SlideShare une entreprise Scribd logo
1  sur  40
1
Parametrized complexity of Graph
MOTIF
By: Amr Koura
2
Agenda
● Problem definition
● Preliminaries
● FPT algorithms
● Parameters for which graph MOTIF is hard
● References
3
Problem Definition
4
Problem definition
● Input: A triple (G,c,M) where G=(V,E) is graph,
c:V-->C is coloration function of V on |C|
colors, and M is multiset of Colors of C.
● Output: A subset such that G(P) is
connected and c(P)=M.
P⊂V
5
Example
M={red,blue,red,yellow,black,orange,green}
6
Solution
M={red,blue,red,yellow,black,orange,green}
7
Problem Definition
● The problem is NP-hard.
● Application: Biological,social and technical
Networks.
8
Problem definition
9
Preliminaries
10
Some Definitions
•
For any vertex , the set of neighbors of V is
N(v) and for , ,
and .
•
Vertex v dominate S if ,set R dominate
S if .
•
Denote the multiplicity of x in multiset M,
and .
v∈V
S⊂V N (S)=∪
v∈S
N (v)∖ S
S⊆N (v)
S⊆N (R)
mM x
∣M∣= ∑
x∈M
mM x
N [v]=N (v)∪{v}
N [S ]=N (S)∪S
11
Some Definitions
•
clique is a graph where each two distinct
vertices are connected.
•
cluster is a graph set of disjoint union of
cliques.
•
(I,K) is fixed parameter traceable “FPT” if it can
be solved in where f is computable
function and c is constant.
•
If C is graph class , distance of graph G to C is
number of vertices to be removed from G to get
C.
f (K).∣I∣
c
12
FPT algorithms
13
FPT Algorithm parameter
● Cluster editing.
● Distance to clique.
● Vertex cover number.
14
Cluster editing
parameter
15
Cluster editing
•
Definition:Definition: number of edge deletion or additionnumber of edge deletion or addition
requited to get cluster.requited to get cluster.
• Theorem: Graph MOTIF can be solved in
with cluster editing K.
• Proof:
use parameter “neighborhood diversity”.
O
∗
(8
k
)
16
Neighborhood diversity
Definition:
● Graph G has neighborhood diversity K if its
vertices can be partitioned into at most K sets
such that all vertices in the set have the same
type.
● Two vertices u,v have the same type if N(u)
{v}=N(v){u}.
17
Neighborhood diversity
http://www.sofsem.cz/sofsem12/files/presentations/Wednesday/SRF/Ganian.pdf
18
Cluster editing
• Theorem: graph MOTIF can be solved in on graph with
neighborhood diversity K [1].
➢ Compute neighborhood diversity:
- G is input graph, G' graph obtained after k edition on G.
- let X is set of vertices that are endpoints of the edit edges.
- Then
- Let is L cliques of G'.
- ,so number of neighborhood
diversity of G is bounded by .
- applying the above theorem , Graph MOTIF can be solved in
O
∗
(2
k
)
∣x∣≤2k
C1,. .. ,C L
∀i∈[L]∀v∈Ci ∖ X , N [v]=Ci
∣x∣+ l≤2k+ k=3k
O∗
(23k
)=O∗
(8k
)
19
Distance to Clique
20
Distance to clique
• Theorem: graph MOTIF can be solved in
where k is distance of input graph to clique.
• Proof: Algorithm:
- Find vertex cover S of size k in in time [2].
