Deep Learning on Graphs: a Survey

Total Page:16

File Type:pdf, Size:1020Kb

Deep Learning on Graphs: a Survey JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Deep Learning on Graphs: A Survey Ziwei Zhang, Peng Cui and Wenwu Zhu, Fellow, IEEE Abstract—Deep learning has been shown to be successful in a number of domains, ranging from acoustics, images, to natural language processing. However, applying deep learning to the ubiquitous graph data is non-trivial because of the unique characteristics of graphs. Recently, substantial research efforts have been devoted to applying deep learning methods to graphs, resulting in beneficial advances in graph analysis techniques. In this survey, we comprehensively review the different types of deep learning methods on graphs. We divide the existing methods into five categories based on their model architectures and training strategies: graph recurrent neural networks, graph convolutional networks, graph autoencoders, graph reinforcement learning, and graph adversarial methods. We then provide a comprehensive overview of these methods in a systematic manner mainly by following their development history. We also analyze the differences and compositions of different methods. Finally, we briefly outline the applications in which they have been used and discuss potential future research directions. Index Terms—Graph Data, Deep Learning, Graph Neural Network, Graph Convolutional Network, Graph Autoencoder. F 1 INTRODUCTION Large-scale graphs. In the big-data era, real graphs can • Over the past decade, deep learning has become the “crown jewel” easily have millions or billions of nodes and edges; some of artificial intelligence and machine learning [1], showing supe- well-known examples are social networks and e-commerce rior performance in acoustics [2], images [3] and natural language networks [8]. Therefore, how to design scalable models, processing [4], etc. The expressive power of deep learning to preferably models that have a linear time complexity with extract complex patterns from underlying data is well recognized. respect to the graph size, is a key problem. 1 Incorporating interdisciplinary knowledge. Graphs are of- On the other hand, graphs are ubiquitous in the real world, repre- • senting objects and their relationships in varied domains, including ten connected to other disciplines, such as biology, chemistry, social networks, e-commerce networks, biology networks, traffic and social sciences. This interdisciplinary nature provides networks, and so on. Graphs are also known to have complicated both opportunities and challenges: domain knowledge can structures that can contain rich underlying values [5]. As a result, be leveraged to solve specific problems but integrating do- how to utilize deep learning methods to analyze graph data has main knowledge can complicate model designs. For example, attracted considerable research attention over the past few years. when generating molecular graphs, the objective function and This problem is non-trivial because several challenges exist in chemical constraints are often non-differentiable; therefore applying traditional deep learning architectures to graphs: gradient-based training methods cannot easily be applied. Irregular structures of graphs. Unlike images, audio, and • To tackle these challenges, tremendous efforts have been made text, which have a clear grid structure, graphs have irregular in this area, resulting in a rich literature of related papers and structures, making it hard to generalize some of the basic methods. The adopted architectures and training strategies also mathematical operations to graphs [6]. For example, defining vary greatly, ranging from supervised to unsupervised and from convolution and pooling operations, which are the funda- convolutional to recursive. However, to the best of our knowledge, mental operations in convolutional neural networks (CNNs), little effort has been made to systematically summarize the differ- for graph data is not straightforward. This problem is often ences and connections between these diverse methods. referred to as the geometric deep learning problem [7]. arXiv:1812.04202v3 [cs.LG] 13 Mar 2020 In this paper, we try to fill this knowledge gap by comprehen- Heterogeneity and diversity of graphs. A graph itself • sively reviewing deep learning methods on graphs. Specifically, as can be complicated, containing diverse types and properties. shown in Figure 1, we divide the existing methods into five cate- For example, graphs can be heterogeneous or homogenous, gories based on their model architectures and training strategies: weighted or unweighted, and signed or unsigned. In addition, graph recurrent neural networks (Graph RNNs), graph convolu- the tasks of graphs also vary widely, ranging from node- tional networks (GCNs), graph autoencoders (GAEs), graph re- focused problems such as node classification and link predic- inforcement learning (Graph RL), and graph adversarial methods. tion to graph-focused problems such as graph classification We summarize some of the main characteristics of these categories and graph generation. These diverse types, properties, and in Table 1 based on the following high-level distinctions. Graph tasks require different model architectures to tackle specific RNNs capture recursive and sequential patterns of graphs by mod- problems. eling states at either the node-level or the graph-level. GCNs define convolution and readout operations on irregular graph structures • Z. Zhang, P. Cui, and W. Zhu are