Applications of Numbered Undirected Graphs Gary s. Bloom and Solomon w. Golomb.

Slides:



Advertisements
Similar presentations
CSE 211 Discrete Mathematics
Advertisements

Lecture 5 Graph Theory. Graphs Graphs are the most useful model with computer science such as logical design, formal languages, communication network,
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
R. Johnsonbaugh Discrete Mathematics 5 th edition, 2001 Chapter 8 Network models.
GOLOMB RULERS AND GRACEFUL GRAPHS
C++ Programming: Program Design Including Data Structures, Third Edition Chapter 21: Graphs.
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
Applied Discrete Mathematics Week 12: Trees
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
Nyhoff, ADTs, Data Structures and Problem Solving with C++, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Graphs.
Segmentation Graph-Theoretic Clustering.
Tirgul 13. Unweighted Graphs Wishful Thinking – you decide to go to work on your sun-tan in ‘ Hatzuk ’ beach in Tel-Aviv. Therefore, you take your swimming.
Variable-Length Codes: Huffman Codes
1 Efficient Discovery of Conserved Patterns Using a Pattern Graph Inge Jonassen Pattern Discovery Arwa Zabian 13/07/2015.
The Shortest Path Problem
Let us switch to a new topic:
NetworkModel-1 Network Optimization Models. NetworkModel-2 Network Terminology A network consists of a set of nodes and arcs. The arcs may have some flow.
1/26 Chapter 6 Digital Data Communication Techniques.
Neural Networks Lecture 8: Two simple learning algorithms
Domain decomposition in parallel computing Ashok Srinivasan Florida State University COT 5410 – Spring 2004.
9.2 Graph Terminology and Special Types Graphs
Lecture 1 Signals in the Time and Frequency Domains
GRAPH Learning Outcomes Students should be able to:
The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each decision is locally optimal. These.
USING THE MATLAB COMMUNICATIONS TOOLBOX TO LOOK AT CYCLIC CODING Wm. Hugh Blanton East Tennessee State University
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
Graphs Chapter 10.
Efficient Gathering of Correlated Data in Sensor Networks
Introduction to Computer Design CMPT 150 Section: D Ch. 1 Digital Computers and Information CMPT 150, Chapter 1, Tariq Nuruddin, Fall 06, SFU 1.
Information Coding in noisy channel error protection:-- improve tolerance of errors error detection: --- indicate occurrence of errors. Source.
May 1, 2002Applied Discrete Mathematics Week 13: Graphs and Trees 1News CSEMS Scholarships for CS and Math students (US citizens only) $3,125 per year.
Curriculum Optimization Project CURRICULUM REFORM MEETING California State University, Los Angeles Kevin Byrnes Dept. of Applied Math Johns Hopkins University.
Basic Concepts of Encoding Codes, their efficiency and redundancy 1.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
British Computer Society (BCS)
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
CSCI 3160 Design and Analysis of Algorithms Chengyu Lin.
Huffman coding Content 1 Encoding and decoding messages Fixed-length coding Variable-length coding 2 Huffman coding.
Agenda Review: –Planar Graphs Lecture Content:  Concepts of Trees  Spanning Trees  Binary Trees Exercise.
CHAPTER 5 SIGNAL SPACE ANALYSIS
COSC 2007 Data Structures II Chapter 14 Graphs I.
Most of contents are provided by the website Graph Essentials TJTSD66: Advanced Topics in Social Media.
The Structure of the Web. Getting to knowing the Web How big is the web and how do you measure it? How many people use the web? How many use search engines?
Chapter 8 Network Models to accompany Operations Research: Applications and Algorithms 4th edition by Wayne L. Winston Copyright (c) 2004 Brooks/Cole,
OPTIMAL CONNECTIONS: STRENGTH AND DISTANCE IN VALUED GRAPHS Yang, Song and David Knoke RESEARCH QUESTION: How to identify optimal connections, that is,
Chapter 10: Trees A tree is a connected simple undirected graph with no simple circuits. Properties: There is a unique simple path between any 2 of its.
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
Chapter 7 Dynamic Programming 7.1 Introduction 7.2 The Longest Common Subsequence Problem 7.3 Matrix Chain Multiplication 7.4 The dynamic Programming Paradigm.
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
Chapter 9: Graphs.
Chapter 20: Graphs. Objectives In this chapter, you will: – Learn about graphs – Become familiar with the basic terminology of graph theory – Discover.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
1 st semester 1436 / Modulation Continuous wave (CW) modulation AM Angle modulation FM PM Pulse Modulation Analog Pulse Modulation PAMPPMPDM Digital.
12. Lecture WS 2012/13Bioinformatics III1 V12 Menger’s theorem Borrowing terminology from operations research consider certain primal-dual pairs of optimization.
Introduction to NP Instructor: Neelima Gupta 1.
Error Detecting and Error Correcting Codes
Data Structures and Algorithm Analysis Graph Algorithms Lecturer: Jing Liu Homepage:
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
Graphs: Definitions and Basic Properties
Chapter 5 : Trees.
Greedy Technique.
Network analysis.
COS 463: Wireless Networks Lecture 9 Kyle Jamieson
Segmentation Graph-Theoretic Clustering.
Maximum Flows of Minimum Cost
3. Brute Force Selection sort Brute-Force string matching
3. Brute Force Selection sort Brute-Force string matching
Winter 2019 Lecture 11 Minimum Spanning Trees (Part II)
3. Brute Force Selection sort Brute-Force string matching
Autumn 2019 Lecture 11 Minimum Spanning Trees (Part II)
Presentation transcript:

Applications of Numbered Undirected Graphs Gary s. Bloom and Solomon w. Golomb

Content: Introduction Applications to Coding Theory a. Optimal Nonstandard Encoding of integers b. Binary Codes with minimum valued Out-of- synch autocorrelation functions 1) The graph model 2)Radar type codes

Introduction: In this lecture we will survey diverse applications of a broad class of assignment of integers to the vertices and edges of graphs. We commence by stating several basic definitions and citing some applications of this unifying family of models.

