SlideShare una empresa de Scribd logo
1 de 17
Pigeon-hole Principle

               If n>m
            pigeons are put
                 into m
            pigeonholes, th
              ere's a hole
            with more than
              one pigeon.
Alternative Forms
• if n objects are to be allocated to m
  containers, then at least one container
  must hold at least ceil(n/m) objects.
• For any finite set A , there does not exist
  a bijection between A and a proper
  subset of A .
• Let |A| denote the number of elements in
  a finite set A. For two finite sets A and
  B, there exists a 1-1 correspondence
  f: A->B iff |A| = |B|.
History
      The first statement of the
       principle is believed to
       have been made by
       Dirichlet in 1834 under the
       name Schubfachprinzip
       ("drawer principle" or
       "shelf principle")
      Also known as Dirichlet's
       box (or drawer) principle
General Problems
 There 750 students in the a batch at
 UOM. Prove that at least 3 of them have
 their birthdays on the same date ?
   ○ 366 * 2= 732 < 750
   ○ Thus at least 3 students have the birthday
    on the same date.
Problems on relations
   There are 50 people in a room. some of them are
    friends. If A is a friend of B then B is also a friend of
    A. prove that there are two persons in the room
    who have a same number of friends.
   In league T20 tournament of 16 cricket teams,
    every two teams have to meet in a game. prove
    that at any time there are two teams which played
    equal number of matches.
Solution
   Case 1                             Case 2
     There exists a person              There does not exists
      with 49 friends (he is a            a person with 49
      friend of all other people)         friends
     Then there cannot be a             The no of friends vary
      person with 0 friends               between 0 – 48 .
     The no of friends vary             There are 50 people
      between 1 – 49 .                    and only 49 values.
     There are 50 people and
      only 49 values.
Problems On Divisibility
   Prove that there
    exists a multiple of
    2009 whose decimal
    expansion contains
    only digits 1 and 0.
Answer
   Consider 2010 numbers
          - 1,11,111,1111, … ,1111…111.

 Each of these numbers produce one of 2009
  remainders
        - 0,1,2,3 ,…,2008
 We have 2010 numbers and 2009 remainders
 By pigeon-hole principle some two numbers have the
  same remainder .Let those 2 numbers be A and B
  (A>B)
 Consider A-B. which is a multiple of 2009.
        - In the form of 11…1100…000
Problems On Divisibility
   Prove that of any 52 natural numbers one can find
    two numbers n and m such that either their sum m+n
    or difference m-n is divisible by 100.

     Consider sets {0},{1,99},{2,98}….{49,51},{50}
     There are 51 sets
     By pigeon hole principle at least 1 set should have 2
      members
     If we consider any set above if they have 2 members in the
      set, m+n or m-n is divisible by 100
Problems on geometry
   51 points are placed, in a random way, into a
    square of side 1 unit. Can we prove that 3 of these
    points can be covered by a circle of radius 1/7 units
    ?
Answer
    To prove the result, we may divide
    the square into 25 equal smaller
    squares of side 1/5 units each.
    Then by the Pigeonhole Principle, at
    least one of these small squares
    should contain at least 3 points.
    Otherwise, each of the small
    squares will contain 2 or less points
    which will then mean that the total
    number of points will be less than
    50 , which is a contradiction to the
    fact that we have 51 points in the
    first case !
Answer - continue
   Now the circle
    circumvented around the
    particular square with the
    three points inside should
    have
   Radius=Sqrt(1/100+1/100
    )
           =Sqrt(1/50)
           <Sqrt(1/49)=1/7
                                 1/10
Applications
   Lossless data compression cannot guarantee
    compression for all data input files.
   The pigeonhole principle often arises in
    computer science. For example, collisions are
    inevitable in a hash table because the number
    of possible keys exceeds the number of
    indices in the array
   In probability theory, the birthday problem, or
    birthday paradox pertains to the probability
    that in a set of randomly chosen people some
    pair of them will have the same birthday
Applications
   The proof of Chinese Remainder Theorem
    is based on pigeon-hole principle
        Let m and n be relatively prime positive
        Integers. Then the system:
              x = a (mod m)
              x = b (mod n)
                    has a solution.
References
   http://en.wikipedia.org/wiki/Pigeonhole_principle
   http://en.wikipedia.org/wiki/Johann_Peter_Gustav_
    Lejeune_Dirichlet
   http://en.wikipedia.org/wiki/Lossless_data_compre
    ssion#Limitations
   Article on "What is Pigeonhole Principle?" by
    Alexandre V. Borovik, Elena V. Bessonova.
   Article on "Applications of the Pigeonhole
    Principle" by Edwin Kwek Swee Hee ,Huang
    Meiizhuo ,Koh Chan Swee ,Heng Wee Kuan
    , River Valley High School
Thank You

