Professional Documents
Culture Documents
Textbook Combinatorics Second Edition Nicholas Loehr Ebook All Chapter PDF
Textbook Combinatorics Second Edition Nicholas Loehr Ebook All Chapter PDF
Nicholas Loehr
Visit to download the full and correct content document:
https://textbookfull.com/product/combinatorics-second-edition-nicholas-loehr/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://textbookfull.com/product/an-introduction-to-mathematical-
proofs-1st-edition-nicholas-a-loehr/
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/system-safety-engineering-and-
risk-assessment-a-practical-approach-second-edition-nicholas-j-
bahr/
https://textbookfull.com/product/introduction-to-combinatorics-
walter-d-wallis/
Math 108 notes Combinatorics Kannan Soundararajan
https://textbookfull.com/product/math-108-notes-combinatorics-
kannan-soundararajan/
https://textbookfull.com/product/university-of-waterloo-
math-239-course-notes-fall-2016-intro-to-combinatorics-
department-of-combinatorics-and-optimization/
https://textbookfull.com/product/lessons-in-enumerative-
combinatorics-2021st-edition-omer-egecioglu/
https://textbookfull.com/product/analytic-combinatorics-a-
multidimensional-approach-1st-edition-marni-mishna/
https://textbookfull.com/product/algorithmic-combinatorics-
enumerative-combinatorics-special-functions-and-computer-algebra-
in-honour-of-peter-paule-on-his-60th-birthday-veronika-pillwein/
COMBINATORICS
Second Edition
DISCRETE
MATHEMATICS
AND
ITS APPLICATIONS
Series Editors
Miklos Bona
Patrice Ossona de Mendez
Douglas West
R. B. J. T. Allenby and Alan Slomson, How to Count: An Introduction to Combinatorics,
Third Edition
Craig P. Bauer, Secret History: The Story of Cryptology
Jürgen Bierbrauer, Introduction to Coding Theory, Second Edition
Katalin Bimbó, Combinatory Logic: Pure, Applied and Typed
Katalin Bimbó, Proof Theory: Sequent Calculi and Related Formalisms
Donald Bindner and Martin Erickson, A Student’s Guide to the Study, Practice, and Tools of
Modern Mathematics
Francine Blanchet-Sadri, Algorithmic Combinatorics on Partial Words
Miklós Bóna, Combinatorics of Permutations, Second Edition
Miklós Bóna, Handbook of Enumerative Combinatorics
Miklós Bóna, Introduction to Enumerative and Analytic Combinatorics, Second Edition
Jason I. Brown, Discrete Structures and Their Interactions
Richard A. Brualdi and Dragos̆ Cvetković, A Combinatorial Approach to Matrix Theory and Its
Applications
Kun-Mao Chao and Bang Ye Wu, Spanning Trees and Optimization Problems
Charalambos A. Charalambides, Enumerative Combinatorics
Gary Chartrand and Ping Zhang, Chromatic Graph Theory
Henri Cohen, Gerhard Frey, et al., Handbook of Elliptic and Hyperelliptic Curve Cryptography
Charles J. Colbourn and Jeffrey H. Dinitz, Handbook of Combinatorial Designs, Second Edition
Titles (continued)
Abhijit Das, Computational Number Theory
Matthias Dehmer and Frank Emmert-Streib, Quantitative Graph Theory:
Mathematical Foundations and Applications
Martin Erickson, Pearls of Discrete Mathematics
Martin Erickson and Anthony Vazzana, Introduction to Number Theory
Steven Furino, Ying Miao, and Jianxing Yin, Frames and Resolvable Designs: Uses,
Constructions, and Existence
Mark S. Gockenbach, Finite-Dimensional Linear Algebra
Randy Goldberg and Lance Riek, A Practical Handbook of Speech Coders
Jacob E. Goodman and Joseph O’Rourke, Handbook of Discrete and Computational Geometry,
Second Edition
Jonathan L. Gross, Combinatorial Methods with Computer Applications
Jonathan L. Gross and Jay Yellen, Graph Theory and Its Applications, Second Edition
Jonathan L. Gross, Jay Yellen, and Ping Zhang Handbook of Graph Theory, Second Edition
David S. Gunderson, Handbook of Mathematical Induction: Theory and Applications
Richard Hammack, Wilfried Imrich, and Sandi Klavžar, Handbook of Product Graphs,
Second Edition
Darrel R. Hankerson, Greg A. Harris, and Peter D. Johnson, Introduction to Information Theory
and Data Compression, Second Edition
Darel W. Hardy, Fred Richman, and Carol L. Walker, Applied Algebra: Codes, Ciphers, and
