OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
|
|
|
- Jared Cannon
- 5 years ago
- Views:
From this document you will learn the answers to the following questions:
What part of the network is used to update data?
What type of solution will specify the network topology of minimum cost?
Transcription
1 OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA USA Faculty of Engineering, University of Porto, Porto, PORTUGAL Instituto Superior Técnico, University of Lisbon, Lisbon, PORTUGAL ABSTRACT The paper introduces a method by which to design the topology of a distributed sensor network that is minimal with respect to a communication cost function. In the scenario considered, sensor nodes communicate with each other within a graph structure to update their data according to linear dynamics using neighbor node data. A subset of sensors can also report their state to a central location. One physical interpretation of this situation would be a set of spatially distributed wireless sensors which can communicate with other sensors within range to update data and can possibly connect to a network backbone. The costs would then be related to transmission energy. The objective is to recover the vector of initial sensor measurements from the backbone outputs over time, which requires that the dynamics of the overall networked system be observable. The topology of the network is then determined by the nonzero elements of the optimal observable dynamics. The following text contributes an efficient algorithm for designing the optimal observable dynamics and the network topology for a given set of sensors and cost function, providing proof of correctness and example implementation. Index Terms distributed sensor network, structural observability, optimal design, field reconstruction, output cacti 1. INTRODUCTION Numerous applications including field surveillance, environmental study, and geo-scientific exploration [1] employ distributed sensor networks for wide area monitoring, leading to interesting topology and network configuration design problems that involve power, bandwidth, and range constraints [2]. These networks typically consist of a set of sensor nodes, each of which has a microprocessor that allows simple information processing and a transceiver that enables short distance communication. This paper examines situations in which some sensors can also potentially be equipped with long range transmission capability in order to communicate with a central reporting authority over the sensor network. Consider sensor nodes communicating with each other within a graph structure to update their data according to linear dynamics using neighbor node data. Each sensor maintains a state x i n, where n is the iteration index and the initial The work of Pequito is partially supported by grant SFRH/BD/33779/2009, from Fundação para a Ciência e Tecnologia and by the CMU-Portugal (ICTI program). The work of Kruzick is supported by the NDSEG fellowship program. spequito, skruzick, soummyak}@andrew.cmu.edu, [email protected] and [email protected]. Fig. 1. The figure depicts a set of sensors deployed over a geographic area in which each sensor is equipped with a short range communication device (operating within a radius R C ) for local sensor-to-sensor communication. Some of the sensors are also equipped with long range communication devices to report their respective states to a central authority. state x i 0 corresponds to the field measurement collected by the ith sensor. A subset of sensors can also report their state to a central location or backbone node. Denote by x n the vector of sensor states and y n the reported outputs at iteration n. Thus, network communication is described by a dynamic system of the form x n+1 = Ax n, (1) y n = Cx n, (2) where A describes the state update dynamics, which respects the communication graph structure, and C encodes the backbone reporting infrastructure. The network objective is to determine the vector of initial sensor states x 0, the field measurements, at the central reporting authority based on the outputs (y 0,, y N 1 ) obtained over time, where N is the number of sensors in the network. In order for this to be achieved, observable dynamics (A, C) from (1)-(2) are desired. Such a network is said to be an observable distributed sensor network. The notion of an observable distributed sensor network has already been introduced in [3], where necessary conditions to ensure observability of the network are given in terms
