3,701 research outputs found

    ( k , +)-distance-hereditary graphs

    Get PDF
    AbstractIn this work we introduce, characterize, and provide algorithmic results for (k,+)-distance-hereditary graphs, kā©¾0. These graphs can be used to model interconnection networks with desirable connectivity properties; a network modeled as a (k,+)-distance-hereditary graph can be characterized as follows: if some nodes have failed, as long as two nodes remain connected, the distance between these nodes in the faulty graph is bounded by the distance in the non-faulty graph plus an integer constant k. The class of all these graphs is denoted by DH(k,+). By varying the parameter k, classes DH(k,+) include all graphs and form a hierarchy that represents a parametric extension of the well-known class of distance-hereditary graphs

    Mutual-visibility in distance-hereditary graphs: a linear-time algorithm

    Full text link
    The concept of mutual-visibility in graphs has been recently introduced. If XX is a subset of vertices of a graph GG, then vertices uu and vv are XX-visible if there exists a shortest u,vu,v-path PP such that V(P)āˆ©XāŠ†{u,v}V(P)\cap X \subseteq \{u, v\}. If every two vertices from XX are XX-visible, then XX is a mutual-visibility set. The mutual-visibility number of GG is the cardinality of a largest mutual-visibility set of GG. It is known that computing the mutual-visibility number of a graph is NP-complete, whereas it has been shown that there are exact formulas for special graph classes like paths, cycles, blocks, cographs, and grids. In this paper, we study the mutual-visibility in distance-hereditary graphs and show that the mutual-visibility number can be computed in linear time for this class.Comment: 16 pages, 5 figures, a preliminary version will appear on the proc. of the XII Latin and American Algorithms, Graphs and Optimization Symposium, {LAGOS} 2023, Huatulco, Mexico, September 18-22, 2023. Procedia Computer Science, Elsevie

    Networks with small stretch number

    Get PDF
    Abstract In a previous work, the authors introduced the class of graphs with bounded induced distance of order k (BID(k) for short), to model non-reliable interconnection networks. A network modeled as a graph in BID(k) can be characterized as follows: if some nodes have failed, as long as two nodes remain connected, the distance between these nodes in the faulty graph is at most k times the distance in the non-faulty graph. The smallest k such that GāˆˆBID(k) is called stretch number of G. We show an odd characteristic of the stretch numbers: every rational number greater or equal 2 is a stretch number, but only discrete values are admissible for smaller stretch numbers. Moreover, we give a new characterization of classes BID(2āˆ’1/i), iā©¾1, based on forbidden induced subgraphs. By using this characterization, we provide a polynomial time recognition algorithm for graphs belonging to these classes, while the general recognition problem is Co-NP-complete

    A Systematic Approach for Evaluating Satellite Communications Systems

    Get PDF
    The aerospace environment imposes straight opera- tive conditions so every electronic system usually needs to be validated for these. The same way, communica- tion systems need to be evaluated before their intro- duction in aerospace applications. In the paper we present a new methodology for the evaluation of com- munication systems in space applications. The meth- odology aims, by abstraction, at identifying all the critical aspects for the evaluation and at defining a standard and reusable framework in order to be appli- cable to any Communication Systems. The methodol- ogy has been applied for the evaluation of three Data Bus for satellite communications: 1553, 1-Wire and Profibus DP RS 485 based systems have been analyzed and evaluate

    Dynamic Algorithms for Recoverable Robustness Problems

    Get PDF
    Recently, the recoverable robustness model has been introduced in the optimization area. This model allows to consider disruptions (input data changes) in a unified way, that is, during both the strategic planning phase and the operational phase. Although the model represents a significant improvement, it has the following drawback: we are typically not facing only one disruption, but many of them might appear one after another. In this case, the solutions provided in the context of the recoverable robustness are not satisfying. In this paper we extend the concept of recoverable robustness to deal not only with one single recovery step, but with arbitrarily many recovery steps. To this aim, we introduce the notion of dynamic recoverable robustness problems. We apply the new model in the context of timetabling and delay management problems. We are interested in finding efficient dynamic robust algorithms for solving the timetabling problem and in evaluating the price of robustness of the proposed solutions

    An area-efficient 2-D convolution implementation on FPGA for space applications

    Get PDF
    The 2-D Convolution is an algorithm widely used in image and video processing. Although its computation is simple, its implementation requires a high computational power and an intensive use of memory. Field Programmable Gate Arrays (FPGA) architectures were proposed to accelerate calculations of 2-D Convolution and the use of buffers implemented on FPGAs are used to avoid direct memory access. In this paper we present an implementation of the 2-D Convolution algorithm on a FPGA architecture designed to support this operation in space applications. This proposed solution dramatically decreases the area needed keeping good performance, making it appropriate for embedded systems in critical space application

    IGHV mutational status of nodal marginal zone lymphoma by NGS reveals distinct pathogenic pathways with different prognostic implications

    Get PDF
    The precise B cell of origin and molecular pathogenesis of nodal marginal zone lymphoma (NMZL) remain poorly defined. To date, due to the rarity of NMZL, the vast majority of already-published studies have been conducted on a limited number of samples and the technical approach to analyze the immunoglobulin genes was of amplifying rearranged variable region genes with the classical direct sequencing of the PCR products followed by cloning. Here, we studied the B cell Ig heavy-chain repertoires by next-generation sequencing (NGS) in 30 NMZL cases. Most of the cases were mutated (20/28; 71.5%) with homologies to the respective germ line genes ranging from 85 to 97, 83%, whereas 8/28 (28.5%) were unmutated. In addition, our results show that NMZL cases have a biased usage of specific immunoglobulin heavy-chain variable (IGHV) region genes. Moreover, we documented intraclonal diversity in all (100%) of the mutated cases and ongoing somatic hypermutations (SHM) have been confirmed by hundreds of reads. We analyzed the mutational pattern to detect and quantify antigen selection pressure and we found a positive selection in 4 cases, whereas in the remaining cases there was an unspecific stimulation. Finally, the disease-specific survival and the progression-free survival were significantly different between cases with mutated and unmutated IGHV genes, pointing out mutational status as a possible new biomarker in NMZL

    Solving the Pattern Formation by Mobile Robots With Chirality

    Get PDF
    Among fundamental problems in the context of distributed computing by mobile robots, the Pattern Formation (PF) is certainly the most representative. Given a multi-set FF of points in the Euclidean plane and a set RR of robots such that āˆ£Rāˆ£=āˆ£Fāˆ£|R|=|F| , PF asks for a distributed algorithm that moves robots so as to reach a configuration similar to FF . Similarity means that robots must be disposed as FF regardless of translations, rotations, reflections, uniform scalings. In the literature, PF has been approached by assuming asynchronous robots endowed with chirality, i.e. a common handedness. The proposed algorithm along with its correctness proof turned out to be flawed. In this paper, we propose a new algorithm on the basis of a recent methodology studied for approaching problems in the context of distributed computing by mobile robots. According to this methodology, the correctness proof results to be well-structured and less prone to faulty arguments. We then ultimately characterize PF when chirality is assumed
    • ā€¦
    corecore