with the Department of Computer Science and Technology, Tsinghua University, Beijing, China. to capture common local and global structural patterns. GAEs E-mail: [email protected], [email protected], assume low-rank graph structures and adopt unsupervised methods [email protected]. P. Cui and W. Zhu are corresponding authors. for node representation learning. Graph RL defines graph-based 1. Graphs are also called networks such as in social networks. In this paper, actions and rewards to obtain feedbacks on graph tasks while fol- we use two terms interchangeably. lowing constraints. Graph adversarial methods adopt adversarial JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 2 Graph Recurrent Neural Networks Graph Convolutional Networks Deep Learning Graph Autoencoders on Graphs Graph Reinforcement Learning Graph Adversarial Methods Fig. 1. A categorization of deep learning methods on graphs. We divide the existing methods into five categories: graph recurrent neural networks, graph convolutional networks, graph autoencoders, graph reinforcement learning, and graph adversarial methods. TABLE 1 Main Distinctions among Deep Learning Methods on Graphs Category Basic Assumptions/Aims Main Functions Graph recurrent neural networks Recursive and sequential patterns of graphs Definitions of states for nodes or graphs Graph convolutional networks Common local and global structural patterns of graphs Graph convolution and readout operations Graph autoencoders Low-rank structures of graphs Unsupervised node representation learning Graph reinforcement learning Feedbacks and constraints of graph tasks Graph-based actions and rewards Graph adversarial methods The generalization ability and robustness of graph-based models Graph adversarial trainings and attacks training techniques to enhance the generalization ability of graph- and graph adversarial methods in Section 3 to 7, respectively. We based models and test their robustness by adversarial attacks. conclude with a discussion in Section 8. In the following sections, we provide a comprehensive and detailed overview of these methods, mainly by following their 2 NOTATIONS AND PRELIMINARIES development history and the various ways these methods solve Notations. In this paper, a graph2 is represented as G = (V; E) the challenges posed by graphs. We also analyze the differences where V = fv ; :::; v g is a set of N = jV j nodes and between these models and delve into how to composite different 1 N E ⊆ V × V is a set of M = jEj edges between nodes. We use architectures. Finally, we briefly outline the applications of these A 2 N N to denote the adjacency matrix, whose ith row, jth models, introduce several open libraries, and discuss potential R × column, and an element are denoted as A(i; :); A(:; j); A(i; j), future research directions. In the appendix, we provide a source respectively. The graph can be either directed or undirected code repository, analyze the time complexity of various methods and weighted or unweighted. In this paper, we mainly consider discussed in the paper, and summarize some common applications. unsigned graphs; therefore, A(i; j) ≥ 0. Signed graphs will Related works . Several previous surveys are related to our be discussed in future research directions. We use FV and FE et al. paper. Bronstein [7] summarized some early GCN methods to denote features of nodes and edges, respectively. For other as well as CNNs on manifolds and studied them comprehensively variables, we use bold uppercase characters to denote matrices et al. through geometric deep learning. Battaglia [9] summarized and bold lowercase characters to denote vectors, e.g., a matrix X how to use GNNs and GCNs for relational reasoning using a and a vector x. The transpose of a matrix is denoted as XT and et al. unified framework called graph networks, Lee [10] reviewed the element-wise multiplication is denoted as X X . Functions et al. 1 2 the attention models for graphs, Zhang [11] summarized are marked with curlicues, e.g., F(·). et al. some GCNs, and Sun [12] briefly surveyed adversarial To better illustrate
Recommended publications
  • Beta Current Flow Centrality for Weighted Networks Konstantin Avrachenkov, Vladimir Mazalov, Bulat Tsynguev
    Beta Current Flow Centrality for Weighted Networks Konstantin Avrachenkov, Vladimir Mazalov, Bulat Tsynguev To cite this version: Konstantin Avrachenkov, Vladimir Mazalov, Bulat Tsynguev. Beta Current Flow Centrality for Weighted Networks. 4th International Conference on Computational Social Networks (CSoNet 2015), Aug 2015, Beijing, China. pp.216-227, 10.1007/978-3-319-21786-4_19. hal-01258658 HAL Id: hal-01258658 https://hal.inria.fr/hal-01258658 Submitted on 19 Jan 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Beta Current Flow Centrality for Weighted Networks Konstantin E. Avrachenkov1, Vladimir V. Mazalov2, Bulat T. Tsynguev3 1 INRIA, 2004 Route des Lucioles, Sophia-Antipolis, France [email protected] 2 Institute of Applied Mathematical Research, Karelian Research Center, Russian Academy of Sciences, 11, Pushkinskaya st., Petrozavodsk, Russia, 185910 [email protected] 3 Transbaikal State University, 30, Aleksandro-Zavodskaya st., Chita, Russia, 672039 [email protected] Abstract. Betweenness centrality is one of the basic concepts in the analysis of social networks. Initial definition for the betweenness of a node in a graph is based on the fraction of the number of geodesics (shortest paths) between any two nodes that given node lies on, to the total number of the shortest paths connecting these nodes.