- S is also the distance to clique in G.
- let R be solution, trying all subset of S, guess subset of
S, which is in R.
- ,then vertices of the clique C with colors
should complete the solution.
- Problem: finding a minimal (inclusion wise) set such
that and G[ ] is connected.
O
∗
(2
klogk
)
G 1.2738k
2k
S '=S∩R
c(S ')⊆M ∣M∣−∣S '∣
M '=M ∖c(S ')
R'⊆C
c(R')⊆M ' R'∪S '
21
Distance to clique
• Proof: Algorithm “continue”:
- Let be connected components of G[S'],
- build graph G'=(V',E') from graph G:
+Keep the clique C as it is.
+ contract into single vertex and draw
and edge from to iff and
+ a minimal (inclusion wise) in a dominating
vertex in G',
+ try out all l-partitions of denoted by
st: dominate . note that .
+ number of partitions : “Bell number”.
C1, C2,. .. ,Ck ' k '< k
∀Ci ,i∈[k ' ] Ci vi
vi v∈C ∃u∈Ci {u ,v}∈E
Rd ⊂R∖ S '
Rd =r1 ,... ,rl
{v1 ,... ,vk ' } {A1 ,... , Al }
ri Ai
Bk '
l≤k '≤k
22
Distance to clique
• Proof: Algorithm “continue”:
- From G' ,build bipartite graph , H=( ,B)
where and where
there is an edge between and all
iff such that c(v)=x, v dominate and there
is no ,v dominate .
- H has vertices and in
can decided if H has perfect matching in
size l if exists [3].
H1∪H2
H1={uAi
,i∈[l]} H2= ∪
x∈M '
{ux
1
,ux
2
,... ,ux
mM ' x
}
uAi {ux
1,
ux
2,.
.. ,ux
mM ' x
}
∃v∈V ' Ai
i≠ j Aj
l+∣M '∣≤k+∣M∣ (k+ M )2.376
23
Distance to clique
● Proof “continue”:
- Build a match from to where j is
smallest integer not yet in the match.
- Because ,j will not exceed .
U Ai
uc(ri)
j
c(R' )⊆M ' mM ' (c(ri))
24
Distance to clique
• Proof: Algorithm “continue”:
- from perfect matching in H, graph MOTIF
solution built:
- there , namely ,
and dominate .
- set , G[Z] is connected and
and then we extend z by adding subset
such that c(Z')=M'c(Z).
∀i∈l {uAi
,ux
ji
}∈B ∃wi ∈V ' c(wi)=x
wi Ai
Z=S '∪∪
i∈l
wi c(Z )⊆M '
Z '⊆C ∖ Z
25
Distance to clique
• Theorem: graph MOTIF can be solved in
where k is distance of input graph to clique.
• Proof: Algorithm “continue”:
- The algorithm needs:
- to compute vertex cover
- to build G' from G.
- to build H from G'.
- to check perfect matching in H.
- to build perfect matching in H.
- all together:
- As ,so the algorithm fulfill the above theorem.
O
∗
(2
klogk
)
(1.2738k
)
p1(n)
p2(n)
(k+∣M∣)
2.376
p3(n)
1.2738k
+ 2k
( p1(n)+ Bk ( p2(n)+ (k+∣M∣)
2.376
+ p3(n)))
BK < (
0.792k
ln(k+ 1)
)
k
26
Vertex cover number
27
Vertex cover number
● Theorem: Graph MOTIF can be solved in
on graph with vertex cover of size k.
● Proof: Algorithm:
-same previous algorithm but computing the vertex cover in G,
up to computing .
-we guess in time , compute the order pair
such that (1) dominate , (2) has at least one neighbor in
, (3) has no neighbor in .
O
∗
(2
2klog k
)
Rd =r1 ,... ,rl
O∗
(k ! Bk ) < A1, A2, .. , Al >
riAi
∪
1≤ j< i
Aj
ri
∪
i< j≤l
Aj
ri
28
Vertex cover number
● Theorem: Graph MOTIF can be solved in
