354 research outputs found

    Algorithmic aspects of disjunctive domination in graphs

    Full text link
    For a graph G=(V,E)G=(V,E), a set DVD\subseteq V is called a \emph{disjunctive dominating set} of GG if for every vertex vVDv\in V\setminus D, vv is either adjacent to a vertex of DD or has at least two vertices in DD at distance 22 from it. The cardinality of a minimum disjunctive dominating set of GG is called the \emph{disjunctive domination number} of graph GG, and is denoted by γ2d(G)\gamma_{2}^{d}(G). The \textsc{Minimum Disjunctive Domination Problem} (MDDP) is to find a disjunctive dominating set of cardinality γ2d(G)\gamma_{2}^{d}(G). Given a positive integer kk and a graph GG, the \textsc{Disjunctive Domination Decision Problem} (DDDP) is to decide whether GG has a disjunctive dominating set of cardinality at most kk. In this article, we first propose a linear time algorithm for MDDP in proper interval graphs. Next we tighten the NP-completeness of DDDP by showing that it remains NP-complete even in chordal graphs. We also propose a (ln(Δ2+Δ+2)+1)(\ln(\Delta^{2}+\Delta+2)+1)-approximation algorithm for MDDP in general graphs and prove that MDDP can not be approximated within (1ϵ)ln(V)(1-\epsilon) \ln(|V|) for any ϵ>0\epsilon>0 unless NP \subseteq DTIME(VO(loglogV))(|V|^{O(\log \log |V|)}). Finally, we show that MDDP is APX-complete for bipartite graphs with maximum degree 33

    Tracking advanced persistent threats in critical infrastructures through opinion dynamics

    Get PDF
    Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect. This is especially severe in critical infrastructures that are accelerating the integration of IT technologies. It is then essential to further develop effective monitoring and response systems that ensure the continuity of business to face the arising set of cyber-security threats. In this paper, we study the practical applicability of a novel technique based on opinion dynamics, that permits to trace the attack throughout all its stages along the network by correlating different anomalies measured over time, thereby taking the persistence of threats and the criticality of resources into consideration. The resulting information is of essential importance to monitor the overall health of the control system and cor- respondingly deploy accurate response procedures. Advanced Persistent Threat Detection Traceability Opinion Dynamics.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Preventing Advanced Persistent Threats in Complex Control Networks

    Get PDF
    An Advanced Persistent Threat (APT) is an emerging attack against Industrial Control and Automation Systems, that is executed over a long period of time and is difficult to detect. In this context, graph theory can be applied to model the interaction among nodes and the complex attacks affecting them, as well as to design recovery techniques that ensure the survivability of the network. Accordingly, we leverage a decision model to study how a set of hierarchically selected nodes can collaborate to detect an APT within the network, concerning the presence of changes in its topology. Moreover, we implement a response service based on redundant links that dynamically uses a secret sharing scheme and applies a flexible routing protocol depending on the severity of the attack. The ultimate goal is twofold: ensuring the reachability between nodes despite the changes and preventing the path followed by messages from being discovered.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    The Directed Dominating Set Problem: Generalized Leaf Removal and Belief Propagation

    Full text link
    A minimum dominating set for a digraph (directed graph) is a smallest set of vertices such that each vertex either belongs to this set or has at least one parent vertex in this set. We solve this hard combinatorial optimization problem approximately by a local algorithm of generalized leaf removal and by a message-passing algorithm of belief propagation. These algorithms can construct near-optimal dominating sets or even exact minimum dominating sets for random digraphs and also for real-world digraph instances. We further develop a core percolation theory and a replica-symmetric spin glass theory for this problem. Our algorithmic and theoretical results may facilitate applications of dominating sets to various network problems involving directed interactions.Comment: 11 pages, 3 figures in EPS forma

    Therapeutic DNA vaccine induces broad T cell responses in the gut and sustained protection from viral rebound and AIDS in SIV-infected rhesus macaques.

    Get PDF
    Immunotherapies that induce durable immune control of chronic HIV infection may eliminate the need for life-long dependence on drugs. We investigated a DNA vaccine formulated with a novel genetic adjuvant that stimulates immune responses in the blood and gut for the ability to improve therapy in rhesus macaques chronically infected with SIV. Using the SIV-macaque model for AIDS, we show that epidermal co-delivery of plasmids expressing SIV Gag, RT, Nef and Env, and the mucosal adjuvant, heat-labile E. coli enterotoxin (LT), during antiretroviral therapy (ART) induced a substantial 2-4-log fold reduction in mean virus burden in both the gut and blood when compared to unvaccinated controls and provided durable protection from viral rebound and disease progression after the drug was discontinued. This effect was associated with significant increases in IFN-γ T cell responses in both the blood and gut and SIV-specific CD8+ T cells with dual TNF-α and cytolytic effector functions in the blood. Importantly, a broader specificity in the T cell response seen in the gut, but not the blood, significantly correlated with a reduction in virus production in mucosal tissues and a lower virus burden in plasma. We conclude that immunizing with vaccines that induce immune responses in mucosal gut tissue could reduce residual viral reservoirs during drug therapy and improve long-term treatment of HIV infection in humans

