Processing math: 100%
Research article Special Issues

Calibration of time-dependent volatility for European options under the fractional Vasicek model

  • Received: 11 February 2022 Revised: 22 March 2022 Accepted: 23 March 2022 Published: 06 April 2022
  • MSC : 65M32, 91G20, 90C32

  • In this paper, we calibrate the time-dependent volatility function for European options under the fractional Vasicek interest rate model. A fully implicit finite difference method is applied to solve the partial differential equation of option pricing numerically. To find the volatility function, we minimize a cost function that is the sum of the squared errors between the theoretical prices and market prices with Tikhonov L2 regularization and L1/2 regularization respectively. Finally numerical experiments with simulated and real market data verify the efficiency of the proposed methods.

    Citation: Jiajia Zhao, Zuoliang Xu. Calibration of time-dependent volatility for European options under the fractional Vasicek model[J]. AIMS Mathematics, 2022, 7(6): 11053-11069. doi: 10.3934/math.2022617

    Related Papers:

    [1] Amber Yousaf Dar, Nadia Saeed, Moustafa Omar Ahmed Abu-Shawiesh, Saman Hanif Shahbaz, Muhammad Qaiser Shahbaz . A new class of ratio type estimators in single- and two-phase sampling. AIMS Mathematics, 2022, 7(8): 14208-14226. doi: 10.3934/math.2022783
    [2] Saman Hanif Shahbaz, Aisha Fayomi, Muhammad Qaiser Shahbaz . Estimation of the general population parameter in single- and two-phase sampling. AIMS Mathematics, 2023, 8(7): 14951-14977. doi: 10.3934/math.2023763
    [3] Riffat Jabeen, Aamir Sanaullah, Muhammad Hanif, Azam Zaka . Two-exponential estimators for estimating population mean. AIMS Mathematics, 2021, 6(1): 737-753. doi: 10.3934/math.2021045
    [4] Hleil Alrweili, Fatimah A. Almulhim . Estimation of the finite population mean using extreme values and ranks of the auxiliary variable in two-phase sampling. AIMS Mathematics, 2025, 10(4): 8794-8817. doi: 10.3934/math.2025403
    [5] Khazan Sher, Muhammad Ameeq, Muhammad Muneeb Hassan, Basem A. Alkhaleel, Sidra Naz, Olyan Albalawi . Novel efficient estimators of finite population mean in stratified random sampling with application. AIMS Mathematics, 2025, 10(3): 5495-5531. doi: 10.3934/math.2025254
    [6] Xuechen Liu, Muhammad Arslan . A general class of estimators on estimating population mean using the auxiliary proportions under simple and two phase sampling. AIMS Mathematics, 2021, 6(12): 13592-13607. doi: 10.3934/math.2021790
    [7] Tolga Zaman, Cem Kadilar . Exponential ratio and product type estimators of the mean in stratified two-phase sampling. AIMS Mathematics, 2021, 6(5): 4265-4279. doi: 10.3934/math.2021252
    [8] Olayan Albalawi . Estimation techniques utilizing dual auxiliary variables in stratified two-phase sampling. AIMS Mathematics, 2024, 9(11): 33139-33160. doi: 10.3934/math.20241582
    [9] Sohaib Ahmad, Sardar Hussain, Javid Shabbir, Muhammad Aamir, M. El-Morshedy, Zubair Ahmad, Sharifah Alrajhi . Improved generalized class of estimators in estimating the finite population mean using two auxiliary variables under two-stage sampling. AIMS Mathematics, 2022, 7(6): 10609-10624. doi: 10.3934/math.2022592
    [10] Anoop Kumar, Priya, Abdullah Mohammed Alomair . Efficient classes of estimators for estimating indeterminate population mean using neutrosophic ranked set sampling. AIMS Mathematics, 2025, 10(4): 8946-8964. doi: 10.3934/math.2025410
  • In this paper, we calibrate the time-dependent volatility function for European options under the fractional Vasicek interest rate model. A fully implicit finite difference method is applied to solve the partial differential equation of option pricing numerically. To find the volatility function, we minimize a cost function that is the sum of the squared errors between the theoretical prices and market prices with Tikhonov L2 regularization and L1/2 regularization respectively. Finally numerical experiments with simulated and real market data verify the efficiency of the proposed methods.



    An H-intersecting family of graphs is a collection of finite, undirected, and simple graphs (i.e., graphs with no self-loops or parallel edges) on a fixed number of vertices, in which the intersection of every two graphs in the family contains a subgraph isomorphic to H. For instance, if H is an edge or a triangle, then every pair of graphs in the family shares at least one edge or triangle, respectively. These intersecting families of graphs play a central role in extremal graph theory, where determining their maximum possible size remains a longstanding challenge. Different choices of H lead to distinct combinatorial problems and structural constraints.

    A pivotal conjecture, proposed in 1976 by Simonovits and Sós, concerned the maximum size of triangle-intersecting graph families---those in which the intersection of any two graphs contains a triangle. They conjectured that the largest size of such a family is obtained by the family of all graphs on n vertices that contain a fixed triangle, leading to the conjectured largest size of 2(n2)3. Furthermore, a trivial upper bound on the size of a triangle-intersecting graph family on n vertices is 4 times larger than this conjectured value. This holds since a graph and its complement cannot both belong to an edge-intersecting family, let alone a triangle-intersecting family. The foundational work in [1,2,3] explores intersection theorems for graph families whose shared subgraphs are cycles or paths.

    The first major progress on the conjecture by Simonovits and Sós was made in 1986 by Chung, Graham, Frankl, and Shearer [4], who utilized Shearer's inequality to establish a non-trivial upper bound on the largest possible cardinality of a family of triangle-intersecting graphs with a fixed number of vertices. This bound was "midway" between the trivial and conjectured bounds (or, more formally, it was equal to twice the conjectured bound, which is also the geometric mean of the conjectured and trivial bounds).

    The conjecture by Simonovits and Sós was ultimately resolved in 2012 by Ellis, Filmus, and Friedgut [5], who proved that the largest triangle-intersecting family comprises all graphs containing a fixed triangle. Building on the Fourier analytic methods of Boolean functions, used to prove this conjecture in [5] (see also Section 4 of [6]), a recent work by Berger and Zhao [7] extended the investigation to K4-intersecting graph families, addressing analogous questions for graph families where every pair of graphs intersects in a complete subgraph of size four. Additionally, Keller and Lifshitz [8] constructed, for every graph H and for every p(12,1), an H-intersecting family of graphs G on n vertices such that a random graph GG(n,p) belongs to G with probability tending to 1 exponentially fast in n2. Here, G(n,p) denotes the (binomial) Erdǒs-Rényi random graph, in which every edge of Kn (the complete graph on n vertices) is included independently with probability p. These contributions highlight the interplay between combinatorial, probabilistic, and algebraic methods in the analysis of intersecting graph families.

    The interplay between Shannon entropy and extremal combinatorics has significantly enhanced the understanding of the structural and quantitative properties of combinatorial objects through information-theoretic methods. Entropy serves as a versatile and powerful tool to derive concise, often elegant proofs of classical results in extremal combinatorics (see, e.g., Chapter 37 of [9], Chapter 22 of [10], and [11,12,13,14,15]). Notable examples include Radhakrishnan's entropy-based proof of Bregman's theorem on matrix permanents [14] and the application of Shearer's lemma to upper-bound the size of the largest triangle-intersecting graph families with a fixed number of vertices [4]. Beyond this specific context, Shearer's inequalities have found extensive applications across diverse areas, including finite geometry, graph theory, the analysis of Boolean functions, and large deviations (see [4,15,16,17,18,19,20,21,22]). A recent talk by the author addresses Shearer's inequalities and their applications in combinatorics [23].