    [Show full text]
  • 1. Directed Graphs Or Quivers What Is Category Theory? • Graph Theory on Steroids • Comic Book Mathematics • Abstract Nonsense • the Secret Dictionary
    1. Directed graphs or quivers What is category theory? • Graph theory on steroids • Comic book mathematics • Abstract nonsense • The secret dictionary Sets and classes: For S = fX j X2 = Xg, have S 2 S , S2 = S Directed graph or quiver: C = (C0;C1;@0 : C1 ! C0;@1 : C1 ! C0) Class C0 of objects, vertices, points, . Class C1 of morphisms, (directed) edges, arrows, . For x; y 2 C0, write C(x; y) := ff 2 C1 j @0f = x; @1f = yg f 2C1 tail, domain / @0f / @1f o head, codomain op Opposite or dual graph of C = (C0;C1;@0;@1) is C = (C0;C1;@1;@0) Graph homomorphism F : D ! C has object part F0 : D0 ! C0 and morphism part F1 : D1 ! C1 with @i ◦ F1(f) = F0 ◦ @i(f) for i = 0; 1. Graph isomorphism has bijective object and morphism parts. Poset (X; ≤): set X with reflexive, antisymmetric, transitive order ≤ Hasse diagram of poset (X; ≤): x ! y if y covers x, i.e., x 6= y and [x; y] = fx; yg, so x ≤ z ≤ y ) z = x or z = y. Hasse diagram of (N; ≤) is 0 / 1 / 2 / 3 / ::: Hasse diagram of (f1; 2; 3; 6g; j ) is 3 / 6 O O 1 / 2 1 2 2. Categories Category: Quiver C = (C0;C1;@0 : C1 ! C0;@1 : C1 ! C0) with: • composition: 8 x; y; z 2 C0 ; C(x; y) × C(y; z) ! C(x; z); (f; g) 7! g ◦ f • satisfying associativity: 8 x; y; z; t 2 C0 ; 8 (f; g; h) 2 C(x; y) × C(y; z) × C(z; t) ; h ◦ (g ◦ f) = (h ◦ g) ◦ f y iS qq <SSSS g qq << SSS f qqq h◦g < SSSS qq << SSS qq g◦f < SSS xqq << SS z Vo VV < x VVVV << VVVV < VVVV << h VVVV < h◦(g◦f)=(h◦g)◦f VVVV < VVV+ t • identities: 8 x; y; z 2 C0 ; 9 1y 2 C(y; y) : 8 f 2 C(x; y) ; 1y ◦ f = f and 8 g 2 C(y; z) ; g ◦ 1y = g f y o x MM MM 1y g MM MMM f MMM M& zo g y Example: N0 = fxg ; N1 = N ; 1x = 0 ; 8 m; n 2 N ; n◦m = m+n ; | one object, lots of arrows [monoid of natural numbers under addition] 4 x / x Equation: 3 + 5 = 4 + 4 Commuting diagram: 3 4 x / x 5 ( 1 if m ≤ n; Example: N1 = N ; 8 m; n 2 N ; jN(m; n)j = 0 otherwise | lots of objects, lots of arrows [poset (N; ≤) as a category] These two examples are small categories: have a set of morphisms.