    Enhancing security and dependability of industrial networks with opinion dynamics

    Get PDF
    Opinion Dynamics poses a novel technique to accurately locate the patterns of an advanced attack against an industrial infrastructure, compared to traditional intrusion detection systems. This distributed solution provides pro table information to identify the most a ected areas within the network, which can be leveraged to design and deploy tailored response mechanisms that ensure the continuity of the service. In this work, we base on this multi-agent collaborative approach to propose a response technique that permits the secure delivery of messages across the network. For such goal, our contribution is twofold: rstly, we rede ne the existing algorithm to assess not only the compromise of nodes, but also the security and quality of service of communication links; secondly, we develop a routing protocol that prioritizes the secure paths throughout the topology considering the information obtained from the detection system.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tec

    Envelope Determinants of Equine Lentiviral Vaccine Protection

    Get PDF
    Lentiviral envelope (Env) antigenic variation and associated immune evasion present major obstacles to vaccine development. The concept that Env is a critical determinant for vaccine efficacy is well accepted, however defined correlates of protection associated with Env variation have yet to be determined. We reported an attenuated equine infectious anemia virus (EIAV) vaccine study that directly examined the effect of lentiviral Env sequence variation on vaccine efficacy. The study identified a significant, inverse, linear correlation between vaccine efficacy and increasing divergence of the challenge virus Env gp90 protein compared to the vaccine virus gp90. The report demonstrated approximately 100% protection of immunized ponies from disease after challenge by virus with a homologous gp90 (EV0), and roughly 40% protection against challenge by virus (EV13) with a gp90 13% divergent from the vaccine strain. In the current study we examine whether the protection observed when challenging with the EV0 strain could be conferred to animals via chimeric challenge viruses between the EV0 and EV13 strains, allowing for mapping of protection to specific Env sequences. Viruses containing the EV13 proviral backbone and selected domains of the EV0 gp90 were constructed and in vitro and in vivo infectivity examined. Vaccine efficacy studies indicated that homology between the vaccine strain gp90 and the N-terminus of the challenge strain gp90 was capable of inducing immunity that resulted in significantly lower levels of post-challenge virus and significantly delayed the onset of disease. However, a homologous N-terminal region alone inserted in the EV13 backbone could not impart the 100% protection observed with the EV0 strain. Data presented here denote the complicated and potentially contradictory relationship between in vitro virulence and in vivo pathogenicity. The study highlights the importance of structural conformation for immunogens and emphasizes the need for antibody binding, not neutralizing, assays that correlate with vaccine protection. © 2013 Craigo et al

    Hardness and approximation for the geodetic set problem in some graph classes

    Full text link
    In this paper, we study the computational complexity of finding the \emph{geodetic number} of graphs. A set of vertices SS of a graph GG is a \emph{geodetic set} if any vertex of GG lies in some shortest path between some pair of vertices from SS. The \textsc{Minimum Geodetic Set (MGS)} problem is to find a geodetic set with minimum cardinality. In this paper, we prove that solving the \textsc{MGS} problem is NP-hard on planar graphs with a maximum degree six and line graphs. We also show that unless P=NPP=NP, there is no polynomial time algorithm to solve the \textsc{MGS} problem with sublogarithmic approximation factor (in terms of the number of vertices) even on graphs with diameter 22. On the positive side, we give an O(n3logn)O\left(\sqrt[3]{n}\log n\right)-approximation algorithm for the \textsc{MGS} problem on general graphs of order nn. We also give a 33-approximation algorithm for the \textsc{MGS} problem on the family of solid grid graphs which is a subclass of planar graphs

    Inertial sensor real-time feedback enhances the learning of cervical spine manipulation: a prospective study.

    Get PDF
    BACKGROUND: Cervical Spinal Manipulation (CSM) is considered a high-level skill of the central nervous system because it requires bimanual coordinated rhythmical movements therefore necessitating training to achieve proficiency. The objective of the present study was to investigate the effect of real-time feedback on the performance of CSM. METHODS: Six postgraduate physiotherapy students attending a training workshop on Cervical Spine Manipulation Technique (CSMT) using inertial sensor derived real-time feedback participated in this study. The key variables were pre-manipulative position, angular displacement of the thrust and angular velocity of the thrust. Differences between variables before and after training were investigated using t-tests. RESULTS: There were no significant differences after training for the pre-manipulative position (rotation p = 0.549; side bending p = 0.312) or for thrust displacement (rotation p = 0.247; side bending p = 0.314). Thrust angular velocity demonstrated a significant difference following training for rotation (pre-training mean (sd) 48.9°/s (35.1); post-training mean (sd) 96.9°/s (53.9); p = 0.027) but not for side bending (p = 0.521). CONCLUSION: Real-time feedback using an inertial sensor may be valuable in the development of specific manipulative skill. Future studies investigating manipulation could consider a randomized controlled trial using inertial sensor real time feedback compared to traditional training
    corecore