on graph with vertex cover of size k.
Proof: continue:
-in H={ } there is an edge between and
iff ,c(v)=x,v dominate , And v has one neighbor in
.
-if H has perfect matching, then we can build MOTIF solution.
- and , then the complexity is
O
∗
(2
2klog k
)
H1∪H 2 , B uAi {ux
1,
ux
2,.
.. ,ux
mM ' (x)
}
∃v∈V ' Ai
∪
1≤ j< i
Aj
k !≤k
k
Bk≤k
k O∗
(kk
∗kk
)=O∗
(22klogk
)
29
Parameters which Graph
MOTIF is Hard
30
Parameters which Graph MOTIF is
Hard
● Graph MOTIF problem still NP-Hard even if
provided with some parameters.
-Deletion set Number.
31
Deletion set Number
Parameter
32
Deletion set Number Parameter
● Definition:
minimum number of vertices to remove to make
graph belong to restricted class.
● Theorem:
Graph MOTIF is NP-Hard for graph with
distance 1 to disjoint paths and colorful motif.
33
Deletion set Number Parameter
● Proof:
-Relation with X3C.
Given X={ },S={ }, find ,st.
each element in X exists only once in T.
From I=(X,S), construct I'=(G=(V,E),c,M) ,M
motif, by:
one root r , , two paths are built, first
including , three elements of , .second
includes .
x1, x2,.... , x3q S1, S2,.... ,S∣S∣ T ⊂S
∀Si ∈S
ai
1
Si
ai
2
,bi
2
bi
1
34
Deletion set Number Parameter
C={1,2,...,2|S|+3q+1}.c( )=c( )=i. c( )=c( )=|S|+i for .
colors are assigned to nodes vertices according
to x,c(r)= .the construction is done in polynomial time.
ai
1 ai
2
ai
1 bi
1
bi
2
1≤i≤∣S∣
2∣S∣+ 1,... ,2∣S∣+ 3q
3q+ 2∣S∣+ 1
35
Deletion set Number Parameter
C={1,2,...,2|S|+3q+1}.c( )=c( )=i. c( )=c( )=|S|+i for .
colors are assigned to nodes vertices according
to x,c(r)= .the construction is done in polynomial time.
ai
1 ai
2
ai
1 bi
1
bi
2
1≤i≤∣S∣
2∣S∣+ 1,... ,2∣S∣+ 3q
3q+ 2∣S∣+ 1
36
Deletion set Number Parameter
• :
given is solution for I, build solution P for I':
-take root node.
- take the full path from to .
- take the path .
- all colors are taken only once.
T ⊂S
∀Si ∈T ai
1
bi
1
∀Si ∉T ai
2
bi
2
X3C ⇒ MOTIF
37
Deletion set Number Parameter
• :
Given solution P for I' ,build solution for I.
- Root node is taken.
- For each either or is taken, same
for and .
- To add , should be added due to
connectivity constraint.
MOTIF ⇒ X3C
1≤i≤∣S∣ ai
1
ai
2
bi
1
bi
2
bi
2
ai
2
T ⊂S
38
Deletion set Number Parameter
“continue”:
-either three nodes in are added or not.
-T={ }.since P is solution , no color
repeated and each element of X is appear
exactly once.
Si ∈S
Si∣ai
1
∈P
MOTIF ⇒ X3C
39
Refrences
● [1] “R. Ganian. Using neighborhood diversity to solve hard
problems. CoRR, abs/1201.3091,2012.”.
● [2]M. Mucha and P. Sankowski. Maximum Matchings via
Gaussian Elimination. In 45th Sym-posium on Foundations of
Computer Science (FOCS 2004), pages 248–255. IEEE
ComputerSociety, 2004.
● [3] “J. Chen, I. A. Kanj, and G. Xia. Improved upper bounds for
vertex cover. Theoretical Computer Science, 411(4042):3736 –
3756, 2010.”
40
Thank you for your
attention