    The first part of this paper relies on the combinatorial version of Shearer's inequalities in [4] to derive a new upper bound on the cardinality of families of H-intersecting graphs with a fixed number of vertices. The bound represents a nontrivial extension of the bound in [4], where H is specialized to a triangle. The derived bound is expressed in terms of the chromatic number of H, while a relaxed version, formulated using the Lovász ϑ-function of the complement of H, reduces computational complexity. The relaxed bound is further explored in the case where H is a regular graph, particularly when it is strongly regular.

    Graph homomorphisms serve as a versatile framework to understand graph mappings, which facilitate studies of structural properties, colorings, and symmetries. The applications of graph homomorphisms span various fields, including statistical physics, where they model spin systems [24], and computational complexity, where they underpin constraint satisfaction problems [25]. Recent research has yielded profound insights into counting graph homomorphisms, a problem with deep theoretical and practical relevance (see [11,26,27,28,29,30,31]). The second part of this paper relies on Shearer's inequalities and properties of Shannon entropy to derive bounds on the number of homomorphisms.

    The paper is structured as follows: Section 2 presents essential preliminary material, including three versions of Shearer's inequalities. In Section 3, the combinatorial version of Shearer's lemma is employed for upper bounding the size of H-intersecting families of graphs. Section 4 focuses on entropy-based proofs, also incorporating a probabilistic version of Shearer's lemma, to derive bounds on the number of graph homomorphisms.

    The following subsection introduces three versions of Shearer's inequalities that are useful in the analysis presented in this paper. The first version serves as a foundation for proving the other two, which are directly applied in this work. Familiarity with Shannon entropy and its basic properties is assumed, following standard notation (see, e.g., Chapter 3 of [32]).

    Proposition 1 (Shearer's Lemma). Let

    n,m,kN,

    X1,,Xn be discrete random variables,

    [n]{1,,n},

    S1,,Sm[n] be subsets such that each i[n] belongs to at least k1 of these subsets,

    Xn(X1,,Xn), and XSj(Xi)iSj for all j[m].

    Then,

    kH(Xn)mj=1H(XSj). (2.1)

    Proof. By assumption, d(i)k for all i[n], where

    d(i)|{j[m]:iSj}|. (2.2)

    Let S={i1,,i}, 1i1<<in, which implies that |S|=,S[n]. Further, let XS(Xi1,,Xi). By the chain rule and the fact that conditioning reduces entropy,

    H(XS)=H(Xi1)+H(Xi2|Xi1)++H(Xi|Xi1,,Xi1)iSH(Xi|X1,,Xi1)=ni=1{1{iS}H(Xi|X1,,Xi1)}, (2.3)

    where 1{iS} on the right-hand side of (2.3) denotes the indicator function of the event {iS}, meaning that it is equal to 1 if iS and it is zero otherwise. Consequently, we get

    mj=1H(XSj)mj=1ni=1{1{iSj}H(Xi|X1,,Xi1)}=ni=1{mj=11{iSj}H(Xi|X1,,Xi1)}=ni=1{d(i)H(Xi|X1,,Xi1)}kni=1H(Xi|X1,,Xi1) (2.4)
    =kH(Xn), (2.5)

    where inequality (2.4) holds due to the nonnegativity of the conditional entropies of discrete random variables, and since (by assumption) d(i)k for all i[n], and equality (2.5) holds by the chain rule of Shannon entropy.

    Remark 1. If every element i[n] belongs to exactly k of the subsets Sj(j[m]), then Shearer's lemma also applies to continuous random variables X1,,Xn, with entropy replaced by the differential entropy.

    Example 1 (Subadditivity of Shannon Entropy). Let n=m with nN, and Si={i} (singletons) for all i[n], so every element i[n] belongs to a single set among S1,,Sn (i.e., k=1). By Shearer's lemma, it follows that

    H(Xn)nj=1H(Xj), (2.6)

    which expresses the subadditivity property of Shannon entropy for discrete random variables. This also holds for continuous random variables, where the entropy is replaced by differential entropy since every element i[n] is contained in exactly one subset (see Remark 1). Consequently, Shearer's lemma establishes the subadditivity property of Shannon entropy for both discrete and continuous random variables.

    Example 2 (Han's Inequality, [33]). For every [n], let S=[n]{}. By Shearer's lemma (Proposition 1) applied to these n subsets of [n], since every element i[n] is contained in exactly k=n1 of these subsets,

    (n1)H(Xn)n=1H(X1,,X1,X+1,,Xn)nH(Xn). (2.7)

    An equivalent form of (2.7) is given by

    0n=1{H(Xn)H(X1,,X1,X+1,,Xn)}H(Xn). (2.8)

    The equivalent forms in (2.7) and (2.8) are known as Han's inequality. Note that, by Remark 1, the left-hand side inequality of (2.7) and, equivalently, the right-hand side inequality of (2.8) remain valid for continuous random variables as well.

    In the combinatorial version of Shearer's lemma [4], next given, the concept of entropy is hidden.

    Proposition 2 (Combinatorial Version of Shearer's Lemma). Consider the following setting:

    ● Let F be a finite multiset of subsets of [n] (allowing repetitions of some subsets), where each element i[n] is included in at least k1 sets of F.

    ● Let M be a set of subsets of [n].

    ● For every set SF, let the trace of M on S, denoted by traceS(M), be the set of all possible intersections of elements of M with S, i.e.,

    traceS(M){AS:AM},SF. (2.9)

    Then,

    |M|SF|traceS(M)|1k. (2.10)

    Proof.

    ● Let X[n] be a set that is selected uniformly at random from M.

    ● Represent X by the binary random vector Xn=(X1,,Xn), where Xi=1{iX} for all i[n], so Xi=1 if iX and Xi=0 otherwise.

    ● For SF, let XS=(Xi)iS. By the maximal entropy theorem, which states that the entropy of a discrete random variable (or vector) is upper-bounded by the logarithm of the cardinality of its support, with equality if and only if the variable is uniformly distributed over its support, we get

    H(XS)log|traceS(M)|. (2.11)

    ● By the assumption that every element i[n] is included in at least k1 sets of F, it follows from combining Shearer's lemma (Proposition 1) and (2.11) that

    kH(Xn)SFH(XS)SFlog|traceS(M)|. (2.12)

    ● The equality H(Xn)=log|M| holds since Xn is in one-to-one correspondence with X, which is uniformly selected at random from M. Combining this with (2.12) gives

    log|M|1kSFlog|traceS(M)|, (2.13)

    and exponentiating both sides of (2.13) gives (2.10).

    The following is the probabilistic entropy-based formulation of Shearer's lemma, which is also applied in this paper.

    Proposition 3 (Probabilistic Version of Shearer's Lemma). Let Xn be a discrete n-dimensional random vector, and let S[n] be a random subset of [n], independent of Xn, with an arbitrary probability mass function PSXYZ. If there exists θ>0 such that

    Pr[iS]θ,i[n], (2.14)

    then,

    ES[H(XS)]θH(Xn). (2.15)

    Proof. The expectation of the entropy H(XS) with respect to the random subset S[n], where (by assumption) S is independent of Xn, gives

    ES[H(XS)]=S[n]PSXYZ(S)H(XS)S[n]{PSXYZ(S)ni=1{1{iS}H(Xi|X1,,Xi1)}} (2.16)
    =ni=1{S[n]{PSXYZ(S)1{iS}}H(Xi|X1,,Xi1)} (2.17)
    =ni=1Pr[iS]H(Xi|X1,,Xi1)θni=1H(Xi|X1,,Xi1) (2.18)
    =θH(Xn), (2.19)

    where (2.16) holds by (2.3) that is valid for every set S[n]; (2.17) holds by swapping the order of summation, and (2.18) holds by the assumption that the random variables {Xi} are discrete (so, the conditional entropies are nonnegative) and by the condition in (2.14). Finally, (2.19) holds by the chain rule of Shannon entropy.