Más contenido relacionado

La actualidad más candente

Gaussian Elimination Method
Gaussian Elimination MethodGaussian Elimination Method
Gaussian Elimination MethodAndi Firdaus
 
Chapter 2: Relations
Chapter 2: RelationsChapter 2: Relations
Chapter 2: Relationsnszakir
 
vector space and subspace
vector space and subspacevector space and subspace
vector space and subspace2461998
 
Red black tree
Red black treeRed black tree
Red black treeRajendran
 
Principle of mathematical induction
Principle of mathematical inductionPrinciple of mathematical induction
Principle of mathematical inductionKriti Varshney
 
Theory of Computation
Theory of ComputationTheory of Computation
Theory of ComputationShiraz316
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceasimnawaz54
 
Number theory
Number theory Number theory
Number theory tes31
 
Eigen value and eigen vector
Eigen value and eigen vectorEigen value and eigen vector
Eigen value and eigen vectorRutvij Patel
 
introduction to division algorithm
introduction to division algorithmintroduction to division algorithm
introduction to division algorithmNikhil Sairam
 
AI_Session 7 Greedy Best first search algorithm.pptx
AI_Session 7 Greedy Best first search algorithm.pptxAI_Session 7 Greedy Best first search algorithm.pptx
AI_Session 7 Greedy Best first search algorithm.pptxAsst.prof M.Gokilavani
 
Knuth morris pratt string matching algo
Knuth morris pratt string matching algoKnuth morris pratt string matching algo
Knuth morris pratt string matching algosabiya sabiya
 

La actualidad más candente (20)

Gaussian Elimination Method
Gaussian Elimination MethodGaussian Elimination Method
Gaussian Elimination Method
 
Chapter 2: Relations
Chapter 2: RelationsChapter 2: Relations
Chapter 2: Relations
 
vector space and subspace
vector space and subspacevector space and subspace
vector space and subspace
 
Red black tree
Red black treeRed black tree
Red black tree
 
Graph theory presentation
Graph theory presentationGraph theory presentation
Graph theory presentation
 
Principle of mathematical induction
Principle of mathematical inductionPrinciple of mathematical induction
Principle of mathematical induction
 
Number Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number TheoryNumber Theory - Lesson 1 - Introduction to Number Theory
Number Theory - Lesson 1 - Introduction to Number Theory
 
Theory of Computation
Theory of ComputationTheory of Computation
Theory of Computation
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inference
 
Number theory
Number theory Number theory
Number theory
 
Eigen value and eigen vector
Eigen value and eigen vectorEigen value and eigen vector
Eigen value and eigen vector
 
N queens using backtracking
N queens using backtrackingN queens using backtracking
N queens using backtracking
 
introduction to division algorithm
introduction to division algorithmintroduction to division algorithm
introduction to division algorithm
 
Graph Theory: Trees
Graph Theory: TreesGraph Theory: Trees
Graph Theory: Trees
 
Combinatorics
CombinatoricsCombinatorics
Combinatorics
 
lattice
 lattice lattice
lattice
 
Discrete Math Lecture 03: Methods of Proof
Discrete Math Lecture 03: Methods of ProofDiscrete Math Lecture 03: Methods of Proof
Discrete Math Lecture 03: Methods of Proof
 
Minimum spanning tree
Minimum spanning treeMinimum spanning tree
Minimum spanning tree
 
AI_Session 7 Greedy Best first search algorithm.pptx
AI_Session 7 Greedy Best first search algorithm.pptxAI_Session 7 Greedy Best first search algorithm.pptx
AI_Session 7 Greedy Best first search algorithm.pptx
 