Discrete Algorithms, Second Edition
Daryl D. Harms, Miroslav Kraetzl, Charles J. Colbourn, and John S. Devitt, Network Reliability:
Experiments with a Symbolic Algebra Environment
Silvia Heubach and Toufik Mansour, Combinatorics of Compositions and Words
Leslie Hogben, Handbook of Linear Algebra, Second Edition
Derek F. Holt with Bettina Eick and Eamonn A. O’Brien, Handbook of Computational Group Theory
David M. Jackson and Terry I. Visentin, An Atlas of Smaller Maps in Orientable and
Nonorientable Surfaces
Richard E. Klima, Neil P. Sigmon, and Ernest L. Stitzinger, Applications of Abstract Algebra
with Maple™ and MATLAB®, Second Edition
Richard E. Klima and Neil P. Sigmon, Cryptology: Classical and Modern with Maplets
Patrick Knupp and Kambiz Salari, Verification of Computer Codes in Computational Science
and Engineering
William L. Kocay and Donald L. Kreher, Graphs, Algorithms, and Optimization, Second Edition
Donald L. Kreher and Douglas R. Stinson, Combinatorial Algorithms: Generation Enumeration
and Search
Titles (continued)
COMBINATORICS
Second Edition
Nicholas A. Loehr
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity
of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized
in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Introduction xix
I Counting 1
1 Basic Counting 3
1.1 The Product Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 The Sum Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Counting Words and Permutations . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Counting Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.5 Counting Anagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.6 Counting Rules for Set Operations . . . . . . . . . . . . . . . . . . . . . . . 14
1.7 Probability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.8 Lotteries and Card Games . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.9 Conditional Probability and Independence . . . . . . . . . . . . . . . . . . 21
1.10 Counting Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.11 Cardinality and the Bijection Rule . . . . . . . . . . . . . . . . . . . . . . . 27
1.12 Counting Multisets and Compositions . . . . . . . . . . . . . . . . . . . . . 30
1.13 Counting Balls in Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.14 Counting Lattice Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.15 Proofs of the Sum Rule and the Product Rule . . . . . . . . . . . . . . . . 36
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
xi
xii Contents
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Bibliography 595
Index 603
Preface to the Second Edition
This book presents a general introduction to enumerative, bijective, and algebraic combina-
torics. Enumerative combinatorics is the mathematical theory of counting. This branch of
discrete mathematics has flourished in the last few decades due to its many applications to
probability, computer science, engineering, physics, and other areas. Bijective combinatorics
produces elegant solutions to counting problems by setting up one-to-one correspondences
(bijections) between two sets of combinatorial objects. Algebraic combinatorics uses com-
binatorial methods to obtain information about algebraic structures such as permutations,
polynomials, matrices, and groups. This relatively new subfield of combinatorics has had
a profound influence on classical mathematical subjects such as representation theory and
algebraic geometry.
Part I of the text covers fundamental counting tools including the Sum and Product
Rules, binomial coefficients, recursions, bijective proofs of combinatorial identities, enumer-
ation problems in graph theory, inclusion-exclusion formulas, generating functions, ranking
algorithms, and successor algorithms. This part requires minimal mathematical prerequisites
and could be used for a one-semester combinatorics course at the advanced undergradu-
ate or beginning graduate level. This material will be interesting and useful for computer
scientists, statisticians, engineers, and physicists, as well as mathematicians.