2 of graph partitions, though without providing or justifying the complexity of verifying such conditions. In contrast, this paper investigates the problem of optimal network topology design for attaining observable dynamics that incur minimum cost with respect to a generic communication cost function precisely defined in section 3. Also note that in contrast to the typical problems in consensus or gossip algorithms literature where the goal is to asymptotically recover the average or a specific linear function of the initial sensor states, as in [4], the observable dynamics discussed can be used to recover the entire collection of the initial sensor states in finite time. The paper proposes an algorithm to efficiently compute the optimal observable dynamic structure, proving the correctness of the algorithm and demonstrating the algorithm in implementation. Section 2 introduces some preliminary concepts and terminology. Section 3 presents the problem formulation in greater detail, and section 4 follows with the proof of the main results. Section 5 illustrates concepts with simulation results. Finally, section 6 concludes the paper. 2. BACKGROUND CONCEPTS This section introduces elementary concepts in graph theory, and structural systems [5]. The paper requires the following standard graph theoretic terminology [6]. A graph G is a pair (V, E) in which V denotes a set of vertices and E represents a set of edges, such that the unordered pair (v i, v j ) of vertices v i, v j V represents an undirected link between vertex v i and vertex v j. Any graph G s (V s, E s ) with V s V and E s E is called a subgraph of G(V, E). If V s = V, G s is said to span G. A sequence of edges (v 1, v 2 ), (v 2, v 3 ),, (v k 1, v k )}, in which all the vertices are distinct, is called an elementary path from v 1 to v k. When v k coincides with v 1, the sequence is called a cycle. A graph is said to be connected if there exists an elementary path between any two vertices. A tree is a connected graph with no cycles. Finally, a weight graph G w is a triple (V, E, w) consisting of an undirected graph (V, E) and an edge weight function w : E R that assigns a weight w(e) to an edge e E. For brevity, the notation (V w, E w ) will be used often to denote the weighted graph (V, E, w). Directed graphs, also known as digraphs, may be defined in a similar fashion. A directed graph D is a pair (V, E) in which V denotes the set of vertices and E represents the set of directed edges, such that the ordered pair (v i, v j ) E of vertices v i, v j V represents a directed link from v i to v j Minimum Weight Spanning Tree Key to the algorithm presented in section 4 is the concept of a minimum weight spanning tree. Let a connected, undirected, weight graph G w = (V w, E w ) be given, where the weight function w : E w R assigns a weight w(e) to each edge e E. The minimum weight spanning tree problem consists of finding a spanning connected subgraph of G w with V 1 edges, a tree T = (V w, E T ), such that the following function is minimized: w(t ) = w(e). e E T The solution to the minimum weight spanning tree problem can be found by resorting to any of several efficient algorithms, such as those of Kruskal, Prim, or Boruvka [6]. Prim s algorithm is used in this paper, and it has complexity O( V w 2 ) or O( E w log( V w )) depending on the choice of the implementation Structural Dynamic Systems Consider the system in (1)-(2) and denote the state variables and output variables by X = x 1,, x N } and Y = y 1,, y M }, corresponding to the set of state vertices and output vertices, respectively. Let E X,X = (x i, x j ) [A] ji 0} and E X,Y = (x i, y j ) [C] ji 0} and define the directed graph D(A, C) = (X Y, E X,X E X,Y ). Given a digraph D(A, C), define the following special subgraphs: State Stem - An elementary path exclusively composed of state vertices, or a single state vertex. Output Stem - An elementary path composed of a state stem with an output vertex (the output stem tip) linked from the tip of the state stem. State Cactus - Defined recursively as follows: A state stem is a state cactus. A state cactus connected to a cycle from any point other than the tip is also a state cactus. Output Cactus - Defined recursively as follows: An output stem with at least one state vertex is an output cactus. An output cactus connected from a cycle to any point other than the root of the state stem is also an output cactus. The root and the tip of the output stem are also the root and tip of the associated cactus. Output Cactus Patch - A disjoint union of output cacti. Note that the definition allows an output cactus to have an output vertex linked from several state vertices. That is, the output vertex must connect from the tip of a state stem but could be linked from one or more other states in state cycles. Furthermore, consider the following definition and result: Definition 1 (Structural Observability) A system defined by (1)-(2) is said to be structurally observable if there are observable matrices (A 1, C 1 ) with identical zero-nonzero sparsity structure as the matrices (A, C). A pair (A, C) is said to be structurally observable if there exists a pair (A, C ) with the same structure as (A, C), i.e., same locations of zeros and non-zeros, such that (A, C ) is observable. By density arguments, it may be shown that if a pair (A, C) is structurally observable then, in the Lebesgue measure theoretic sense, almost all pairs with the same structure as (A, C) are observable. In essence, structural observability is a property of the structure of the pair (A, C) and not the specific numerical values. Theorem 1 (Structural Observability and Cacti) For a linear time invariant system described by (1)-(2), the following statements are equivalent [5]: (i) The corresponding structured linear system (A, C) is structurally observable. (ii) The digraph D(A, C) is spanned by an output cactus patch.