    [Show full text]
  • General Approach to Line Graphs of Graphs 1
    DEMONSTRATIO MATHEMATICA Vol. XVII! No 2 1985 Antoni Marczyk, Zdzislaw Skupien GENERAL APPROACH TO LINE GRAPHS OF GRAPHS 1. Introduction A unified approach to the notion of a line graph of general graphs is adopted and proofs of theorems announced in [6] are presented. Those theorems characterize five different types of line graphs. Both Krausz-type and forbidden induced sub- graph characterizations are provided. So far other authors introduced and dealt with single spe- cial notions of a line graph of graphs possibly belonging to a special subclass of graphs. In particular, the notion of a simple line graph of a simple graph is implied by a paper of Whitney (1932). Since then it has been repeatedly introduc- ed, rediscovered and generalized by many authors, among them are Krausz (1943), Izbicki (1960$ a special line graph of a general graph), Sabidussi (1961) a simple line graph of a loop-free graph), Menon (1967} adjoint graph of a general graph) and Schwartz (1969; interchange graph which coincides with our line graph defined below). In this paper we follow another way, originated in our previous work [6]. Namely, we distinguish special subclasses of general graphs and consider five different types of line graphs each of which is defined in a natural way. Note that a similar approach to the notion of a line graph of hypergraphs can be adopted. We consider here the following line graphsi line graphs, loop-free line graphs, simple line graphs, as well as augmented line graphs and augmented loop-free line graphs. - 447 - 2 A. Marczyk, Z.
    [Show full text]
  • Graph Theory
    1 Graph Theory “Begin at the beginning,” the King said, gravely, “and go on till you come to the end; then stop.” — Lewis Carroll, Alice in Wonderland The Pregolya River passes through a city once known as K¨onigsberg. In the 1700s seven bridges were situated across this river in a manner similar to what you see in Figure 1.1. The city’s residents enjoyed strolling on these bridges, but, as hard as they tried, no residentof the city was ever able to walk a route that crossed each of these bridges exactly once. The Swiss mathematician Leonhard Euler learned of this frustrating phenomenon, and in 1736 he wrote an article [98] about it. His work on the “K¨onigsberg Bridge Problem” is considered by many to be the beginning of the field of graph theory. FIGURE 1.1. The bridges in K¨onigsberg. J.M. Harris et al., Combinatorics and Graph Theory , DOI: 10.1007/978-0-387-79711-3 1, °c Springer Science+Business Media, LLC 2008 2 1. Graph Theory At first, the usefulness of Euler’s ideas and of “graph theory” itself was found only in solving puzzles and in analyzing games and other recreations. In the mid 1800s, however, people began to realize that graphs could be used to model many things that were of interest in society. For instance, the “Four Color Map Conjec- ture,” introduced by DeMorgan in 1852, was a famous problem that was seem- ingly unrelated to graph theory. The conjecture stated that four is the maximum number of colors required to color any map where bordering regions are colored differently.
    [Show full text]
  • An Application of Graph Theory in Markov Chains Reliability Analysis
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DSpace at VSB Technical University of Ostrava STATISTICS VOLUME: 12 j NUMBER: 2 j 2014 j JUNE An Application of Graph Theory in Markov Chains Reliability Analysis Pavel SKALNY Department of Applied Mathematics, Faculty of Electrical Engineering and Computer Science, VSB–Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava-Poruba, Czech Republic [email protected] Abstract. The paper presents reliability analysis which the production will be equal or greater than the indus- was realized for an industrial company. The aim of the trial partner demand. To deal with the task a Monte paper is to present the usage of discrete time Markov Carlo simulation of Discrete time Markov chains was chains and the flow in network approach. Discrete used. Markov chains a well-known method of stochastic mod- The goal of this paper is to present the Discrete time elling describes the issue. The method is suitable for Markov chain analysis realized on the system, which is many systems occurring in practice where we can easily not distributed in parallel. Since the analysed process distinguish various amount of states. Markov chains is more complicated the graph theory approach seems are used to describe transitions between the states of to be an appropriate tool. the process. The industrial process is described as a graph network. The maximal flow in the network cor- Graph theory has previously been applied to relia- responds to the production. The Ford-Fulkerson algo- bility, but for different purposes than we intend.