Part II of the text contains an introduction to algebraic combinatorics, discussing groups,
group actions, permutation statistics, tableaux, symmetric polynomials, and formal power
series. My presentation of symmetric polynomials is more combinatorial (and, I hope, more
accessible) than the standard reference work [84]. In particular, a novel approach based
on antisymmetric polynomials and abaci yields elementary combinatorial proofs of some
advanced results such as the Pieri Rules and the Littlewood–Richardson Rule for multiply-
ing Schur symmetric polynomials. Part II assumes a bit more mathematical sophistication
on the reader’s part (mainly some knowledge of linear algebra) and could be used for a
one-semester course for graduate students in mathematics and related areas. Some relevant
background material from abstract algebra and linear algebra is reviewed in an appendix.
The final chapter consists of independent sections on optional topics that complement ma-
terial in the main text. In many chapters, some of the harder material in later sections can
be omitted without loss of continuity.
Compared to the first edition, this new edition has an earlier, expanded treatment of
generating functions that focuses more on the combinatorics and applications of generating
functions and less on the algebraic formalism of formal power series. In particular, we provide
greater coverage of exponential generating functions and the use of generating functions to
solve recursions, evaluate summations, and enumerate complex combinatorial structures.
We cover successor algorithms in more detail in Chapter 6, providing automatic methods to
create these algorithms directly from counting arguments based on the Sum and Product
Rules. The final chapter contains some new material on quasisymmetric polynomials. Many
chapters in Part I have been reorganized to start with elementary content most pertinent
to solving applied problems, deferring formal proofs and advanced material until later. I
hope this restructuring makes the second edition more readable and appealing than the
first edition, without sacrificing mathematical rigor.
xvii
xviii Preface to the Second Edition
Each chapter ends with a summary, a set of exercises, and bibliographic notes. The
book contains over 1200 exercises, ranging in difficulty from routine verifications to unsolved
problems. Although we provide references to the literature for some of the major theorems
and harder problems, no attempt has been made to pinpoint the original source for every
result appearing in the text and exercises.
I am grateful to the editors, reviewers, and other staff at CRC Press for their help
with the preparation of this second edition. Readers may communicate errors and other
comments to the author by sending e-mail to nloehr@vt.edu.
Nicholas A. Loehr
Introduction
The goal of enumerative combinatorics is to count the number of objects in a given finite
set. This may seem like a simple task, but the sets we want to count are often very large
and complicated. Here are some examples of enumeration problems that can be solved using
the techniques in this book. How many encryption keys are available using the 128-bit AES
encryption algorithm? How many strands of DNA can be built using five copies of each of
the nucleotides adenine, cytosine, guanine, and thymine? How many ways can we be dealt
a full house in five-card poker? How many ways can we place five rooks on a chessboard
with no two rooks in the same row or column? How many subsets of {1, 2, . . . , n} contain no
two consecutive integers? How many ways can we write 100 as a sum of positive integers?
How many connected graphs on n vertices have no cycles? How many integers between
1 and n are relatively prime to n? How many circular necklaces can be made with three
rubies, two emeralds, and one diamond if all rotations of a given necklace are considered
the same? How many ways can we tile a chessboard with dominos? The answers to such
counting questions can help us solve a wide variety of problems in probability, cryptography,
algorithm analysis, physics, abstract algebra, and other areas of mathematics.
Part I of this book develops the basic principles of counting, placing particular emphasis
on the role of bijections. To give a bijective proof that a given set S has size n, one must
construct an explicit one-to-one correspondence (bijection) from S onto the set {1, 2, . . . , n}.
More generally, one can prove that two sets A and B have the same size by exhibiting a
bijection between A and B. For example, given a fixed positive integer n, let A be the set
of all strings w1 w2 · · · w2n consisting of n left parentheses and n right parentheses that are
balanced (every left parenthesis can be matched to a right parenthesis later in the sequence).