3 3. PROBLEM FORMULATION Consider a set V of N indexed sensor nodes with distance D ij between each pair of sensor nodes v i, v j V. Suppose that each node v i V can communicate with any node v j V of distance less than a maximum communication radius R C with transmission energy related cost (E CC ) 2 ij = αd2 ij proportional to the square of communication distance 1. That is, αd 2 (E CC ) ij = ij D ij R C. (3) D ij > R C Let G(V, E) be the resulting communication graph where E = (v i, v j ) V 2 (E CC ) ij < } (4) and (E CC ) ij is the weight of edge (v i, v j ). Note that the graph G is not necessarily connected, and allows self loops of weight 0. Sensors within range are allowed to communicate with each other and update their data as a linear function of data from their neighbors defined by a matrix A R N N. If the coefficient corresponding to a neighbor is 0, then no communication need take place, incurring no cost. It is clear that for A to be a feasible matrix, it must satisfy A ij = 0 if (v i, v j ) / E. Let x 0 be the vector of sensor readings and x n be the vector of data at the nodes at update time step n. Thus, the node update dynamics are described by (1). Furthermore, suppose that a subset U V of the nodes can be connected to the sensor network backbone node b with cost given by (E BC ) ii = βdbi, 2 (5) for node v i U where D bi is the distance between v i and b. For notational convenience, let (E BC ) ij = when i j or when v i / U. Define an output matrix C R N N satisfying C ij 0 only if i = j and v i U. Let y n be the output vector of reported states at time n. Then the backbone reporting function is described by (2). Thus, total cost associated with a pair (A, C) is given by where f(a, C) = 1 T (Ã E CC)1 + 1 T ( C E BC )1 (6) Ã ij = 0 Aij = A ij 0, Cij = 0 Cij = 1 C ij 0, and is the Hadamard (entrywise) product of matrices. Now, consider the problem of choosing a node update and backbone reporting dynamics (A, C) incurring minimum cost as calculated in (6) that is feasible with respect to the communication graph and such that the initial sensor measurement x 0 can be inferred from N backbone output readings (y 0,..., y N 1 ). This means the constraint that (A, C) is observable must be imposed. Note that the cost does not depend on the values of the dynamic matrices (A, C) but only on their sparsity structure. From Theorem 1 it is known that if (Ã, C) is structurally observable, then there exist matrices (A, C) with the same sparsity structure as (Ã, C) that are observable. Thus, replacement of the constraint that (A, C) must be observable with 1 Note that, the transmission energy related cost structure is used for illustration purposes only. Our framework allows for more general cost structures as noted in A.1. the constraint that (Ã, C) be structurally observable allows the minimization to be performed without considering suitable values for the dynamics, which are guaranteed to exist (see Definition 1) and can be determined later. Hence, the optimal solution will specify the network topology of minimum cost such that observable dynamics exist. For this paper, the problem is solved for arbitrary communication cost functions under the following mild assumptions: A.1 (Symmetric Communication Cost): The sensor to sensor communication cost matrix E CC is symmetric but otherwise arbitrary. The sensor to backbone communication cost matrix E BC has arbitrary diagonal entries for the ith diagonal element if v i U. It has infinite off-diagonal entries and infinite diagonal entries for the ith diagonal element if v i / U. A.2 (Connectedness): Consider the graph G(V, E) already defined in (4), and construct the augmented undirected graph G (V, E ) comprised of all possible communication links between the sensors nodes and the backbone node. Hence, V = V b} and E = E (v, b) v U}. The augmented graph G must be connected. Note that A.2 requires that there exists a path between each node in V and the backbone b. Thus, A.2 does not require the sensor to sensor communication graph, G itself, to be connected. The problem is transformed to the following final form: given arbitrary communication costs that satisfy the assumptions in A.1 and A.2, find the arguments (Ã, C) that produce the optimal solution to min 1 T (Ã E CC)1 + 1 T ( C E BC )1 (7) Ã, C 0,1} N N subject to the constraint that (Ã, C) be structurally observable. 