A graph Γ consists of a set of vertices and a set of edges. Every edge must join two distinct vertices, and no more than one edge may join any vertex pair. If a nonnegative integer Ψ(v) is assigned to each vertex v, then the vertices of Γ are said to be “numbered”. Γ is itself a numbered graph if each edge e, is given the value Ψ(e)=| Ψ(v)- Ψ(u)| where u and v are the endpoints of e.

Notice that in the absence of additional constraints every graph can be numbered in infinitely many ways. Thus utilization of numbered graph models requires imposition of additional constraints which characterize the problem being investigated. Here are some applications of this family of models:

The design of certain classes of nonperiodic codes for pulse radar and missile guidance is equivalent to numbering the complete graph in such a way that all the edge numbers are distinct. “Nonnatural” methods of encoding the integers from 0 to using n-digit vectors from the b- symbol alphabet have been devised to minimize the seriousness of errors occurring in a single digit. The corresponding graph problem involves numbering the nodes of the square lattice grid, b on a side in n dimensions, with the integer 0 to

Determination of crystal structure from X-ray diffraction data. This problem is equivalent to determining all numberings of the appropriate graphs which produce a prespecified set of edge numbers. In a small communication network, it might be useful to assign each user terminal a “node number”, subject to the constraint that all connecting “edges” receive a distinct number.

Applications to coding theory Optimal Nonstandard Encoding of integers: In 1954 Kautz examined the question of “minimizing confusion” in the design of codes for digital computers. In computers any error in the message cycle is rare, and multiple errors in a single message are virtually nonexistent. Because of that, Kautz suggested an alternative to slowing down information transmission rates by adding redundancy.

He suggested minimizing confusion resulting from errors by judicious assignment of messages to code words. This idea was based on modeling an n-digit binary code as an n-dimensional cube. Any single error in communicating an intended message causes reception of a code word at distance 1 from the intended one.

Kautz recognized that the best assignment of messages to code words would be dictated by different criteria in different situations. Quantification of this technique is straightforward when messages are numbers. When is received instead of, the “confusion index” is defined as The analysis of how to assign integers to code words for the minimization of functions was initially proposed by Golomb and undertaken by Harper.

Harper obtained algorithms and analytical results for the following optimization problems on the n-dimensional cube: These functions are easily interpreted in the communication context:

is proportional to the size of the average error which occurs. is the size of the error range. indicates the variance in error sizes. Algorithms assigning messages to n-cubes also are applicable for encoding nonnumeric messages.

B. Binary codes with minimum valued out of synch autocorrelation functions: 1)The graph model These coding applications are derived from optimal numbering of the complete graph. Applications of this model require that each edge number be distinct. Such a numbering is optimal if it minimizes the largest edge value which we designate by

An optimally labeled graph with n edges is called graceful if its vertices can be numbered with distinct nonnegative integers no larger than n in a manner that assigns to each edge exactly one of the integers from 1 to n. Golomb observed an important equivalence for the coding theory context between a “semi- graceful” numbering which minimizes and a special ruler on which m division marks (including the ends) are placed. (Golomb- Ruler).

The shortest possible Golomb-ruler has length. In the example no edge is numbered 6 and with the equivalent ruler no measurement of length 6 may be directly made.

2)Radar type codes: Let us consider an example using the five-mark ruler of Fig. 3. One can generate a radar code from this ruler by transmitting a sequence of five pulses at times corresponding to the marks on the ruler, 0, 1, 4, 9, and 11. The time duration between the emission of the signal and its return is determined by correlating all incoming sequences of 11 time units duration with the original sequence. Thus, when an incoming string matches the original a signal of strength 5 is generated. For any other line-up of the incoming sequence with the original template there can be at most one incoming pulse.

Eckler investigated the related coding problem of designing missile guidance codes. In an airborne missile, a receiver passes all incoming signal trains down a delay line. If the line is tapped in several places which correspond to the actual time interval between incoming pulses, then the sum of those pulses will exceed a threshold and initiate some control action. The command code for such a missile contains two or more different commands. All of the delays between pulses for one command must totally differ from those for every other command. It is also desirable to use the shortest code-word durations.

Thus Eckler calculated d-1 intervals for the d pulses associated with each of n different commands. In synch, these commands give on reception by the missile, an autocorrelation of height d. Out-of-synch, the maximum autocorrelation is 1, This problem corresponds to finding a set of n rulers of different lengths each with d-1 marks on it. The marks on these rulers permit measuring each length in only one way. Moreover, the longest of these rulers must be as short as possible. Alternately, the problem corresponds to numbering as gracefully as possible a disconnected graph with n components. Each component is a complete graph on d-1 vertices.