Let B be the set of all arrays
y1 y2 · · · yn
z1 z2 · · · zn
such that every number in {1, 2, . . . , 2n} appears once in the array, y1 < y2 < · · · < yn , z1 <
z2 < · · · < zn , and yi < zi for every i. The sets A and B seem quite different at first glance.
Yet, we can demonstrate that A and B have the same size using the following bijection.
Given w = w1 w2 · · · w2n in A, let y1 , y2 , . . . , yn be the positions of the left parentheses in w
(written in increasing order), and let z1 , z2 , . . . , zn be the positions of the right parentheses
in w (written in increasing order). For example, the string (()())((()))() in A maps to
the array
1 2 4 7 8 9 13
.
3 5 6 10 11 12 14
One may check that the requirement yi < zi for all i is equivalent to the fact that w is
a balanced string of parentheses. The string w is uniquely determined by the array of yi ’s
and zi ’s, and every such array arises from some string w in A. Thus we have defined the
required one-to-one correspondence between A and B. We now know that the sets A and
B have the same size, although we have not yet determined what that size is!
Bijective proofs, while elegant, can be very difficult to discover. For example, let C be
the set of rearrangements of 1, 2, . . . , n that have no decreasing subsequence of length three.
It turns out that the sets B and C have the same size, so there must exist a bijection from
xix
xx Introduction
B to C. Can you find one? (Before spending too long on this question, you might want to
read §12.13.)
Luckily, the field of enumerative combinatorics contains a whole arsenal of techniques to
help us solve complicated counting problems. Besides bijections, some of these techniques
include recursions, generating functions, group actions, inclusion-exclusion formulas, linear
algebra, probabilistic methods, and symmetric polynomials. In the rest of this introduction,
we describe several challenging enumeration problems that can be solved using these more
advanced methods. These problems, and the combinatorial technology needed to solve them,
will be discussed at greater length later in the text.
Standard Tableaux
Suppose we are given a diagram D consisting of a number of rows of boxes, left-justified,
with each row no longer than the one above it. For example, consider this diagram:
Let n be the total number of boxes in the diagram. A standard tableau of shape D is a filling
of the boxes in D with the numbers 1, 2, . . . , n (used once each) so that every row forms an
increasing sequence (reading left to right), and every column forms an increasing sequence
(reading top to bottom). For example, here are three standard tableaux of shape D, where
D is the diagram pictured above:
1 2 3 4 1 3 4 9 1 2 3 7
5 6 2 5 4 8
7 8 6 7 5 9
9 8 6
Question: Given a diagram D of n cells, how many standard tableaux of shape D are there?
There is a remarkable answer to this counting problem, known as the Hook-Length
Formula. To state it, we need to define hooks and hook lengths. The hook of a box b in a
diagram D consists of all boxes to the right of b in its row, all boxes below b in its column,
and box b itself. The hook length of b, denoted h(b), is the number of boxes in the hook of
b. For example, if b is the first box in the second row of D, then the hook of b consists of
the marked boxes in the following picture:
• •
•
•
So h(b) = 4. In the picture below, we have labeled each box in D with its hook length.
7 5 2 1
4 2
3 1
1
Hook-Length Formula: Given a diagram D of n cells, the number of standard tableaux
of shape D is n! divided by the product of the hook lengths of all the boxes in D.
Introduction xxi
For the diagram D in our example, the formula says there are exactly
9!
= 216
7·5·2·1·4·2·3·1·1
standard tableaux of shape D. Observe that the set B of 2 × n arrays (discussed above) can
also be enumerated with the aid of the Hook-Length Formula. In this case, the diagram D
consists of two rows of length n. The hook lengths for boxes in the top row are n + 1, n,
n − 1, . . ., 2, while the hook lengths in the bottom row are n, n − 1, . . . , 1. Since there are
2n boxes in D, the Hook-Length Formula asserts that
(2n)! (2n)!
|B| = = .
(n + 1) · n · (n − 1) · . . . · 2 · n · (n − 1) · . . . · 1 (n + 1)!n!