4. MAIN RESULTS This section presents the main result of the paper, which consists of an algorithm for solving the optimization problem in (7) with O(N 2 ) computational complexity, where N is the number of sensor nodes 2. In particular, it provides proof of the correctness of the algorithm in Theorem 2 and its complexity in Theorem 3. Algorithm 1 is composed of five steps, the first three of which construct the minimum spanning tree of the augmented graph G and assign orientations to the tree edges, such that each edge points toward the central reporting authority. The final two steps replace the single backbone node with several output nodes and turn the resulting directed output graph into an output cactus patch. From this spanning output cactus patch, the structure (Ã, C ) is then inferred. Algorithm 1 Input Sensor nodes V, reporting node subset U, central node b, possible communication links E, sensor to sensor communication costs E CC, and reporting costs E BC 2 Note that naively approaching the optimization problem in (7) using an exhaustive search over all possible network topologies would lead to exponential computational complexity.
4 Step 1 Form the undirected weighted graph G (V G, E G ) defined in A.2 with (E CC ) ij + (E CC ) ji = 2(E CC ) ij as the weight of (v i, v j ) and 2(E BC ) ii as the weight of (v i, b). Step 2 Find the minimum weight spanning tree T (V G, E T ) of G. 3 Step 3 Identify the minimal weight directed graph T (V G, E T ) from T such that for every v V there is a directed elementary path in T from v to b. In other words, T is an orientation of T that satisfies the above condition with (E CC ) ij as the weight of (v i, v j ) and (E BC ) ii as the weight of (v i, b). Step 4 Form the directed spanning output forest F(V F, E F ) where an introduced output node r i represents the backbone output capability of sensor node v i for each v i U, V F = V r i (v i, b) E T }, E F = (v i, v j ) E T v i, v j V} (v i, r i ) (v i, b) E T } with (E CC ) ij as the weight of (v i, v j ) and (E BC ) ii as the weight of (v i, b). Step 5 Construct a spanning output cactus patch P(V P, E P ) D(Ã, C ) from F (ensuring structural observability) as follows. Let V P = V F, E P = E F (v i, v i ) v i V, r i / V F }. That is, add a self loop to every node that is not connected to an output. Then set à 1 (vi, v ij = j ) E P 0 (v i, v j ) / E, P C ij = 1 i = j, (vi, r i ) E P 0 otherwise Output Optimal matrix structure (Ã, C ) The steps of Algorithm 1 are depicted in Figure 2. Theorem 2 now proves the optimality of the matrix structure (Ã, C ) output by this algorithm. Theorem 2 (Correctness) The pair (Ã, C ) output by Algorithm 1 is the optimal structurally observable solution to the optimization problem in (7). Proof First, it will be shown that (Ã, C ) is structurally observable and, thus, a feasible solution. From Theorem 1, (Ã, C ) is structurally observable if and only if D(Ã, C ) is spanned by an output cactus patch. Step 5 of the algorithm defined (Ã, C ) such that D(Ã, C ) is isomorphic to P, where the isomorphism consists of a relabeling from 3 The minimum weight spanning tree exists by the assumption in A.2.. Fig. 2. Schematic representation of the steps in Algorithm 1. v i V P to x i X and from r i V P to y i Y. Since F is constructed as an output forest and P is formed from F by the addition of self loops to all nodes that do not have backbone outputs, P fits the recursive definition of an output cactus patch as it is composed of output stems of length one and self-loops attached to other self-loops or an output stem. Hence, P D(Ã, C ) is an output cactus, so (Ã, C ) is structurally observable. Next, it is shown that no other feasible solution has lesser cost. Let w(h) be the undirected edge weight sum of a graph H. Note that all steps from 2 to 5 of the algorithm preserve edge weights except for step 3, which cuts it in half. Thus, w(t ) = 2w(P). Assume by way of contradiction that (Ã, C ) is not a minimum solution to optimization problem (7). Then there is a feasible matrix pair (Ã1, C 1 ) which is a minimum solution and has lesser cost with respect to the objective function. Because (Ã1, C 1 ) is a minimum feasible solution, P 1 D(Ã1, C 1 ) must be spanned by an output cactus patch. More precisely, it must be a minimum spanning output cactus patch, with the possible addition of extra zero cost self loops and with w(p 1 ) < w(p), since an additional directed edge would increase the cost. Because the minimum spanning cactus patch for G can have no cycles other than self loops (otherwise, breaking the cycle by removing an edge and giving all member nodes self loops would improve the cost), P 1 has no cycles other than self loops. Now, consider the graph T 1 obtained by removing all self loops from P 1, connecting all nodes in P 1 that connect to a reporting node to b, and making all edges bidirectional. By this construction, T 1 must be a spanning tree for G since P 1 had no cycles other than self loops, which were removed, and since each connected component of P 1 has only one reporting node. Then w(t 1 ) = 2w(P 1 ) < 2w(P) = w(t ). Hence, the weigh of T 1 is less than the weight of T, contradicting the hypothesis that T is a minimum spanning tree for G. Thus, (Ã, C ) is the minimum feasible solution to the problem in (7).