Contenu connexe

Tendances

Analytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curvesAnalytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curvesmmasdeu
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyAdri Jovin
 
Summative Assessment Paper-3
Summative Assessment Paper-3Summative Assessment Paper-3
Summative Assessment Paper-3APEX INSTITUTE
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newChristos Loizos
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}Shubham Shukla
 
Optimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-peripheryOptimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-peripheryFrancesco Tudisco
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphsgraphhoc
 
Math06reviewsheet (3)
Math06reviewsheet (3)Math06reviewsheet (3)
Math06reviewsheet (3)Angel Baez
 
ACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems ReviewRoman Elizarov
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmeticJanani S
 
Mcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanMcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanAzhar Khalid
 
CMSC 56 | Lecture 10: Integer Representations & Algorithms
CMSC 56 | Lecture 10: Integer Representations & AlgorithmsCMSC 56 | Lecture 10: Integer Representations & Algorithms
CMSC 56 | Lecture 10: Integer Representations & Algorithmsallyn joy calcaben
 

Tendances (19)

Analytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curvesAnalytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curves
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Cgm Lab Manual
Cgm Lab ManualCgm Lab Manual
Cgm Lab Manual
 
Summative Assessment Paper-3
Summative Assessment Paper-3Summative Assessment Paper-3
Summative Assessment Paper-3
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-new
 
IntrRSCode
IntrRSCodeIntrRSCode
IntrRSCode
 
Funções 1
Funções 1Funções 1
Funções 1
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}
 
Optimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-peripheryOptimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-periphery
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphs
 
Assignment 2 daa
Assignment 2 daaAssignment 2 daa
Assignment 2 daa
 
Math06reviewsheet (3)
Math06reviewsheet (3)Math06reviewsheet (3)
Math06reviewsheet (3)
 
Digtial Image Processing Q@A
Digtial Image Processing Q@ADigtial Image Processing Q@A
Digtial Image Processing Q@A
 
ACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2016 NEERC (Northeastern European Regional Contest) Problems Review
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Mcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_naumanMcq ch 1_fsc_part1_nauman
Mcq ch 1_fsc_part1_nauman
 
CMSC 56 | Lecture 10: Integer Representations & Algorithms
CMSC 56 | Lecture 10: Integer Representations & AlgorithmsCMSC 56 | Lecture 10: Integer Representations & Algorithms
CMSC 56 | Lecture 10: Integer Representations & Algorithms
 

Similaire à parameterized complexity for graph Motif

A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applicationsItishree Dash
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfRajJain516913
 
Lecture03 p1
Lecture03 p1Lecture03 p1
Lecture03 p1aa11bb11
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsAmna Abunamous
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Reed solomon Encoder and Decoder
Reed solomon Encoder and DecoderReed solomon Encoder and Decoder
Reed solomon Encoder and DecoderAmeer H Ali
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam HelpLive Exam Helper
 
M210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docx
M210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docxM210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docx
M210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docxsmile790243
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.pptssuser702532
 
CS 354 More Graphics Pipeline
CS 354 More Graphics PipelineCS 354 More Graphics Pipeline
CS 354 More Graphics PipelineMark Kilgard
 
Trilinear embedding for divergence-form operators
Trilinear embedding for divergence-form operatorsTrilinear embedding for divergence-form operators
Trilinear embedding for divergence-form operatorsVjekoslavKovac1
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsMathieu Dutour Sikiric
 
Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Alexander Litvinenko
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyAbhijit Mondal
 

Similaire à parameterized complexity for graph Motif (20)

Computer graphics 2
Computer graphics 2Computer graphics 2
Computer graphics 2
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
2.ppt
2.ppt2.ppt
2.ppt
 
Optimisation random graph presentation
Optimisation random graph presentationOptimisation random graph presentation
Optimisation random graph presentation
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
 
Triggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphsTriggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphs
 
Lecture03 p1
Lecture03 p1Lecture03 p1
Lecture03 p1
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphs
 
graph theory
graph theorygraph theory
graph theory
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Reed solomon Encoder and Decoder
Reed solomon Encoder and DecoderReed solomon Encoder and Decoder
Reed solomon Encoder and Decoder
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam Help
 
M210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docx
M210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docxM210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docx
M210 Songyue.pages__MACOSX._M210 Songyue.pagesM210-S16-.docx
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
 
CS 354 More Graphics Pipeline
CS 354 More Graphics PipelineCS 354 More Graphics Pipeline
CS 354 More Graphics Pipeline
 
Trilinear embedding for divergence-form operators
Trilinear embedding for divergence-form operatorsTrilinear embedding for divergence-form operators
Trilinear embedding for divergence-form operators
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawings
 
Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Metric k center
Metric k centerMetric k center
Metric k center
 