The fraction on the right side is an integer called the nth Catalan number. Since we previ-
ously displayed a bijection between B and A (the set of strings of balanced parentheses),
we conclude that the size of A is also given by a Catalan number. As we will see, many
different types of combinatorial structures are counted by the Catalan numbers.
How is the Hook-Length Formula proved? Many proofs of this formula have been found
since it was originally discovered in 1954. There are algebraic proofs, probabilistic proofs,
combinatorial proofs, and (relatively recently) bijective proofs of this formula. Here we
discuss a flawed probabilistic argument that gives a little intuition for how the mysterious
Hook-Length Formula arises. Suppose we choose a random filling F of the boxes of D with
the integers 1, 2, . . . , n. What is the probability that this filling will actually be a standard
tableau? We remark that the filling is standard if and only if for every box b in D, the
entry in b is the smallest number in the hook of b. Since any of the boxes in the hook
is equally likely to contain the smallest value, we see that theQprobability of this event is
1/h(b). Multiplying these probabilities together would give 1/ b∈D h(b) as the probability
that the random filling we chose is a standard tableau. Since the total number of possible
fillings
Q is n! (by the Product Rule, discussed in Chapter 1), this leads us to the formula
n!/ b∈D h(b) for the number of standard tableaux of shape D.
Unfortunately, the preceding argument contains a fatal error. The events “the entry
in box b is the smallest in the hook of b,” for various choices of b, are not necessarily
independent (see §1.9). Thus we cannot find the probability that all these events occur by
multiplying together the probabilities of each individual event. Nevertheless, remarkably,
the final answer obtained by making this erroneous independence assumption turns out
to be correct! The Hook-Length Formula can be justified by a more subtle probabilistic
argument due to Greene, Nijenhuis, and Wilf. We describe this argument in §12.12.
Rook Placements
A rook is a chess piece that can travel any number of squares along its current row or column
in a single move. We say that the rook attacks all the squares in its row and column. How
many ways can we place eight rooks on an ordinary 8 × 8 chessboard so that no two rooks
attack one another? The answer is 8! = 40, 320. More generally, we can show that there are
n! ways to place n non-attacking rooks on an n × n chessboard. To see this, first note that
there must be exactly one rook in each of the n rows. The rook in the top row can occupy
any of the n columns. The rook in the next row can occupy any of the n − 1 columns not
attacked by the first rook; then there are n − 2 available columns for the next rook, and
xxii Introduction
so on. By the Product Rule (discussed in Chapter 1), the total number of placements is
therefore n × (n − 1) × (n − 2) × · · · × 1 = n!.
Now consider an (n + 1) × (n + 1) chessboard with a bishop occupying the upper-left
corner square. (A bishop is a chess piece that attacks all squares that can be reached from
its current square by moving in a straight line northeast, northwest, southeast, or southwest
along a diagonal of the chessboard.) Question: How many ways can we place n rooks on
this chessboard so that no two pieces attack one another? An example of such a placement
on a standard chessboard (n + 1 = 8, so n = 7) is shown below:
8
BZ0Z0Z0Z
7
Z0s0Z0Z0
6
0Z0Z0ZrZ
5
ZrZ0Z0Z0
4
0Z0s0Z0Z
3
Z0Z0Z0Zr
2
0Z0Z0s0Z
1
Z0Z0s0Z0
a b c d e f g h
One can check that for every k ≥ 1, the number of ways to place k non-attacking rooks
on the first board is the same as the number of ways to place k non-attacking rooks on the
second board. We say that two boards are rook-equivalent whenever this property holds. It
turns out that an n × n board is always rook-equivalent to a board with successive row
lengths 2n − 1, 2n − 3, . . . , 5, 3, 1. More generally, there is a simple criterion for deciding
whether two boards “of partition shape” are rook-equivalent. We will present this criterion
in §12.3.
Tilings
Now we turn to yet another problem involving chessboards. A domino is a rectangular object
that can cover two horizontally or vertically adjacent squares on a chessboard. A tiling of a
board is a covering of the board with dominos such that each square is covered by exactly
one domino. For example, here is one possible tiling of a standard 8 × 8 chessboard:
Question: Given a board of dimensions m×n, how many ways can we tile it with dominos?