    [Show full text]
  • P2k-Factorization of Complete Bipartite Multigraphs
    P2k-factorization of complete bipartite multigraphs Beiliang Du Department of Mathematics Suzhou University Suzhou 215006 People's Republic of China Abstract We show that a necessary and sufficient condition for the existence of a P2k-factorization of the complete bipartite- multigraph )"Km,n is m = n == 0 (mod k(2k - l)/d), where d = gcd()", 2k - 1). 1. Introduction Let Km,n be the complete bipartite graph with two partite sets having m and n vertices respectively. The graph )"Km,n is the disjoint union of ).. graphs each isomorphic to Km,n' A subgraph F of )"Km,n is called a spanning subgraph of )"Km,n if F contains all the vertices of )"Km,n' It is clear that a graph with no isolated vertices is uniquely determined by the set of its edges. So in this paper, we consider a graph with no isolated vertices to be a set of 2-element subsets of its vertices. For positive integer k, a path on k vertices is denoted by Pk. A Pk-factor of )'Km,n is a spanning subgraph F of )"Km,n such that every component of F is a Pk and every pair of Pk's have no vertex in common. A Pk-factorization of )"Km,n is a set of edge-disjoint Pk-factors of )"Km,n which is a partition of the set of edges of )'Km,n' (In paper [4] a Pk-factorization of )"Km,n is defined to be a resolvable (m, n, k,)..) bipartite Pk design.) The multigraph )"Km,n is called Ph-factorable whenever it has a Ph-factorization.
    [Show full text]
  • Trees and Graphs
    Module 8: Trees and Graphs Theme 1: Basic Properties of Trees A (rooted) tree is a finite set of nodes such that ¯ there is a specially designated node called the root. ¯ d Ì ;Ì ;::: ;Ì ½ ¾ the remaining nodes are partitioned into disjoint sets d such that each of these Ì ;Ì ;::: ;Ì d ½ ¾ sets is a tree. The sets d are called subtrees,and the degree of the root. The above is an example of a recursive definition, as we have already seen in previous modules. A Ì Ì Ì B C ¾ ¿ Example 1: In Figure 1 we show a tree rooted at with three subtrees ½ , and rooted at , and D , respectively. We now introduce some terminology for trees: ¯ A tree consists of nodes or vertices that store information and often are labeled by a number or a letter. In Figure 1 the nodes are labeled as A;B;:::;Å. ¯ An edge is an unordered pair of nodes (usually denoted as a segment connecting two nodes). A; B µ For example, ´ is an edge in Figure 1. A ¯ The number of subtrees of a node is called its degree. For example, node is of degree three, while node E is of degree two. The maximum degree of all nodes is called the degree of the tree. Ã ; Ä; F ; G; Å ; Á Â ¯ A leaf or a terminal node is a node of degree zero. Nodes and are leaves in Figure 1. B ¯ A node that is not a leaf is called an interior node or an internal node (e.g., see nodes and D ).