Plus de AMR koura

End-to-end machine learning project in Arabic
End-to-end machine learning project in ArabicEnd-to-end machine learning project in Arabic
End-to-end machine learning project in ArabicAMR koura
 
Neural Network Based Player Retention Prediction in Free to Play Games
Neural Network Based Player Retention Prediction in Free to Play GamesNeural Network Based Player Retention Prediction in Free to Play Games
Neural Network Based Player Retention Prediction in Free to Play GamesAMR koura
 
yelp data challenge
yelp data challengeyelp data challenge
yelp data challengeAMR koura
 
Local Outlier Factor
Local Outlier FactorLocal Outlier Factor
Local Outlier FactorAMR koura
 

Plus de AMR koura (6)

End-to-end machine learning project in Arabic
End-to-end machine learning project in ArabicEnd-to-end machine learning project in Arabic
End-to-end machine learning project in Arabic
 
Neural Network Based Player Retention Prediction in Free to Play Games
Neural Network Based Player Retention Prediction in Free to Play GamesNeural Network Based Player Retention Prediction in Free to Play Games
Neural Network Based Player Retention Prediction in Free to Play Games
 
yelp data challenge
yelp data challengeyelp data challenge
yelp data challenge
 
Svm V SVC
Svm V SVCSvm V SVC
Svm V SVC
 
Labreport
LabreportLabreport
Labreport
 
Local Outlier Factor
Local Outlier FactorLocal Outlier Factor
Local Outlier Factor
 

Dernier

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Dernier (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