    Remark 2. Similarly to Remark 1, if Pr[iS]=θ for all i[n], then inequality (2.18) holds with equality. Consequently, if the condition in (2.14) is satisfied with equality for all i[n], then (2.15) extends to continuous random variables, with entropies replaced by differential entropies.

    We start by considering triangle-intersecting families of graphs, which was the problem in extremal combinatorics addressed in [4].

    Definition 1 (Triangle-Intersecting Families of Graphs). Let G be a family of graphs on the vertex set [n], with the property that for every G1,G2G, the intersection G1G2 contains a triangle (i.e., there are three vertices i,j,k[n] such that each of {i,j}, {i,k}, {j,k} is in the edge sets of both G1 and G2). The family G is referred to as a triangle-intersecting family of graphs on n vertices.

    Question 1. (Simonovits and Sós, [2]) How large can G (a family of triangle-intersecting graphs) be?

    The family G can be as large as 2(n2)3. To that end, consider the family G of all graphs on n vertices that include a particular triangle. On the other hand, |G| cannot exceed 2(n2)1. The latter upper bound holds since, in general, a family of distinct subsets of a set of size m, where any two of these subsets have a nonempty intersection, can have a cardinality of at most 2m1 (A and Ac cannot be members of this family). The edge sets of the graphs in G satisfy this property, with m=(n2).

    Proposition 4 (Ellis, Filmus, and Friedgut, [5]). The size of a family G of triangle-intersecting graphs on n vertices satisfies |G|2(n2)3, and this upper bound is attained by the family of all graphs with a common vertex set of n vertices, and with a fixed common triangle.

    This result was proved by using discrete Fourier analysis to obtain the sharp bound in Proposition 4, as conjectured by Simonovits and Sós [2].

    The first significant progress toward proving the Simonovits–Sós conjecture came from an information-theoretic approach [4]. Using the combinatorial Shearer lemma (Proposition 2), a simple and elegant upper bound on the size of G was derived in [4]. That bound is equal to 2(n2)2, falling short of the Simonovits–Sós conjecture by a factor of 2.

    Proposition 5 (Chung, Graham, Frankl, and Shearer, [4]). Let G be a family of K3-intersecting graphs on a common vertex set [n]. Then, |G|2(n2)2.

    We next consider more general intersecting families of graphs.

    Definition 2 (H-Intersecting Families of Graphs). Let G be a family of graphs on a common vertex set. Then, it is said that G is H-intersecting if for every two graphs G1,G2G, the graph G1G2 contains a subgraph isomorphic to H.

    In the following, Kt, for tN, denotes the complete graph on t vertices. This graph consists of t vertices, with every pair of vertices being adjacent. For example, K2 represents an edge, while K3 corresponds to a triangle.

    Example 3. Let H=Kt, with t2. Then, t=2 means that G is edge-intersecting (or simply intersecting), and t=3 means that G is triangle-intersecting.

    Question 2. [Problem in Extremal Combinatorics] Given H and n, what is the maximum size of an H-intersecting family of graphs on n labeled vertices?

    Conjecture 1. (Ellis, Filmus, and Friedgut, [5]) Every Kt-intersecting family of graphs on a common vertex set [n] has a size of at most 2(n2)(t2), with equality for the family of all graphs containing a fixed clique on t vertices.

    ● For t=2, it is trivial (since K2 is an edge).

    ● For t=3, it was proved by Ellis, Filmus, and Friedgut [5].

    ● For t=4, it was recently proved by Berger and Zhao [7].

    ● For t5, this problem is left open.

    In the sequel, let V(H) and E(H) denote the vertex and edge sets of a graph H, respectively. Further, let T and G be finite, simple, and undirected graphs, and denote the edge connecting a pair of adjacent vertices u,vV(H) by an edge e={u,v}E(H).

    Definition 3 (Homomorphism). A homomorphism from T to G, denoted by TG, is a mapping of the vertices of T to those of G, σ:V(T)V(G), such that every edge in T is mapped to an edge in G:

    {u,v}E(T){σ(u),σ(v)}E(G). (2.20)

    On the other hand, non-edges in T may be mapped to the same vertex, a non-edge, or an edge in G.

    Example 4. There is a homomorphism from every bipartite graph G to K2. Indeed, let V(G)=XY, where X and Y are the two disjoint partite sets. A mapping that maps every vertex in X to '0', and every vertex in Y to '1' is a homomorphism GK2 because every edge in G is mapped to the edge {0,1} in K2. Note that every non-edge in X or in Y is mapped to the same vertex in K2, and every non-edge between two vertices in X and Y is mapped to {0,1}.

    The following connects graph homomorphisms to graph invariants. Let ω(G) and χ(G) denote the clique number and chromatic number, respectively, of a finite, simple, and undirected graph G. That is, ω(G) is the maximum number of vertices in G such that every two of them are adjacent (i.e., these vertices form a complete subgraph of G), and χ(G) is the smallest number of colors required to color the vertices of G such that no two adjacent vertices share the same color. Then,

    ω(G) is the largest integer k for which a homomorphism KkG exists. This holds because the image of a complete graph under a homomorphism is a complete graph of the same size. This is valid because a homomorphism preserves adjacency, and for a complete graph Kk, all pairs of vertices are adjacent. To preserve this property, the image of Kk under the homomorphism must also be a complete graph of size k.

    ● A graph G is k-colorable if and only if it has a homomorphism to the complete graph Kk; this is because k-coloring assigns one of k colors to each vertex such that adjacent vertices receive different colors, which is equivalent to mapping the vertices of G to the k vertices of Kk in a way that adjacency is preserved. Consequently, it follows by definition that χ(G) is the smallest integer k for which there exists a homomorphism GKk.

    Let Hom(T,G) denote the set of all the homomorphisms TG, and let

    hom(T,G)|Hom(T,G)| (2.21)

    denote the number of these homomorphisms.

    The independence number of a graph G, denoted by α(G), is the maximum number of vertices in G such that no two of them are adjacent. It can be formulated as an integer linear program, whose relaxation gives rise to the following graph invariant.

    Definition 4 (Fractional Independence Number). The fractional independence number of a graph G, denoted as αf(G), is a fractional relaxation of the independence number α(G). It is defined as the optimal value of the following linear program:

    ● Optimization variables: xv for every vertex vV(G).

    ● Objective: Maximize vV(G)xv.

    ● Constraints: xv0 for all vV(G), and vCxv1 for every clique CV(G).

    This relaxation allows fractional values for xv, in contrast to the integer programming formulation for α(G), where xv must be binary (either 0 or 1) for all vV(G). Consequently, αf(G)α(G).

    The following result was obtained by Alon [34] and by Friedgut and Khan [28], where the latter provides an entropy-based proof that relies on Shearer's lemma with an extension of the result on the number of homomorphisms for hypergraphs.

    Proposition 6 (Number of Graph Homomorphisms). Let T and G be finite, simple, and undirected graphs, having no isolated vertices. Then,

    hom(T,G)(2|E(G)|)αf(T). (2.22)

    Furthermore, the upper bound in (2.22) is essentially tight for a fixed graph T in the sense that there exists a graph G such that

    hom(T,G)(|E(G)||E(T)|)αf(T), (2.23)

    so, a comparison between the upper and lower bounds on the number of graph homomorphisms in (2.22) and (2.23) indicates that hom(T,G) scales like |E(G)|αf(T).

    This section derives an upper bound on the maximum cardinality of a family of H-intersecting graphs on a fixed number of vertices, where the intersection of every two graphs in that family contains a subgraph that is isomorphic to a specified graph H. Specifically, the next result generalizes Proposition 5 by extending the proof technique of [4] to apply to all families of H-intersecting graphs.