This question may seem unfathomably difficult, so let us first consider the special case where
m = 2. In this case, we are tiling a 2 × n region with dominos. Let fn be the number of
such tilings, for n = 0, 1, 2, . . .. One can see by drawing pictures that
f0 = f1 = 1, f2 = 2, f3 = 3, f4 = 5, f5 = 8, f6 = 13, . . . .
The reader may recognize these numbers as being the start of the famous Fibonacci sequence.
This sequence is defined recursively by letting F0 = F1 = 1 and Fn = Fn−1 + Fn−2 for all
n ≥ 2. Now, a routine counting argument can be used to prove that the tiling numbers fn
satisfy the same recursive formula fn = fn−1 + fn−2 . To see this, note that a 2 × n tiling
either ends with one vertical domino or two stacked horizontal dominos. Removing this part
of the tiling either leaves a 2 × (n − 1) tiling counted by fn−1 or a 2 × (n − 2) tiling counted
by fn−2 . Since the sequences (fn ) and (Fn ) satisfy the same recursion and initial conditions,
we must have fn = Fn for all n.
Now, what about the original tiling problem? Since the area of a tiled board must be
even, there are no tilings unless at least one of the dimensions of the board is even. For
boards satisfying this condition, Kasteleyn, Temperley, and Fisher proved the following
amazing result. The number of domino tilings of an m × n chessboard (with m even) is
xxiv Introduction
exactly equal to s
m/2 n
mn/2
YY jπ kπ
2 cos2 + cos2 .
j=1 k=1
m+1 n+1
The formula is especially striking since the individual factors in the product are transcen-
dental numbers, yet the product of all these factors is a positive integer! When m = n = 8,
the formula reveals that the number of domino tilings of a standard chessboard is 12,988,816.
The proof of the formula involves Pfaffians, which are quantities analogous to determinants
that arise in the study of skew-symmetric matrices. For details, see §12.15 and §12.16.
Notes
Different proofs of the Hook-Length Formula may be found in [37, 40, 55, 96, 103]. Treat-
ments of various aspects of rook theory appear in [36, 48, 49, 69]. The Domino Tiling
Formula was proved by Kasteleyn in [70] and discovered independently by Fisher and Tem-
perley [31].
Part I
Counting
1
Basic Counting
This chapter develops the basic counting techniques that form the foundation of enumerative
combinatorics. We apply these techniques to study fundamental combinatorial objects such
as words, permutations, subsets, functions, and lattice paths. We also give some applications
of combinatorics to probability theory.
1.3. Example: Numbers. How many odd four-digit numbers have no repeated digits and
do not contain the digit 8? For example, 3461 and 1705 are valid numbers, but 3189 and
1021 are not. We can build a number of the required type by choosing its digits one at a
time in the following order. First, choose the rightmost digit. Since we want an odd number,
there are n1 = 5 possibilities for this digit (1 or 3 or 5 or 7 or 9). Second, choose the leftmost
digit. Here there are n2 = 7 possibilities: of the ten digits 0 through 9, we must avoid 0,
8, and the digit chosen in the first stage. Third, choose the second digit from the left. Now
there are n3 = 7 possibilities, since 0 is available, but we must avoid 8 and the two different
digits chosen in the first two stages. Fourth, choose the third digit from the left; there are
3
4 Combinatorics, Second Edition
n4 = 6 possibilities (avoid 8 and the three different digits chosen previously). The object is
now complete, so the Product Rule tells us there are
n1 n2 n3 n4 = 5 · 7 · 7 · 6 = 1470
This Radiator Cover is Built so That Shelves may be Inserted Quickly for Use
as a Cabinet
The object of this game is to pass a marble from one end to the
other of the “roadway,” under the “bridges,” and over the “inclines,”
without dropping it. A stop must be made at each hole. The device is
made as follows: Cut two pieces of wood, ¹⁄₄ by 1³⁄₄ by 12 in., and
join them to form a right angle. Cut pieces of cardboard, 4 each, 1³⁄₄
by 2¹⁄₂ in. wide, with a ³⁄₄-in. hole in the center, for inclines B, and 1³⁄₄
by 3 in., for bridges A; also two pieces 1³⁄₄ in. square for stops C.