parameterized complexity for graph Motif

  • 1. 1 Parametrized complexity of Graph MOTIF By: Amr Koura
  • 2. 2 Agenda ● Problem definition ● Preliminaries ● FPT algorithms ● Parameters for which graph MOTIF is hard ● References
  • 4. 4 Problem definition ● Input: A triple (G,c,M) where G=(V,E) is graph, c:V-->C is coloration function of V on |C| colors, and M is multiset of Colors of C. ● Output: A subset such that G(P) is connected and c(P)=M. P⊂V
  • 7. 7 Problem Definition ● The problem is NP-hard. ● Application: Biological,social and technical Networks.
  • 10. 10 Some Definitions • For any vertex , the set of neighbors of V is N(v) and for , , and . • Vertex v dominate S if ,set R dominate S if . • Denote the multiplicity of x in multiset M, and . v∈V S⊂V N (S)=∪ v∈S N (v)∖ S S⊆N (v) S⊆N (R) mM x ∣M∣= ∑ x∈M mM x N [v]=N (v)∪{v} N [S ]=N (S)∪S
  • 11. 11 Some Definitions • clique is a graph where each two distinct vertices are connected. • cluster is a graph set of disjoint union of cliques. • (I,K) is fixed parameter traceable “FPT” if it can be solved in where f is computable function and c is constant. • If C is graph class , distance of graph G to C is number of vertices to be removed from G to get C. f (K).∣I∣ c
  • 13. 13 FPT Algorithm parameter ● Cluster editing. ● Distance to clique. ● Vertex cover number.
  • 15. 15 Cluster editing • Definition:Definition: number of edge deletion or additionnumber of edge deletion or addition requited to get cluster.requited to get cluster. • Theorem: Graph MOTIF can be solved in with cluster editing K. • Proof: use parameter “neighborhood diversity”. O ∗ (8 k )
  • 16. 16 Neighborhood diversity Definition: ● Graph G has neighborhood diversity K if its vertices can be partitioned into at most K sets such that all vertices in the set have the same type. ● Two vertices u,v have the same type if N(u) {v}=N(v){u}.
  • 18. 18 Cluster editing • Theorem: graph MOTIF can be solved in on graph with neighborhood diversity K [1]. ➢ Compute neighborhood diversity: - G is input graph, G' graph obtained after k edition on G. - let X is set of vertices that are endpoints of the edit edges. - Then - Let is L cliques of G'. - ,so number of neighborhood diversity of G is bounded by . - applying the above theorem , Graph MOTIF can be solved in O ∗ (2 k ) ∣x∣≤2k C1,. .. ,C L ∀i∈[L]∀v∈Ci ∖ X , N [v]=Ci ∣x∣+ l≤2k+ k=3k O∗ (23k )=O∗ (8k )
  • 20. 20 Distance to clique • Theorem: graph MOTIF can be solved in where k is distance of input graph to clique. • Proof: Algorithm: - Find vertex cover S of size k in in time [2]. - S is also the distance to clique in G. - let R be solution, trying all subset of S, guess subset of S, which is in R. - ,then vertices of the clique C with colors should complete the solution. - Problem: finding a minimal (inclusion wise) set such that and G[ ] is connected. O ∗ (2 klogk ) G 1.2738k 2k S '=S∩R c(S ')⊆M ∣M∣−∣S '∣ M '=M ∖c(S ') R'⊆C c(R')⊆M ' R'∪S '
  • 21. 21 Distance to clique • Proof: Algorithm “continue”: - Let be connected components of G[S'], - build graph G'=(V',E') from graph G: +Keep the clique C as it is. + contract into single vertex and draw and edge from to iff and + a minimal (inclusion wise) in a dominating vertex in G', + try out all l-partitions of denoted by st: dominate . note that . + number of partitions : “Bell number”. C1, C2,. .. ,Ck ' k '< k ∀Ci ,i∈[k ' ] Ci vi vi v∈C ∃u∈Ci {u ,v}∈E Rd ⊂R∖ S ' Rd =r1 ,... ,rl {v1 ,... ,vk ' } {A1 ,... , Al } ri Ai Bk ' l≤k '≤k
  • 22. 22 Distance to clique • Proof: Algorithm “continue”: - From G' ,build bipartite graph , H=( ,B) where and where there is an edge between and all iff such that c(v)=x, v dominate and there is no ,v dominate . - H has vertices and in can decided if H has perfect matching in size l if exists [3]. H1∪H2 H1={uAi ,i∈[l]} H2= ∪ x∈M ' {ux 1 ,ux 2 ,... ,ux mM ' x } uAi {ux 1, ux 2,. .. ,ux mM ' x } ∃v∈V ' Ai i≠ j Aj l+∣M '∣≤k+∣M∣ (k+ M )2.376
  • 23. 23 Distance to clique ● Proof “continue”: - Build a match from to where j is smallest integer not yet in the match. - Because ,j will not exceed . U Ai uc(ri) j c(R' )⊆M ' mM ' (c(ri))