    Proposition 7. Let H be a nonempty graph, and let G be a family of H-intersecting graphs on a common vertex set [n]. Then,

    |G|2(n2)(χ(H)1). (3.1)

    Proof.

    ● Identify every graph GG with its edge set E(G), and let M={E(G):GG} (recall that all these graphs have the common vertex set [n]).

    ● Let U=E(Kn). For every GG, we have E(G)U, and |U|=(n2).

    ● Let tχ(H) be the chromatic number of H (or any graph isomorphic to H).

    ● For every unordered equipartition or almost-equipartition of [n] into t1 disjoint subsets, i.e., j=1t1Aj=[n], satisfying ||Ai||Aj||1 and AiAj= for all 1i<jt1, define U({Aj}t1j=1) as the subset of U consisting of all edges that are entirely contained within some subset Aj for j[t1]. In other words, each edge lies entirely within one of the subsets {Aj}t1j=1, although different edges may belong to different subsets.

    ● We apply Proposition 2 with

    F={U({Aj}t1j=1)}, (3.2)

    where F is obtained by referring in the right-hand side of (3.2) to all possible choices of {Aj}t1j=1, as described in the previous item.

    ● Let m=|U({Aj}t1j=1)|. Then, m is independent of {Aj}t1j=1 as described above, since

    m={(t1)(n/(t1)2)if (t1)|n,(t2)(n/(t1)2)+(n/(t1)2)if (t1)|(n1),(n/(t1)2)+(t2)(n/(t1)2)if (t1)|(n(t2)). (3.3)

    ● By (3.3) with t=χ(H), it follows that

    m1χ(H)1(n2). (3.4)

    Proof. The graph H is nonempty, so t=χ(H)2. If (t1)|n, then,

    (t1)(n/(t1)2)=n(n(t1))2(t1)1t1(n2). (3.5)

    Otherwise, (t1)|(nj) for some integer j[t2], so n=j+r(t1) with rN. Consequently, since j{1,,t2}, (3.3) gives

    m=(t1j)(r2)+j(r+12)=r2[(t1j)(r1)+j(r+1)]=nj2(t1)[(t1j)(njt11)+j(njt1+1)]=nj2(t1)2[(t1j)(njt+1)+j(nj+t1)]=(nj)[n(t1)+j(t1)(t1)2]2(t1)2=(nj)(n+j(t1))2(t1)(nj)(n1)2(t1)<1t1(n2). (3.6)

    Combining (3.5) and (3.6) for the cases where (t1)|n or (t1)|n, respectively, gives (3.4).

    ● By a symmetry consideration, which follows from the construction of F in (3.2) as a set of subsets of U (due to the fourth item of this proof), each of the (n2) elements in U (i.e., each edge of the complete graph Kn) belongs to a fixed number k of elements in F.

    ● By a double-counting argument on the edges of the complete graph Kn (the set U), since each element of F is a subset of U of size m (see (3.3)) and each edge in U belongs to exactly k elements in F, the following equality holds:

    m|F|=(n2)k. (3.7)

    ● Let SF. Observe that traceS(M), as defined in (2.9), forms an intersecting family of subsets of S. Indeed,

    1. Assign to each vertex in [n] the index j of the subset Aj (1jχ(H)1) in the partition of [n] corresponding to S. Let these assignments be associated with χ(H)1 color classes of the vertices.

    2. For any G,GG, the graph GG contains a subgraph isomorphic to H (by assumption).

    3. By definition, t=χ(H) is the smallest number of colors required to properly color the vertices of H, ensuring that no two adjacent vertices in H share the same color. Hence, in any coloring of the vertices of any graph isomorphic to H with t1 colors, there must exist at least one edge whose two endpoints are assigned the same color. This implies that such an edge must belong to some subset Aj for j[χ(H)1], and therefore, it is contained in S.

    4. Let G,GG. Hence, at least one of the edges in E(G)E(G), which contains the edges of a graph isomorphic to H, belongs to S. By the definition of M (see the first item), this means by (2.9) that traceS(M) is an intersecting family of subsets of S since

    (E(G)S)(E(G)S)=(E(G)(E(G))S.

    Consequently, |S|=m and traceS(M) forms an intersecting family of subsets of S, which yields

    |traceS(M)|2m1. (3.8)

    This holds since the total number of subsets of S is 2m, and since traceS(M) forms an intersecting family of these subsets, it cannot contain any subset along with its complement with respect to S. Consequently, the cardinality of an intersecting family of subsets of S is at most 122m=2m1.

    ● By Proposition 2 (and the one-to-one correspondence between G and M),

    |G|=|M|(2m1)|F|k (3.9)
    =2(n2)(11m) (3.10)
    2(n2)(χ(H)1), (3.11)

    where (3.9) relies on (2.10) and (3.8), equality (3.10) relies on (3.7), and (3.11) holds due to (3.4).

    The family G of H-intersecting graphs on n vertices can be as large as 2(n2)|E(H)|. To that end, consider the family G of all graphs on n vertices that include H as a subgraph.

    Combining this lower bound on |G| with its upper bound in Proposition 7 gives that the largest family G of H-intersecting graphs on n vertices satisfies

    2(n2)|E(H)||G|2(n2)(χ(H)1). (3.12)

    Specialization of Proposition 7 to complete subgraphs gives the following.

    Corollary 1. Let G be a family of Kt-intersecting graphs, with t2, on a common vertex set [n]. Then,

    |G|2(n2)(t1). (3.13)

    Proof. χ(Kt)=t for all tN, and if t2, then the complete graph Kt is nonempty.

    Remark 3. For t3, the bound in Corollary 1 falls short of the conjectured result in [5], which states that every Kt-intersecting family of graphs on a common vertex set [n] has a size of at most 2(n2)t(t1)2, with equality achieved by the family of all graphs containing a fixed clique on t vertices. Nevertheless, it generalizes Proposition 5, which addresses the special case H=K3 (triangle-intersecting graphs), and it uniformly improves the trivial bound of 2(n2)1 for Kt-intersecting graph families on n vertices with t3.

    Remark 4. If H is a bipartite graph, then χ(H)=2. In that case, our result for an H-intersecting family of graphs on n vertices is specialized to the trivial bound

    |G|2(n2)1. (3.14)

    This bound is tight for the largest family of K2-intersecting graphs on n vertices, consisting of all graphs that contain a fixed edge as a subgraph (since in this case, the upper and lower bounds in (3.12) coincide).

    The computational complexity of the chromatic number of a graph is in general NP-hard [35]. This poses a problem in calculating the upper bound in Proposition 7 on the cardinality of H-intersecting families of graphs on a fixed number of vertices. This bound can be however loosened, expressing it in terms of the Lovász ϑ-function of the complement graph ¯H (see Corollary 3 of [36]).

    Corollary 2. Let H be a graph, and let G be a family of H-intersecting graphs on a common vertex set [n]. Then,

    |G|2(n2)(ϑ(¯H)1). (3.15)

    Proof. The Lovász ϑ-function of the complement graph ¯H satisfies the inequality

    ω(H)ϑ(¯H)χ(H), (3.16)

    so it is bounded between the clique and chromatic numbers of H, which are both NP-hard to compute [35]. Since the chromatic number χ(H) is an integer, we have

    χ(H)ϑ(¯H). (3.17)

    Combining (3.1) and (3.17) yields (3.15).

    The Lovász ϑ-function of the complement graph ¯H, as presented in Corollary 2, can be efficiently computed with a precision of r decimal digits, having a computational complexity that is polynomial in p|V(H)| and r. It is obtained by solving the following semidefinite programming (SDP) problem [37]:

    (3.18)

    where the following notation is used:

    A=A(H) is the p×p adjacency matrix of H;

    Jp is the all-ones p×p matrix;

    Sp+ is the set of all p×p positive semidefinite matrices.

