  • 8. The Theorem Proof. Consider the plane graph G. Then we consider the dual graph. And the dual D of T . Euler’s theorem and applications – p. 3
  • 9. The Theorem Proof. Consider the plane graph G. Then we consider the dual graph. And the dual D of T . D in a also a tree. Thus eD = f − 1. Euler’s theorem and applications – p. 3
  • 10. The Theorem Proof. Consider the plane graph G. Now, we have eT + eD = e. e = (v − 1) + (f − 1) Euler’s theorem and applications – p. 3
  • 11. The Theorem Proof. Consider the plane graph G. Now, we have eT + eD = e. v−e+f =2 Euler’s theorem and applications – p. 3
  • 12. Applications Euler’s theorem and applications – p. 4
  • 13. Applications Given a plane graph, there exists an edge of degree at more 5. Euler’s theorem and applications – p. 4
  • 14. Applications Given a plane graph, there exists an edge of degree at more 5. Given a finite set of points non all in the same line, there exists a line that contains only two of them. Euler’s theorem and applications – p. 4
  • 15. Thanks For Your Listenning ! Any questions ? Euler’s theorem and applications – p. 5