  • 24. 24 Distance to clique • Proof: Algorithm “continue”: - from perfect matching in H, graph MOTIF solution built: - there , namely , and dominate . - set , G[Z] is connected and and then we extend z by adding subset such that c(Z')=M'c(Z). ∀i∈l {uAi ,ux ji }∈B ∃wi ∈V ' c(wi)=x wi Ai Z=S '∪∪ i∈l wi c(Z )⊆M ' Z '⊆C ∖ Z
  • 25. 25 Distance to clique • Theorem: graph MOTIF can be solved in where k is distance of input graph to clique. • Proof: Algorithm “continue”: - The algorithm needs: - to compute vertex cover - to build G' from G. - to build H from G'. - to check perfect matching in H. - to build perfect matching in H. - all together: - As ,so the algorithm fulfill the above theorem. O ∗ (2 klogk ) (1.2738k ) p1(n) p2(n) (k+∣M∣) 2.376 p3(n) 1.2738k + 2k ( p1(n)+ Bk ( p2(n)+ (k+∣M∣) 2.376 + p3(n))) BK < ( 0.792k ln(k+ 1) ) k
  • 27. 27 Vertex cover number ● Theorem: Graph MOTIF can be solved in on graph with vertex cover of size k. ● Proof: Algorithm: -same previous algorithm but computing the vertex cover in G, up to computing . -we guess in time , compute the order pair such that (1) dominate , (2) has at least one neighbor in , (3) has no neighbor in . O ∗ (2 2klog k ) Rd =r1 ,... ,rl O∗ (k ! Bk ) < A1, A2, .. , Al > riAi ∪ 1≤ j< i Aj ri ∪ i< j≤l Aj ri
  • 28. 28 Vertex cover number ● Theorem: Graph MOTIF can be solved in on graph with vertex cover of size k. Proof: continue: -in H={ } there is an edge between and iff ,c(v)=x,v dominate , And v has one neighbor in . -if H has perfect matching, then we can build MOTIF solution. - and , then the complexity is O ∗ (2 2klog k ) H1∪H 2 , B uAi {ux 1, ux 2,. .. ,ux mM ' (x) } ∃v∈V ' Ai ∪ 1≤ j< i Aj k !≤k k Bk≤k k O∗ (kk ∗kk )=O∗ (22klogk )
  • 30. 30 Parameters which Graph MOTIF is Hard ● Graph MOTIF problem still NP-Hard even if provided with some parameters. -Deletion set Number.
  • 32. 32 Deletion set Number Parameter ● Definition: minimum number of vertices to remove to make graph belong to restricted class. ● Theorem: Graph MOTIF is NP-Hard for graph with distance 1 to disjoint paths and colorful motif.
  • 33. 33 Deletion set Number Parameter ● Proof: -Relation with X3C. Given X={ },S={ }, find ,st. each element in X exists only once in T. From I=(X,S), construct I'=(G=(V,E),c,M) ,M motif, by: one root r , , two paths are built, first including , three elements of , .second includes . x1, x2,.... , x3q S1, S2,.... ,S∣S∣ T ⊂S ∀Si ∈S ai 1 Si ai 2 ,bi 2 bi 1
  • 34. 34 Deletion set Number Parameter C={1,2,...,2|S|+3q+1}.c( )=c( )=i. c( )=c( )=|S|+i for . colors are assigned to nodes vertices according to x,c(r)= .the construction is done in polynomial time. ai 1 ai 2 ai 1 bi 1 bi 2 1≤i≤∣S∣ 2∣S∣+ 1,... ,2∣S∣+ 3q 3q+ 2∣S∣+ 1
  • 35. 35 Deletion set Number Parameter C={1,2,...,2|S|+3q+1}.c( )=c( )=i. c( )=c( )=|S|+i for . colors are assigned to nodes vertices according to x,c(r)= .the construction is done in polynomial time. ai 1 ai 2 ai 1 bi 1 bi 2 1≤i≤∣S∣ 2∣S∣+ 1,... ,2∣S∣+ 3q 3q+ 2∣S∣+ 1
  • 36. 36 Deletion set Number Parameter • : given is solution for I, build solution P for I': -take root node. - take the full path from to . - take the path . - all colors are taken only once. T ⊂S ∀Si ∈T ai 1 bi 1 ∀Si ∉T ai 2 bi 2 X3C ⇒ MOTIF
  • 37. 37 Deletion set Number Parameter • : Given solution P for I' ,build solution for I. - Root node is taken. - For each either or is taken, same for and . - To add , should be added due to connectivity constraint. MOTIF ⇒ X3C 1≤i≤∣S∣ ai 1 ai 2 bi 1 bi 2 bi 2 ai 2 T ⊂S
  • 38. 38 Deletion set Number Parameter “continue”: -either three nodes in are added or not. -T={ }.since P is solution , no color repeated and each element of X is appear exactly once. Si ∈S Si∣ai 1 ∈P MOTIF ⇒ X3C
  • 39. 39 Refrences ● [1] “R. Ganian. Using neighborhood diversity to solve hard problems. CoRR, abs/1201.3091,2012.”. ● [2]M. Mucha and P. Sankowski. Maximum Matchings via Gaussian Elimination. In 45th Sym-posium on Foundations of Computer Science (FOCS 2004), pages 248–255. IEEE ComputerSociety, 2004. ● [3] “J. Chen, I. A. Kanj, and G. Xia. Improved upper bounds for vertex cover. Theoretical Computer Science, 411(4042):3736 – 3756, 2010.”
  • 40. 40 Thank you for your attention