    The reader is referred to an account of interesting properties of the Lovász ϑ-function in [38], Chapter 11 of [39], and more recently in Section 2.5 of [40].

    The following result generalizes Corollary 1 by relying on properties of the Lovász ϑ-function. For the third item of the next result, strongly regular graphs are first presented.

    Definition 5 (Strongly Regular Graphs). A regular graph G that is neither complete nor empty is called a strongly regular graph with parameters (n,d,λ,μ), where λ and μ are nonnegative integers, if the following conditions hold:

    (1) G is a d-regular graph on n vertices.

    (2) Every two adjacent vertices in G have exactly λ common neighbors.

    (3) Every two distinct and nonadjacent vertices in G have exactly μ common neighbors.

    The family of strongly regular graphs with these four specified parameters is denoted by srg(n,d,λ,μ). It is important to note that a family of the form srg(n,d,λ,μ) may contain multiple nonisomorphic strongly regular graphs [41]. We refer to a strongly regular graph as srg(n,d,λ,μ) if it belongs to this family.

    Proposition 8. Let G be an H-intersecting family of graphs on n vertices, where H is a nonempty, simple, and undirected graph on p vertices. The following holds:

    (1)

    log2|G|(n2)maxTλmax(T)|λmin(T)|, (3.19)

    where the maximization on the right-hand side of (3.19) is taken over all nonzero, symmetric p×p matrices T=(Ti,j) with Ti,j=0 for all i,j[p] such that {i,j}E(H) or i=j (e.g., the adjacency matrix of H), and λmax(T) and λmin(T) denote the largest and smallest (real) eigenvalues of T, respectively.

    (2) Specifically, if H is a d-regular graph on p vertices, where d[p1], then

    log2|G|(n2)d|λmin(H)|, (3.20)

    where λmin(H) is the smallest eigenvalue of the adjacency matrix of the graph H.

    (3) If H is a connected strongly regular graph in the family srg(p,d,λ,μ), then

    log2|G|(n2)2d(λμ)2+4(dμ)λ+μ. (3.21)

    Proof. By Corollary 2,

    log2|G|(n2)(ϑ(¯H)1). (3.22)

    Item 1 then holds by the property that for every finite, simple, and undirected graph G on n vertices,

    ϑ(G)=1+maxTλmax(T)|λmin(T)|, (3.23)

    where the maximization on the right-hand side of (3.23) is taken over all symmetric nonzero n×n matrices T=(Ti,j) with Ti,j=0 for all i,j[n] such that {i,j}E(G) or i=j. Equality (3.23) is then applied to the graph ¯H, so the maximization on the right-hand side of (3.19) is taken over all symmetric nonzero p×p matrices T=(Ti,j) with Ti,j=0 for all i,j[p] such that {i,j}E(H) or i=j. This includes in particular the adjacency matrix of the graph H, i.e., T=A(H).

    We next prove Item 2, which refers to nonempty d-regular graphs on p vertices. Relaxing the bound in (3.19) by selecting T=A(H) gives λmax(T)=d, and λmin(T)=λmin(H), which then gives the relaxed bound in (3.20).

    Item 3 follows from Item 2 by relying on the closed-form expression of the smallest eigenvalue of the adjacency matrix of a connected strongly d-regular graph H on p vertices, where each pair of adjacent vertices has exactly λ common neighbors and each pair of nonadjacent vertices has exactly μ common neighbors. Recall that a strongly regular graph is connected if and only if μ>0. In that case, the largest eigenvalue of the adjacency matrix is λ1(H)=d with multiplicity 1, and the other two distinct eigenvalues of its adjacency matrix are given by (see, e.g., Chapter 21 of [42])

    r1,2=12(λμ±(λμ)2+4(dμ)), (3.24)

    with the respective multiplicities

    m1,2=12(t12d+(t1)(λμ)(λμ)2+4(dμ)). (3.25)

    Specifically, by (3.24), the absolute value of the smallest eigenvalue of H is given by

    |λmin(H)|=12((λμ)2+4(dμ)+μλ). (3.26)

    Finally, substituting (3.26) into (3.20) gives (3.21).

    Remark 5. The derivation of (3.21) relies on (3.20), where the latter is based on the lower bound on ϑ(¯H), obtained by relaxing the bound in (3.19) and selecting T=A(H) (see the proof of Item 2 in Proposition 8). Fortunately, the Lovász ϑ-function of strongly regular graphs (and their complements, which are also strongly regular) is known exactly, so there is no need for the lower bound on ϑ(¯H) in this case. It is therefore of interest to examine whether the bound in (3.21) can be improved by using (3.15) in combination with the exact value of ϑ(¯H) for a strongly regular graph H in the family srg(p,d,λ,μ). In that case, by Proposition 1 of [43], we have

    ϑ(¯H)=1dλmin(H), (3.27)

    which also gives

    ϑ(¯H)=1+2d(λμ)2+4(dμ)λ+μ, (3.28)

    where (3.28) holds by the expression of the smallest eigenvalue of the adjacency matrix of H, as given by r2 in (3.24). Finally, combining inequality (3.15) with equality (3.28) gives exactly the same bound as in (3.21). Thus, there is no improvement, and the bound remains identical in both approaches. As a side note, interested readers are referred to a recent application of (3.28), which provides an alternative proof of the friendship theorem in graph theory [44].

    It is natural to ask the following question:

    Question 3. Is there a graph H, apart of K2, for which the bound provided in Proposition 7 is tight for a largest H-intersecting family of graphs?

    We provide a partial reply to Question 3 by comparing the leftmost and rightmost terms in (3.12), which is equivalent to comparing |E(H)| and χ(H)1. According to the inequality

    χ(H)Δ(H)+1, (3.29)

    where Δ(H) is the maximum degree of the vertices in the graph H, it follows that unless H is an edge, there exists a gap between the size of the graph (|E(H)|) and the chromatic number minus one (χ(H)1). Furthermore, according to Brooks' theorem, for connected, undirected graphs H that are neither complete nor odd cycles, the chromatic number satisfies

    χ(H)Δ(H), (3.30)

    which provides a tighter bound in comparison to (3.29), further increasing the gap between |E(H)| and χ(H)1 unless H is an edge. It is also noted that the chromatic number satisfies

    χ(H)12(1+1+8|E(H)|), (3.31)

    with equality if and only if H is a complete graph. This bound follows from the observation that a graph with chromatic number k must contain at least as many edges as the complete graph on k vertices. The chromatic number χ(H) cannot therefore exceed the largest integer k satisfying (k2)|E(H)|. Consequently, if |E(H)|m2, then the minimum possible gap between χ(H)1 and |E(H)| satisfies

    |E(H)|(χ(H)1)m12(8m+11)1, (3.32)

    which tends to infinity as m.

    This section, composed of two independent parts, applies properties of Shannon entropy to derive bounds related to the enumeration of graph homomorphisms. It offers additional insight into the interplay between combinatorial structures and information-theoretic principles.

    The following known result relates the number of cliques of any two distinct orders in a graph.

    Proposition 9. Let G be a finite, simple, and undirected graph on n vertices, and let m be the number of cliques of order N in G. Then, for all s,tN with 2s<tn,

    (t!mt)s(s!ms)t. (4.1)

    We next suggest a generalization of Proposition 9.

    Proposition 10. Let G be a finite, simple, and undirected graph on n vertices, let s,tN with s<t<n, let T be an induced subgraph of G on t vertices, and let m(H,G) denote the number of copies of a subgraph H in the graph G. Then,

    (t!m(T,G))smaxS(s!m(S,G))t, (4.2)

    where the maximization in (4.2) is taken over all induced subgraphs S of T with s vertices.