    [Show full text]
  • Sphere-Cut Decompositions and Dominating Sets in Planar Graphs
    Sphere-cut Decompositions and Dominating Sets in Planar Graphs Michalis Samaris R.N. 201314 Scientific committee: Dimitrios M. Thilikos, Professor, Dep. of Mathematics, National and Kapodistrian University of Athens. Supervisor: Stavros G. Kolliopoulos, Dimitrios M. Thilikos, Associate Professor, Professor, Dep. of Informatics and Dep. of Mathematics, National and Telecommunications, National and Kapodistrian University of Athens. Kapodistrian University of Athens. white Lefteris M. Kirousis, Professor, Dep. of Mathematics, National and Kapodistrian University of Athens. Aposunjèseic sfairik¸n tom¸n kai σύνοla kuriarqÐac se epÐpeda γραφήματa Miχάλης Σάμαρης A.M. 201314 Τριμελής Epiτροπή: Δημήτρioc M. Jhlυκός, Epiblèpwn: Kajhγητής, Tm. Majhmatik¸n, E.K.P.A. Δημήτρioc M. Jhlυκός, Staύρoc G. Kolliόποuloc, Kajhγητής tou Τμήμatoc Anaπληρωτής Kajhγητής, Tm. Plhroforiκής Majhmatik¸n tou PanepisthmÐou kai Thl/ni¸n, E.K.P.A. Ajhn¸n Leutèrhc M. Kuroύσης, white Kajhγητής, Tm. Majhmatik¸n, E.K.P.A. PerÐlhyh 'Ena σημαντικό apotèlesma sth JewrÐa Γραφημάτwn apoteleÐ h apόdeixh thc eikasÐac tou Wagner από touc Neil Robertson kai Paul D. Seymour. sth σειρά ergasi¸n ‘Ελλάσσοna Γραφήματα’ apo to 1983 e¸c to 2011. H eikasÐa αυτή lèei όti sthn κλάση twn γραφημάtwn den υπάρχει άπειρη antialusÐda ¸c proc th sqèsh twn ελλασόnwn γραφημάτwn. H JewrÐa pou αναπτύχθηκε gia thn απόδειξη αυτής thc eikasÐac eÐqe kai èqei ακόμα σημαντικό antÐktupo tόσο sthn δομική όσο kai sthn algoriθμική JewrÐa Γραφημάτwn, άλλα kai se άλλα pedÐa όπως h Παραμετρική Poλυπλοκόthta. Sta πλάιsia thc απόδειξης oi suggrafeÐc eiσήγαγαν kai nèec paramètrouc πλά- touc. Se autèc ήτan h κλαδοαποσύνθεση kai to κλαδοπλάτoc ενός γραφήματoc. H παράμετρος αυτή χρησιμοποιήθηκε idiaÐtera sto σχεδιασμό algorÐjmwn kai sthn χρήση thc τεχνικής ‘διαίρει kai basÐleue’.
    [Show full text]
  • Modeling Multiple Relationships in Social Networks
    Asim AnsAri, Oded KOenigsberg, and FlOriAn stAhl * Firms are increasingly seeking to harness the potential of social networks for marketing purposes. therefore, marketers are interested in understanding the antecedents and consequences of relationship formation within networks and in predicting interactivity among users. the authors develop an integrated statistical framework for simultaneously modeling the connectivity structure of multiple relationships of different types on a common set of actors. their modeling approach incorporates several distinct facets to capture both the determinants of relationships and the structural characteristics of multiplex and sequential networks. they develop hierarchical bayesian methods for estimation and illustrate their model with two applications: the first application uses a sequential network of communications among managers involved in new product development activities, and the second uses an online collaborative social network of musicians. the authors’ applications demonstrate the benefits of modeling multiple relations jointly for both substantive and predictive purposes. they also illustrate how information in one relationship can be leveraged to predict connectivity in another relation. Keywords : social networks, online networks, bayesian, multiple relationships, sequential relationships modeling multiple relationships in social networks The rapid growth of online social networks has led to a social commerce (Stephen and Toubia 2010; Van den Bulte resurgence of interest in the marketing
    [Show full text]
  • Graph Algorithms in Bioinformatics an Introduction to Bioinformatics Algorithms Outline
    An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Graph Algorithms in Bioinformatics An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Outline 1. Introduction to Graph Theory 2. The Hamiltonian & Eulerian Cycle Problems 3. Basic Biological Applications of Graph Theory 4. DNA Sequencing 5. Shortest Superstring & Traveling Salesman Problems 6. Sequencing by Hybridization 7. Fragment Assembly & Repeats in DNA 8. Fragment Assembly Algorithms An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Section 1: Introduction to Graph Theory An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Knight Tours • Knight Tour Problem: Given an 8 x 8 chessboard, is it possible to find a path for a knight that visits every square exactly once and returns to its starting square? • Note: In chess, a knight may move only by jumping two spaces in one direction, followed by a jump one space in a perpendicular direction. http://www.chess-poster.com/english/laws_of_chess.htm An Introduction to Bioinformatics Algorithms www.bioalgorithms.info 9th Century: Knight Tours Discovered An Introduction to Bioinformatics Algorithms www.bioalgorithms.info 18th Century: N x N Knight Tour Problem • 1759: Berlin Academy of Sciences proposes a 4000 francs prize for the solution of the more general problem of finding a knight tour on an N x N chessboard. • 1766: The problem is solved by Leonhard Euler (pronounced “Oiler”). • The prize was never awarded since Euler was Director of Mathematics at Berlin Academy and was deemed ineligible. Leonhard Euler http://commons.wikimedia.org/wiki/File:Leonhard_Euler_by_Handmann.png An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Introduction to Graph Theory • A graph is a collection (V, E) of two sets: • V is simply a set of objects, which we call the vertices of G.