Fasten them with tacks as shown. The marble should be large
enough so that it will rest in the holes at B.
Decorative Toys and Boxes
Made at Home
By Bonnie E. Snow
The Outlines for the Horse and Rider and the Parrot may be Made by
Enlarging These Sketches. The Color Scheme Indicated is Suggestive
Only and may be Varied to Suit Individual Taste
FIG. 3
The Tools Required are Found in Most Boys’ Workshops, and a Satisfactory
Saw Table may be Made Easily, as Shown in Detail
An outline drawing of the form to be cut out of the wood must first
be made, to the exact size that the object is to be. There is much
satisfaction if working out the form of the animal or other figure,
especially for the boy or girl who has the time necessary to do good
work. If desired, the figure may be traced from a picture obtained
from a book, magazine, or other source. Cut a piece of wood to the
size required for the design, and place a sheet of carbon paper over
it; or if none is available, rub a sheet of paper with a soft pencil, and
use this as a carbon paper, the side covered with the lead being
placed next to the wood. The carbon paper and the sheet bearing
the design should then be held in place on the wood with thumb
tacks, or pins, and the transfer made with a pencil, as shown in Fig.
4. The design should be placed on the wood so that the weaker
parts, such as the legs of the horse, will extend with the length
instead of across the grain of the wood. In some instances, where a
complicated form is cut out, it is necessary to use wood of several
plies, and where this is available it is worth while to use it for all of
this work. For smaller objects wood ³⁄₁₆ in. thick is suitable, and stock
up to ¹⁄₂ in. in thickness may be used. Whitewood, basswood, poplar
and other soft, smooth-grained woods are suitable.
FIG. 4 FIG. 5
The Design is Traced Carefully onto the Wood and Then Cut Out with the
Coping Saw, on the Saw Table
When the design has been outlined satisfactorily, place the piece
of wood on the saw table with the design on the upper side. Holding
the wood down firmly, as shown in Fig. 5, and sawing in the notch of
the saw table, cut into the edge slowly. Apply light pressure on the
downstroke only, as the upstroke is not intended to cut, and turn the
piece to keep the saw on the line and in the notch. It is important that
the saw be held vertically so that the edge of the cut-out portion will
be square. With proper care and a little practice, the edges may be
cut so smoothly that only a light sandpapering will be required to
produce a smooth edge. When the figure has been cut out, smooth
the edges by trimming them carefully with a sharp knife, if necessary,
and sandpaper them lightly to remove sharp corners. A fine
sandpaper, about No. ¹⁄₂, is suitable for this purpose. The figure is
then ready for painting. The white is put on first and the other colors
applied over it, when dry.
Oil paints may be used, and a varnish or shellac applied over them
to give a high grade of work, but this process requires much care,
considerable skill, and long drying between coats to prevent “runs” in
the colors.
FIG. 6
Water-color paint, which can be purchased in powder form at paint
stores, mixed with water to the consistency of cream is a satisfactory
coloring material, and is easy to apply. Five cents’ worth of each of
the colors used—yellow, red, blue, black, and white—will be
sufficient for several toys. Mix each color in a separate saucer, and
use a small water-color brush to apply the paint. In painting the
horse and rider, the horse is first painted entirely white, and then the
black spots are applied after the color is dry. The rider’s coat is
painted red; the trousers blue; the hat and leggings buff, as indicated
in Fig. 1. Mix a brushful of yellow with a brushful of red, and add
about three brushfuls of white. A half brushful of black may be added
to dull the color, if desired. The flesh tone for the rider’s face is made
by mixing a little red with white. When the colors are dry, all edges
are outlined with a heavy line of black, not less than ¹⁄₈ in. in width.
This outline may be evenly applied with the point of the brush.