5 Theorem 2 stated that Algorithm 1 achieves the global minimum of the function (7) but made no comment concerning uniqueness. Note that since self loops have zero cost, there exist several alternatives that consist of disregarding particular combinations of self loops. Also, the minimum spanning tree T might not be unique, leading to alternative solutions. To conclude this section, Theorem 3 shows that Algorithm 1 is computationally efficient. Theorem 3 (Computational Complexity) Algorithm 1 has computational complexity given by O( V 2 ). Proof First, remark that Step 1 creates an undirected graph G that can be generated linearly in the number of vertices and edges. In other words, the computational complexity is at most O( V 2 ). Step 2 generates the minimum weight spanning tree T of G, which requires computational complexity O( E log( V )) or O( V 2 ) depending on the implementation of Prim s algorithm. This paper chooses the O( V 2 ) implementation. Hence, Step 2 has complexity O( V 2 ). Step 3 and 4 can be implemented with linear computational complexity O( V ) since it orients the tree edges, of which there are only N, and splits the backbone node into at most V output nodes. Finally, Step 5 adds self loops to the nodes, a O( V ) process, and constructs the matrices (Ã, C ), a linear operation in the number of the edges of the digraph generated in Step 4 (which is linear due to the aforementioned reason). Hence, the overall complexity is O( V 2 ). 5. SIMULATION In order to demonstrate the application of Algorithm 1, this section shows the results when an implementation of the algorithm is applied to N = 50 sensor nodes and a central authority node all randomly deployed in a square region. All nodes have a sufficiently large communication radius to communicate with any other node, and all nodes have reporting potential. Sensor to backbone communication over a given distance is equal in cost to sensor to sensor communication over the same distance (α = β = 1). This scenario can be visualized in Figure 2. The outcome of the simulation is depicted in Figure 3. Actual observable matrix values (A, C) can be derived from (Ã, C ) by sampling random matrices with the same sparsity structure as (Ã, C ) and verifying observability by evaluating the rank of the observability Gramian. Since the set of unobservable matrix pairs with the same sparsity structure as (Ã, C ) has zero measure, this observability test is passed on the first iteration with probability 1. The dynamic matrices obtained could then be used to simulate communication and reporting in the network and then estimate the sensor reading data x 0 from the reported outputs. See, for instance, Theorem 15.4 in [7]. 6. CONCLUSION This paper posed the problem of finding the optimal network structure and linear update dynamics with respect to a communication cost function for a set of sensor nodes for which data must be communicated to a network backbone in order Fig. 3. A visualization of the communication graph corresponding to the optimal structurally observable network dynamics sparsity structure is shown. It is a minimum weight spanning tree of a randomly generated sensor network with added self loops (blue circles) at some nodes (blue points). All edges are directed towards the central node (red x). to reconstruct the set of initial sensor measurements. To address this problem, a solution algorithm was developed and shown to be formally correct and computationally efficient, the proofs of which are rooted in theorems from the field of structural dynamic systems and comprise the main result of this paper. Additionally, use of the algorithm was demonstrated in a simple simulation. While the paper noted one approach by which observable dynamics can be found from the network structure produced by the algorithm, it does not guarantee good numerical properties of the observability Gramian matrix, such as a good ratio of maximum to minimum eigenvalues, that would be necessary to produce useful observers. Future work that produced well conditioned matrices from a given sparsity structure would greatly increase the usefulness of the algorithm as a network design tool, as would identification of practical sensor network applications in which a linear dynamic update scheme provides advantages. 