    [Show full text]
  • Graph Theory Approach to the Vulnerability of Transportation Networks
    algorithms Article Graph Theory Approach to the Vulnerability of Transportation Networks Sambor Guze Department of Mathematics, Gdynia Maritime University, 81-225 Gdynia, Poland; [email protected]; Tel.: +48-608-034-109 Received: 24 November 2019; Accepted: 10 December 2019; Published: 12 December 2019 Abstract: Nowadays, transport is the basis for the functioning of national, continental, and global economies. Thus, many governments recognize it as a critical element in ensuring the daily existence of societies in their countries. Those responsible for the proper operation of the transport sector must have the right tools to model, analyze, and optimize its elements. One of the most critical problems is the need to prevent bottlenecks in transport networks. Thus, the main aim of the article was to define the parameters characterizing the transportation network vulnerability and select algorithms to support their search. The parameters proposed are based on characteristics related to domination in graph theory. The domination, edge-domination concepts, and related topics, such as bondage-connected and weighted bondage-connected numbers, were applied as the tools for searching and identifying the bottlenecks in transportation networks. Furthermore, the algorithms for finding the minimal dominating set and minimal (maximal) weighted dominating sets are proposed. This way, the exemplary academic transportation network was analyzed in two cases: stationary and dynamic. Some conclusions are presented. The main one is the fact that the methods given in this article are universal and applicable to both small and large-scale networks. Moreover, the approach can support the dynamic analysis of bottlenecks in transport networks. Keywords: vulnerability; domination; edge-domination; transportation networks; bondage-connected number; weighted bondage-connected number 1.
    [Show full text]
  • Graph Theory: Network Flow
    University of Washington Math 336 Term Paper Graph Theory: Network Flow Author: Adviser: Elliott Brossard Dr. James Morrow 3 June 2010 Contents 1 Introduction ...................................... 2 2 Terminology ...................................... 2 3 Shortest Path Problem ............................... 3 3.1 Dijkstra’sAlgorithm .............................. 4 3.2 ExampleUsingDijkstra’sAlgorithm . ... 5 3.3 TheCorrectnessofDijkstra’sAlgorithm . ...... 7 3.3.1 Lemma(TriangleInequalityforGraphs) . .... 8 3.3.2 Lemma(Upper-BoundProperty) . 8 3.3.3 Lemma................................... 8 3.3.4 Lemma................................... 9 3.3.5 Lemma(ConvergenceProperty) . 9 3.3.6 Theorem (Correctness of Dijkstra’s Algorithm) . ....... 9 4 Maximum Flow Problem .............................. 10 4.1 Terminology.................................... 10 4.2 StatementoftheMaximumFlowProblem . ... 12 4.3 Ford-FulkersonAlgorithm . .. 12 4.4 Example Using the Ford-Fulkerson Algorithm . ..... 13 4.5 The Correctness of the Ford-Fulkerson Algorithm . ........ 16 4.5.1 Lemma................................... 16 4.5.2 Lemma................................... 16 4.5.3 Lemma................................... 17 4.5.4 Lemma................................... 18 4.5.5 Lemma................................... 18 4.5.6 Lemma................................... 18 4.5.7 Theorem(Max-FlowMin-CutTheorem) . 18 5 Conclusion ....................................... 19 1 1 Introduction An important study in the field of computer science is the analysis of networks. Internet service providers (ISPs), cell-phone companies, search engines, e-commerce sites, and a va- riety of other businesses receive, process, store, and transmit gigabytes, terabytes, or even petabytes of data each day. When a user initiates a connection to one of these services, he sends data across a wired or wireless network to a router, modem, server, cell tower, or perhaps some other device that in turn forwards the information to another router, modem, etc. and so forth until it reaches its destination.
    [Show full text]