    Let aut(H) denote the size of the automorphism group of a graph H, defined as the number of vertex permutations that preserve the graph's structure, i.e., its adjacency and non-adjacency relations. Furthermore, let inj(H,G) denote the number of injective homomorphisms from H to G (i.e., homomorphisms where distinct vertices of H map to distinct vertices of G). Then, equivalently to (4.2), in terms of injective homomorphism counts,

    (t!aut(T)inj(T,G))smaxS(s!aut(S)inj(S,G))t, (4.3)

    where the maximization in (4.3) is the same as in (4.2).

    Proof.

    ● Let V(G)=[n], and let T be an induced subgraph of G with |V(T)|=t<n.

    ● Select a copy of T in G uniformly at random, and then choose a uniform random ordering of the vertices in that copy. This process produces a random vector (X1,,Xt), representing the selected order of the vertices.

    ● Let m(T,G) denote the number of copies of T in G. Then,

    H(X1,,Xt)=log(t!m(T,G)), (4.4)

    as the vertices of each copy of T in G can be ordered in t! equally probable ways.

    ● Let S be chosen uniformly at random from all subsets of [t] of fixed size s, where 1s<t. Then,

    Pr[iS]=st,i[t]. (4.5)

    ● By Proposition 3 and equalities (4.4) and (4.5), it follows that

    ES[H(XS)]stlog(t!m(T,G)). (4.6)

    ● The random subvector XS corresponds to a copy, in G, of an induced subgraph ST with s vertices. All s! permutations of the subvector XS correspond to the same copy of S in G, and there are m(S,G) such copies of S in G.

    ● The entropy of the random subvector XS therefore satisfies

    H(XS)log(s!m(S,G)), (4.7)

    where m(S,G) denotes the number of copies of a graph S in G, and s! accounts for the s! permutations of the vector XS that correspond to the same copy of S in G.

    ● By (4.7), it follows that

    ES[H(XS)]maxSlog(s!m(S,G)), (4.8)

    where the maximization on the right-hand side of (4.8) is taken over all induced subgraphs S of T on s vertices.

    ● Combining (4.6) and (4.8) yields

    stlog(t!m(T,G))maxSlog(s!m(S,G)), (4.9)

    and exponentiating both sides of (4.9) gives (4.2).

    ● The following equality holds:

    inj(H,G)=aut(H)m(H,G), (4.10)

    since each copy of H in G corresponds to exactly aut(H) distinct injective homomorphisms from H to G, as its vertices can be labeled in aut(H) different ways. Combining (4.2) and (4.10) yields inequality (4.3). Furthermore, by (4.10), inequalities (4.2) and (4.3) are equivalent.

    Remark 6 (Specialization of Proposition 10). Proposition 10 can be specialized to Proposition 9 by setting T=Kt (a clique of order t), for which every induced subgraph of T on s vertices is a clique S of order s (S=Ks). In that case, aut(T)=t! and aut(S)=s!. Consequently, the maximization on the right-hand side of (4.3) is performed over the single graph Ks, which gives

    inj(Kt,G)sinj(Ks,G)t,1s<t<n. (4.11)

    By (4.10), we have

    inj(Kt,G)=t!mt, (4.12)
    inj(Ks,G)=s!ms, (4.13)

    where mt and ms denote, respectively, the number of cliques of orders t and s in G. Combining (4.11), (4.12), and (4.13) then gives

    (t!mt)s(s!ms)t,1s<t<n. (4.14)

    This reproduces Proposition 9, which establishes a relationship between the numbers of cliques of two different orders in a finite, simple, undirected graph G.

    Perfect graphs are characterized by the property that not only their chromatic and clique numbers coincide, but also the same coincidence applies to every induced subgraph. The complement of a perfect graph is perfect as well. Perfect graphs include many important families of graphs such as bipartite graphs, line graphs of bipartite graphs, chordal graphs, comparability graphs, and the complements of all these graphs [45].

    A complete bipartite graph, denoted by Ks,t for s,tN, consists of two partite sets of sizes s and t, where every vertex in one partite set is adjacent to all the vertices in the other partite set. It is in particular a perfect graph.

    In the following, we rely on Proposition 6 to derive an upper bound on the number of homomorphisms from a perfect graph to a graph. We then rely on properties of Shannon entropy to derive a lower bound on the number of homomorphisms from any complete bipartite graph to any bipartite graph, and examine its tightness by comparing it to the specialized upper bound that is based on Proposition 6.

    Proposition 11. Let T and G be simple, finite, and undirected graphs having no isolated vertices, and suppose that T is also a perfect graph. Then, the number of homomorphisms from T to G satisfies

    hom(T,G)(2|E(G)|)ϑ(T). (4.15)

    Furthermore, let G be a simple bipartite graph having no isolated vertices. Let its partite vertex sets be of sizes n1 and n2, and let its number of edges be equal to αn1n2 with α(0,1]. Then, the number of homomorphisms from the complete bipartite graph Ks,t to G, where s,tN, satisfies

    αstmin{n1,n2}|st|(n1n2)max{s,t}hom(Ks,t,G)(2αn1n2)max{s,t}. (4.16)

    Proof. For a perfect graph T, we have α(T)=ϑ(T)=αf(T)=χ(¯T), which by (2.22) gives (4.15).

    We next prove the rightmost inequality in (4.16). Every bipartite graph is a perfect graph, so it follows that α(Ks,t)=ϑ(Ks,t)=αf(Ks,t)=χ(¯Ks,t). The independence number of the complete bipartite graph Ks,t is the size of the largest among its two partite vertex sets, so α(Ks,t)=max{s,t}. Similarly, the complement graph ¯Ks,t=KsKt is the disjoint union of the complete graphs Ks and Kt, so its chromatic number is given by χ(¯Ks,t)=max{s,t}. Consequently, ϑ(Ks,t)=max{s,t}, whose substitution into the right-hand side of (4.15), along with |E(G)|=αn1n2 where α(0,1] (by assumption), gives the rightmost inequality in (4.16).

    We finally prove the leftmost inequality in (4.16). Let U and V denote the partite vertex sets of the simple bipartite graph G, where |U|=n1 and |V|=n2. Let (U,V) be a random vector taking values in U×V, and distributed uniformly at random on the edges of G. Then, its entropy is given by

    H(U,V)=log|E(G)|=log(αn1n2). (4.17)

    The random vector (U,V) can be sampled by first sampling U=u from the marginal probability mass function (PMF) of U, denoted by PUXYZ, and then sampling V from the conditional PMF PVXYZ|UXYZ(|u). We next construct a random vector (U1,,Us,V1,,Vt) as follows:

    ● Let V1,,Vt be conditionally independent and identically distributed (i.i.d.) given U, having the conditional PMF

    PV1,,VtXYZ|UXYZ(v1,,vt|u)=tj=1PVXYZ|UXYZ(vj|u),uU,(v1,,vt)Vt. (4.18)

    ● Let U1,,Us be conditionally i.i.d. given (V1,,Vt), having the conditional PMF

    PU1,,UsXYZ|V1,,VtXYZ(u1,,us|v1,,vt)=si=1PUiXYZ|V1,,VtXYZ(ui|v1,,vt),(u1,,us)Us,(v1,,vt)Vt, (4.19)

    where the conditional PMFs on the right-hand side of (4.19) are given by

    PUiXYZ|V1,,VtXYZ(u|v1,,vt)=PUXYZ(u)j=1tPVXYZ|UXYZ(vj|u)uU{PUXYZ(u)j=1tPVXYZ|UXYZ(vj|u)},uU,(v1,,vt)Vt,i[s]. (4.20)