7. REFERENCES [1] S.S. Iyengar and R.R. Brooks, Distributed Sensor Networks, Chapman & Hall/Crc Computer and Information Science. Taylor & Francis Group, [2] G. J. Pottie and W. J. Kaiser, Wireless integrated network sensors, Commun. ACM, vol. 43, no. 5, pp , May [3] M. Ji and M. Egerstedt, Observability and estimation in distributed sensor networks, in 46th IEEE Conference on Deision and Control, dec. 2007, pp [4] A.G. Dimakis, S. Kar, J. M F Moura, M.G. Rabbat, and A. Scaglione, Gossip algorithms for distributed signal processing, Proceedings of the IEEE, vol. 98, no. 11, pp , Nov. [5] J.-M. Dion, C. Commault, and J. V. Woude, Generic properties and control of linear structured systems: a survey, Automatica, pp , [6] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson, Introduction to Algorithms, McGraw-Hill Higher Education, 2nd edition, [7] J.P. Hespanha, Linear Systems Theory, Princeton University Press, 2009.
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE
SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE 2012 SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH (M.Sc., SFU, Russia) A THESIS
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Notes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS 1. SYSTEMS OF EQUATIONS AND MATRICES 1.1. Representation of a linear system. The general system of m equations in n unknowns can be written a 11 x 1 + a 12 x 2 +
SECTIONS 1.5-1.6 NOTES ON GRAPH THEORY NOTATION AND ITS USE IN THE STUDY OF SPARSE SYMMETRIC MATRICES
SECIONS.5-.6 NOES ON GRPH HEORY NOION ND IS USE IN HE SUDY OF SPRSE SYMMERIC MRICES graph G ( X, E) consists of a finite set of nodes or vertices X and edges E. EXMPLE : road map of part of British Columbia
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA Data
α = u v. In other words, Orthogonal Projection
Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
Markov random fields and Gibbs measures
Chapter Markov random fields and Gibbs measures 1. Conditional independence Suppose X i is a random element of (X i, B i ), for i = 1, 2, 3, with all X i defined on the same probability space (.F, P).
Labeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
Practical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices
MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang
Connected Identifying Codes for Sensor Network Monitoring
Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:
1 Sets and Set Notation.
LINEAR ALGEBRA MATH 27.6 SPRING 23 (COHEN) LECTURE NOTES Sets and Set Notation. Definition (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
3. The Junction Tree Algorithms
A Short Course on Graphical Models 3. The Junction Tree Algorithms Mark Paskin [email protected] 1 Review: conditional independence Two random variables X and Y are independent (written X Y ) iff p X ( )
Solutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University [email protected] 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
Math 312 Homework 1 Solutions
Math 31 Homework 1 Solutions Last modified: July 15, 01 This homework is due on Thursday, July 1th, 01 at 1:10pm Please turn it in during class, or in my mailbox in the main math office (next to 4W1) Please
Graphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
Inner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model
Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model 1 September 004 A. Introduction and assumptions The classical normal linear regression model can be written
(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014
Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li Advised by: Dave Mount May 22, 2014 1 INTRODUCTION In this report we consider the implementation of an efficient
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Introduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France [email protected] November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
Similarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
Lecture 4: BK inequality 27th August and 6th September, 2007
CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound
Notes on Symmetric Matrices
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Notes on Symmetric Matrices Prof. Nick Harvey University of British Columbia 1 Symmetric Matrices We review some basic results concerning symmetric matrices.
Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs
MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set
Linear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
Methods for Finding Bases
Methods for Finding Bases Bases for the subspaces of a matrix Row-reduction methods can be used to find bases. Let us now look at an example illustrating how to obtain bases for the row space, null space,
A 2-factor in which each cycle has long length in claw-free graphs
A -factor in which each cycle has long length in claw-free graphs Roman Čada Shuya Chiba Kiyoshi Yoshimoto 3 Department of Mathematics University of West Bohemia and Institute of Theoretical Computer Science
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
Statistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
CIS 700: algorithms for Big Data
CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
Suk-Geun Hwang and Jin-Woo Park
Bull. Korean Math. Soc. 43 (2006), No. 3, pp. 471 478 A NOTE ON PARTIAL SIGN-SOLVABILITY Suk-Geun Hwang and Jin-Woo Park Abstract. In this paper we prove that if Ax = b is a partial signsolvable linear
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes
A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
An Introduction to APGL
An Introduction to APGL Charanpal Dhanjal February 2012 Abstract Another Python Graph Library (APGL) is a graph library written using pure Python, NumPy and SciPy. Users new to the library can gain an
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
Coding and decoding with convolutional codes. The Viterbi Algor
Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
ON TORI TRIANGULATIONS ASSOCIATED WITH TWO-DIMENSIONAL CONTINUED FRACTIONS OF CUBIC IRRATIONALITIES.
ON TORI TRIANGULATIONS ASSOCIATED WITH TWO-DIMENSIONAL CONTINUED FRACTIONS OF CUBIC IRRATIONALITIES. O. N. KARPENKOV Introduction. A series of properties for ordinary continued fractions possesses multidimensional
Decision-making with the AHP: Why is the principal eigenvector necessary
European Journal of Operational Research 145 (2003) 85 91 Decision Aiding Decision-making with the AHP: Why is the principal eigenvector necessary Thomas L. Saaty * University of Pittsburgh, Pittsburgh,
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
Classification of Cartan matrices
Chapter 7 Classification of Cartan matrices In this chapter we describe a classification of generalised Cartan matrices This classification can be compared as the rough classification of varieties in terms
4.5 Linear Dependence and Linear Independence
4.5 Linear Dependence and Linear Independence 267 32. {v 1, v 2 }, where v 1, v 2 are collinear vectors in R 3. 33. Prove that if S and S are subsets of a vector space V such that S is a subset of S, then
GENERATING SETS KEITH CONRAD
GENERATING SETS KEITH CONRAD 1 Introduction In R n, every vector can be written as a unique linear combination of the standard basis e 1,, e n A notion weaker than a basis is a spanning set: a set of vectors
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Lecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
Probe Station Placement for Robust Monitoring of Networks
Probe Station Placement for Robust Monitoring of Networks Maitreya Natu Dept. of Computer and Information Science University of Delaware Newark, DE, USA, 97 Email: [email protected] Adarshpal S. Sethi
The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
SEMITOTAL AND TOTAL BLOCK-CUTVERTEX GRAPH
CHAPTER 3 SEMITOTAL AND TOTAL BLOCK-CUTVERTEX GRAPH ABSTRACT This chapter begins with the notion of block distances in graphs. Using block distance we defined the central tendencies of a block, like B-radius
1 Example of Time Series Analysis by SSA 1
1 Example of Time Series Analysis by SSA 1 Let us illustrate the 'Caterpillar'-SSA technique [1] by the example of time series analysis. Consider the time series FORT (monthly volumes of fortied wine sales
Mathematics for Algorithm and System Analysis
Mathematics for Algorithm and System Analysis for students of computer and computational science Edward A. Bender S. Gill Williamson c Edward A. Bender & S. Gill Williamson 2005. All rights reserved. Preface
Systems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