Knuth morris pratt string matching algo
Knuth morris pratt string matching algoKnuth morris pratt string matching algo
Knuth morris pratt string matching algo
 

Similar a Pigeon hole principle

20-pigeonhole-principle.ppt
20-pigeonhole-principle.ppt20-pigeonhole-principle.ppt
20-pigeonhole-principle.pptssuser71ac73
 
20 pigeonhole-principle
20 pigeonhole-principle20 pigeonhole-principle
20 pigeonhole-principleananyapandey32
 
Word problems involving equations in one variable Grade 7
Word problems involving equations in one variable Grade 7Word problems involving equations in one variable Grade 7
Word problems involving equations in one variable Grade 7melvinverdadero
 
X12bPigeonHole.ppt
X12bPigeonHole.pptX12bPigeonHole.ppt
X12bPigeonHole.pptVishva4
 
Dirichlet processes and Applications
Dirichlet processes and ApplicationsDirichlet processes and Applications
Dirichlet processes and ApplicationsSaurav Jha
 
Keynote, Lambdaconf 2016 - Equality is Hard
Keynote, Lambdaconf 2016 - Equality is HardKeynote, Lambdaconf 2016 - Equality is Hard
Keynote, Lambdaconf 2016 - Equality is HardPaul Phillips
 
Goldbach Conjecture
Goldbach ConjectureGoldbach Conjecture
Goldbach ConjectureAnil1091
 
Predicate logic_2(Artificial Intelligence)
Predicate logic_2(Artificial Intelligence)Predicate logic_2(Artificial Intelligence)
Predicate logic_2(Artificial Intelligence)SHUBHAM KUMAR GUPTA
 
Fuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionFuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionNagasuri Bala Venkateswarlu
 
Mathematical Statistics Homework Help
Mathematical Statistics Homework HelpMathematical Statistics Homework Help
Mathematical Statistics Homework HelpExcel Homework Help
 

Similar a Pigeon hole principle (20)

Pigeon hole principle
Pigeon hole principlePigeon hole principle
Pigeon hole principle
 
Pigeon hole principle
Pigeon hole principlePigeon hole principle
Pigeon hole principle
 
20-pigeonhole-principle.ppt
20-pigeonhole-principle.ppt20-pigeonhole-principle.ppt
20-pigeonhole-principle.ppt
 
20 pigeonhole-principle
20 pigeonhole-principle20 pigeonhole-principle
20 pigeonhole-principle
 
L07 msr
L07 msrL07 msr
L07 msr
 
Word problems involving equations in one variable Grade 7
Word problems involving equations in one variable Grade 7Word problems involving equations in one variable Grade 7
Word problems involving equations in one variable Grade 7
 
X12bPigeonHole.ppt
X12bPigeonHole.pptX12bPigeonHole.ppt
X12bPigeonHole.ppt
 
Dirichlet processes and Applications
Dirichlet processes and ApplicationsDirichlet processes and Applications
Dirichlet processes and Applications
 
Group7 (1)
Group7 (1)Group7 (1)
Group7 (1)
 
Linear equations
Linear equationsLinear equations
Linear equations
 
Keynote, Lambdaconf 2016 - Equality is Hard
Keynote, Lambdaconf 2016 - Equality is HardKeynote, Lambdaconf 2016 - Equality is Hard
Keynote, Lambdaconf 2016 - Equality is Hard
 
Report in math 830
Report in math 830Report in math 830
Report in math 830
 
State2009
State2009State2009
State2009
 
Goldbach Conjecture
Goldbach ConjectureGoldbach Conjecture
Goldbach Conjecture
 
Logic
LogicLogic
Logic
 
Schl2008
Schl2008Schl2008
Schl2008
 
Predicate logic_2(Artificial Intelligence)
Predicate logic_2(Artificial Intelligence)Predicate logic_2(Artificial Intelligence)
Predicate logic_2(Artificial Intelligence)
 
National2009
National2009National2009
National2009
 
Fuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionFuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introduction
 
Mathematical Statistics Homework Help
Mathematical Statistics Homework HelpMathematical Statistics Homework Help
Mathematical Statistics Homework Help
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Pigeon hole principle