    By the construction of the random vector (U1,,Us,V1,,Vt) in (4.18)–(4.20), the following holds:

    1. The random variables U1,,Us are identically distributed, and UiU (i.e., PUiXYZ=PUXYZ) for all i[s]. Indeed, it first follows from (4.18) that

    PV1,,VtXYZ(v1,,vt)=uU{PUXYZ(u)tj=1PVXYZ|UXYZ(vj|u)}(v1,,vt)Vt. (4.21)

    Hence, for all i[s] and uU,

    PUiXYZ(u)=(v1,,vt)Vt{PUiXYZ|V1,,VtXYZ(u|v1,,vt)PV1,,VtXYZ(v1,,vt)} (4.22)
    =(v1,,vt)Vt{PUXYZ(u)tj=1PVXYZ|UXYZ(vj|u)} (4.23)
    =PUXYZ(u)tj=1{vjVPVXYZ|UXYZ(vj|u)} (4.24)
    =PUXYZ(u), (4.25)

    where (4.22) holds by Bayes' rule; (4.23) holds by combining (4.20) and (4.21); (4.24) holds by expressing the outer t-dimensional summation over Vt as the product of t inner one-dimensional summations over V, due to the product form on the right-hand side of (4.23), and finally (4.25) holds since the conditional probability masses in each inner summation on the right-hand side of (4.24) add to 1.

    2. For all i[s] and j[t], we have (Ui,Vj)(U,V), and further (Ui,V1,,Vt)(U,V1,,Vt). Indeed, combining (4.18), (4.20), and (4.21) yields (by another application of Bayes' rule)

    PUi,V1,,VtXYZ(u,v1,,vt)=PUXYZ(u)tj=1PVXYZ|UXYZ(vj|u)=PU,V1,,VtXYZ(u,v1,,vt),uU,(v1,,vt)Vt,i[s]. (4.26)

    Then, a marginalization of (4.26) by summing over all (v1,,vj1,vj+1,,vt)Vt1 gives

    PUi,VjXYZ(u,v)=PU,VXYZ(u,v),i[s],j[t],uU,vV. (4.27)

    The joint entropy of the random subvector (U1,V1,,Vt) then satisfies

    H(U1,V1,,Vt)=H(U1)+tj=1H(Vj|U1) (4.28)
    =H(U)+tH(V|U) (4.29)
    =tH(U,V)(t1)H(U) (4.30)
    =tlog(αn1n2)(t1)H(U) (4.31)
    tlog(αn1n2)(t1)logn1 (4.32)
    =log(αtn1nt2), (4.33)

    where (4.28) holds by the chain rule of Shannon entropy, since (by construction) V1,,Vt are conditionally independent given U (see (4.18)) and also since (U1,V1,,Vt)(U,V1,,Vt) (see (4.26) with i=1); (4.29) relies on (4.27); (4.30) holds by a second application of the chain rule; (4.31) holds by (4.17), and finally (4.32) follows from the uniform bound, which states that if X is a discrete random variable supported on a finite set S, then H(X)log|S|. In this case, H(U)log|U|=logn1. Consequently, the joint entropy of the random vector (U1,,Us,V1,,Vt) satisfies

    H(U1,,Us,V1,,Vt)=H(V1,,Vt)+si=1H(Ui|V1,,Vt) (4.34)
    =H(V1,,Vt)+sH(U1|V1,,Vt) (4.35)
    =s[H(V1,,Vt)+H(U1|V1,,Vt)](s1)H(V1,,Vt)=sH(U1,V1,,Vt)(s1)H(V1,,Vt) (4.36)
    slog(αtn1nt2)(s1)H(V1,,Vt) (4.37)
    slog(αtn1nt2)(s1)log(nt2) (4.38)
    =log(αstns1nt2), (4.39)

    where (4.34) holds by the chain rule and since (by construction) the random variables U1,,Us are conditionally independent given V1,,Vt (see (4.19)); (4.35) holds since, by construction, all the Ui's (i[s]) are identically conditionally distributed given (V1,,Vt) (see (4.20)); (4.36) holds by another use of the chain rule; (4.37) holds by (4.33), and finally (4.38) holds by the uniform bound which implies in this case that H(V1,,Vt)log(|V|t)=log(nt2).

    The vector (U1,,Us,V1,,Vt) is in one-to-one correspondence with a homomorphism from Ks,t to G. To that end, label the vertices of the complete bipartite graph Ks,t by the elements of [s+t], where the vertices of the partite set of size s are labeled by the elements of [s], and the vertices of the second partite set (of size t) are labeled by the elements of {s+1,,s+t}. Then, for all i[s] and j[t], map each edge {i,i+j}E(Ks,t) to {Ui,Vj}E(G). This gives a homomorphism Ks,tG since {Ui,Vj}E(G) holds by construction, see (4.20), where PUVXYZ is uniformly distributed over the edges of the graph G, PUXYZ is the marginal PMF of U, and PVXYZ|UXYZ is the conditional PMF of V given U. By the uniform bound, it then follows that

    H(U1,,Us,V1,,Vt)loghom(Ks,t,G). (4.40)

    Combining (4.39) and (4.40) yields

    hom(Ks,t,G)αstns1nt2. (4.41)

    The right-hand side of (4.41) is not necessarily symmetric in n1 and n2 (or in s,tN). Consequently, swapping either n1 and n2 (or s and t) gives

    hom(Ks,t,G)max{αstns1nt2,αstnt1ns2}=αstmin{n1,n2}min{s,t}max{n1,n2}max{s,t}=αstmin{n1,n2}min{s,t}max{s,t}(n1n2)max{s,t}=αstmin{n1,n2}|st|(n1n2)max{s,t}, (4.42)

    which proves the leftmost inequality in (4.16).

    Setting s=t in Proposition 11 gives the following.

    Corollary 3. Let G be a bipartite graph without isolated vertices, let its partite vertex sets be of sizes n1 and n2, and let its number of edges be equal to αn1n2 with α(0,1]. Then,

    αs2(n1n2)shom(Ks,s,G)(2α)s(n1n2)s. (4.43)

    Consequently, for a fixed α(0,1), it follows from (4.43) that the number of homomorphisms from the complete bipartite graph Ks,s to G scales like (n1n2)s.

    The author declares that no Artificial Intelligence (AI) tools were utilized in creating this article.

    The author acknowledges the timely and helpful reports of the two referees, and a stimulating discussion with Yuval Peled during the author's seminar talk on the subject at the Einstein Institute of Mathematics, Hebrew University of Jerusalem. The author also appreciates the hospitality provided during the seminar, which was organized by Yuval.

    The author declares no conflicts of interest.

    Prof. Igal Sason is the Guest Editor of special issue “Mathematical Foundations of Information Theory” for AIMS Mathematics. Prof. Igal Sason was not involved in the editorial review and the decision to publish this article.