  • 1.
  • 2. Pigeon-hole Principle  If n>m pigeons are put into m pigeonholes, th ere's a hole with more than one pigeon.
  • 3. Alternative Forms • if n objects are to be allocated to m containers, then at least one container must hold at least ceil(n/m) objects. • For any finite set A , there does not exist a bijection between A and a proper subset of A . • Let |A| denote the number of elements in a finite set A. For two finite sets A and B, there exists a 1-1 correspondence f: A->B iff |A| = |B|.
  • 4. History  The first statement of the principle is believed to have been made by Dirichlet in 1834 under the name Schubfachprinzip ("drawer principle" or "shelf principle")  Also known as Dirichlet's box (or drawer) principle
  • 5. General Problems  There 750 students in the a batch at UOM. Prove that at least 3 of them have their birthdays on the same date ? ○ 366 * 2= 732 < 750 ○ Thus at least 3 students have the birthday on the same date.
  • 6. Problems on relations  There are 50 people in a room. some of them are friends. If A is a friend of B then B is also a friend of A. prove that there are two persons in the room who have a same number of friends.  In league T20 tournament of 16 cricket teams, every two teams have to meet in a game. prove that at any time there are two teams which played equal number of matches.
  • 7. Solution  Case 1  Case 2  There exists a person  There does not exists with 49 friends (he is a a person with 49 friend of all other people) friends  Then there cannot be a  The no of friends vary person with 0 friends between 0 – 48 .  The no of friends vary  There are 50 people between 1 – 49 . and only 49 values.  There are 50 people and only 49 values.
  • 8. Problems On Divisibility  Prove that there exists a multiple of 2009 whose decimal expansion contains only digits 1 and 0.
  • 9. Answer  Consider 2010 numbers - 1,11,111,1111, … ,1111…111.  Each of these numbers produce one of 2009 remainders - 0,1,2,3 ,…,2008  We have 2010 numbers and 2009 remainders  By pigeon-hole principle some two numbers have the same remainder .Let those 2 numbers be A and B (A>B)  Consider A-B. which is a multiple of 2009. - In the form of 11…1100…000
  • 10. Problems On Divisibility  Prove that of any 52 natural numbers one can find two numbers n and m such that either their sum m+n or difference m-n is divisible by 100.  Consider sets {0},{1,99},{2,98}….{49,51},{50}  There are 51 sets  By pigeon hole principle at least 1 set should have 2 members  If we consider any set above if they have 2 members in the set, m+n or m-n is divisible by 100
  • 11. Problems on geometry  51 points are placed, in a random way, into a square of side 1 unit. Can we prove that 3 of these points can be covered by a circle of radius 1/7 units ?
  • 12. Answer  To prove the result, we may divide the square into 25 equal smaller squares of side 1/5 units each. Then by the Pigeonhole Principle, at least one of these small squares should contain at least 3 points. Otherwise, each of the small squares will contain 2 or less points which will then mean that the total number of points will be less than 50 , which is a contradiction to the fact that we have 51 points in the first case !
  • 13. Answer - continue  Now the circle circumvented around the particular square with the three points inside should have  Radius=Sqrt(1/100+1/100 ) =Sqrt(1/50) <Sqrt(1/49)=1/7 1/10
  • 14. Applications  Lossless data compression cannot guarantee compression for all data input files.  The pigeonhole principle often arises in computer science. For example, collisions are inevitable in a hash table because the number of possible keys exceeds the number of indices in the array  In probability theory, the birthday problem, or birthday paradox pertains to the probability that in a set of randomly chosen people some pair of them will have the same birthday
  • 15. Applications  The proof of Chinese Remainder Theorem is based on pigeon-hole principle Let m and n be relatively prime positive Integers. Then the system: x = a (mod m) x = b (mod n) has a solution.
  • 16. References  http://en.wikipedia.org/wiki/Pigeonhole_principle  http://en.wikipedia.org/wiki/Johann_Peter_Gustav_ Lejeune_Dirichlet  http://en.wikipedia.org/wiki/Lossless_data_compre ssion#Limitations  Article on "What is Pigeonhole Principle?" by Alexandre V. Borovik, Elena V. Bessonova.  Article on "Applications of the Pigeonhole Principle" by Edwin Kwek Swee Hee ,Huang Meiizhuo ,Koh Chan Swee ,Heng Wee Kuan , River Valley High School