    [1] F. Black, M. Scholes, The pricing of option and corporate liabilities, J. Polit. Econ., 81 (1973), 637–654. https://doi.org/10.1086/260062 doi: 10.1086/260062
    [2] W. G. Zhang, Z. Li, Y. J. Liu, Y. Zhang, Pricing European option under fuzzy mixed fractional Brownian motion model with jumps, Comput. Econ., 58 (2021), 483–515. https://doi.org/10.1007/s10614-020-10043-z doi: 10.1007/s10614-020-10043-z
    [3] A. W. Lo, Long-term memory in stock market prices, Econometrica, 59 (1991), 1279–313. https://doi.org/10.2307/2938368 doi: 10.2307/2938368
    [4] S. Sadique, P. Silvapulle, Long-term memory in stock market returns: International evidence, Int. J. Financ. Econ., 6 (2001), 59–67. https://doi.org/10.1002/ijfe.143 doi: 10.1002/ijfe.143
    [5] A. Sensoy, B. M. Tabak, Time-varying long term memory in the European Union stock markets, Physica A, 436 (2015), 147–158. https://doi.org/10.1016/j.physa.2015.05.034 doi: 10.1016/j.physa.2015.05.034
    [6] A. Sensoy, B. M. Tabak, Dynamic effciency of stock markets and exchange rates, Int. Rev. Financial Anal., 47 (2016), 353–371. https://doi.org/10.1016/j.irfa.2016.06.001 doi: 10.1016/j.irfa.2016.06.001
    [7] J. T. Barkoulas, A. G. Barilla, W. Wells, Long-memory exchange rate dynamics in the euroera, Chaos Soliton. Fract., 86 (2016), 92–100. https://doi.org/10.1016/j.chaos.2016.02.007 doi: 10.1016/j.chaos.2016.02.007
    [8] O. A. Vasicek, An equilibrium characterization of the term structure, J. Financ. Econ., 5 (1977), 177–188. https://doi.org/10.1016/0304-405X(77)90016-2 doi: 10.1016/0304-405X(77)90016-2
    [9] F. Mehrdoust, A. R. Najaf, Pricing European options under fractional Black-Scholes model with a weak payoff function, Comput. Econ., 52 (2018), 685–706. https://doi.org/10.1007/s10614-017-9715-3 doi: 10.1007/s10614-017-9715-3
    [10] L. C. G. Rogers, Arbitrage with fractional Brownian motion, Math. Financ., 7 (1997), 95–105. https://doi.org/10.1111/1467-9965.00025 doi: 10.1111/1467-9965.00025
    [11] T. E. Duncan, Y. Hu, B. Pasik-Duncan, Stochastic calculus for fractional Brownian motion, SIAM J. Control. Optim., 38 (2000), 582–612. https://doi.org/10.1137/S036301299834171X doi: 10.1137/S036301299834171X
    [12] Y. Hu, B. Øksendal, Fractional white noise calculus and applications to finance, Infin. Dimens. Anal. Qu., 6 (2003), 1–32. https://doi.org/10.1142/S0219025703001110 doi: 10.1142/S0219025703001110
    [13] C. Necula, Option pricing in a fractional brownian motion environment, Math. Rep., 6 (2004), 259–273. https://dx.doi.org/10.2139/ssrn.1286833 doi: 10.2139/ssrn.1286833
    [14] R. C. Merton, On the pricing of corporate debt: The risk structure of interest rates, J. Financ., 29 (1974), 449–470. https://doi.org/10.1111/j.1540-6261.1974.tb03058.x doi: 10.1111/j.1540-6261.1974.tb03058.x
    [15] W. L. Huang, X. X. Tao, S. H. Li, Pricing formulae for European options under the fractional Vasicek interest rate model, Acta Math. Sin., 55 (2012), 219–230.
    [16] Z. L. Xu, X. Y. Jia, The calibration of volatility for option pricing models with jump diffusion processes, Appl. Anal., 98 (2019), 810–827. https://doi.org/10.1080/00036811.2017.1403588 doi: 10.1080/00036811.2017.1403588
    [17] A. Kirsch, An introduction to the mathematical theory of inverse problems, Springer, 2011.
    [18] R. Lagnado, S. Osher, A technique for calibrating derivative security pricing models: Numerical solution of an inverse problem, J. Comput. Financ., 1 (1997), 13–25. https://doi.org/10.21314/JCF.1997.002 doi: 10.21314/JCF.1997.002
    [19] C. Chiarella, M. Craddock, N. El-Hassan, The calibration of stock option pricing models using inverse problem methodology, QFRQ Res. Paper Ser., 2000.
    [20] L. S. Jiang, Y. S. Tao, Identifying the volatility of underlying assets from option prices, Inverse Probl., 17 (2001), 137–155. https://doi.org/10.1088/0266-5611/17/1/311 doi: 10.1088/0266-5611/17/1/311
    [21] P. Ngnepieba, The adjoint method formulation for an inverse problem in the generalized Black-Scholes model, J. Syst. Cybern. Inform., 4 (2006), 69–77.
    [22] S. G. Georgiev, L. G. Vulkov, Fast reconstruction of time-dependent market volatility for European options, Comput. Appl. Math., 40 (2021), 30–48. https://doi.org/10.1007/s40314-021-01422-9 doi: 10.1007/s40314-021-01422-9
    [23] R. Ramlau, C. A. Zarzer, On the minimization of a Tikhonov functional with a non-convex sparsity constraint, Electron. Trans. Numer. Anal., 39 (2012), 476–507.
    [24] Z. B. Xu, X. Y. Chang, H. Zhang, Y. Wang, L1/2 regularization, Science China, 2010.
    [25] T. Sun, D. S. Li, Nonconvex low-rank and total-variation regularized model and algorithm for image deblurring, Chinese J. Comput., 43 (2020), 643–652.
    [26] Z. B. Xu, X. Y. Chang, F. M. Xu, H. Zhang, L1/2 Regularization: A thresholding representation theory and a fast solver, IEEE T. Neur. Net. Lear., 23 (2012), 1013–1027. https://doi.org/10.1109/TNNLS.2012.2197412 doi: 10.1109/TNNLS.2012.2197412
    [27] A. Beck, M. Teboulle, A fast iterative shrinkage-thresholding algorithm for linear inverse problems, SIAM J. Imaging Sci., 2 (2009), 183–202. https://doi.org/10.1137/080716542 doi: 10.1137/080716542
    [28] S. L. Heston, A closed-form solution for options with stochastic volatility with applications to bond and currency options, Rev. Financ. Stud., 6 (1993), 327–343. https://doi.org/10.1093/rfs/6.2.327 doi: 10.1093/rfs/6.2.327
    [29] X. J. He, S. P. Zhu, How should a local regime-switching model be calibrated? J. Econ. Dyn. Control., 78 (2017), 149–163. https://doi.org/10.1016/j.jedc.2017.03.005
    [30] X. J. He, S. P. Zhu, On full calibration of hybrid local volatility and regime-switching models, J. Futures Markets, 38 (2018), 586–606. https://doi.org/10.1002/fut.21901 doi: 10.1002/fut.21901
    [31] X. J. He, S. Lin, A fractional Black-Scholes model with stochastic volatility and European option pricing, Expert Syst. Appl., 178 (2021), 114983. https://doi.org/10.1016/j.eswa.2021.114983 doi: 10.1016/j.eswa.2021.114983
    [32] X. J. He, W. T. Chen, Pricing foreign exchange options under a hybrid Heston-Cox-Ingersoll-Ross model with regime switching, IMA J. Manag. Math., 33 (2022), 255–272. https://doi.org/10.1093/imaman/dpab013 doi: 10.1093/imaman/dpab013
    [33] X. J. He, S. Lin, An analytical approximation formula for barrier option prices under the Heston model, Comput. Econ., 2021. https://doi.org/10.1007/s10614-021-10186-7
    [34] X. J. He, W. T. Chen, A closed-form pricing formula for European options under a new stochastic volatility model with a stochastic long-term mean, Math. Financ. Econ., 15 (2021), 381–396. https://doi.org/10.1007/s11579-020-00281-y doi: 10.1007/s11579-020-00281-y
    [35] Y. Liu, X. Y. Bai, Investor sentiment, option implied information and prediction of stock market volatility, Secur. Market. Her., 1 (2020), 54–61.
    [36] X. M. Wang, Empirical analysis of Shanghai 50ETF options pricing based on local volatility model, Syst. Eng.-Theor. Pract., 39 (2019), 2487–2501.
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2288) PDF downloads(104) Cited by(7)

Figures and Tables

Figures(6)  /  Tables(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog