Eindhoven University of Technology BACHELOR the Chinese Postman Problem in Undirected and Directed Graphs Verberk, Lucy P.A
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Math 400 Paper 2 Matthew Dreher Graph Theory Matching: Start with We Need to Talk About What Is Graph Theory and the Part of It
Math 400 paper 2 Matthew dreher Graph theory matching: Start with we need to talk about what is graph theory and the part of it that are conserved with matchings. Graph theory is the study of graphs, which are mathematical structures that are made up of points called vertices or node which can be connected by edges or lines trams chose of term is normal determined by if graph is undirected or not for my purposes I will only talk about undirected mean I will only use the terms vertex and edges. A vertex is adjacent if there exist a shared edge between the vertices, There is a couple of types graph of interests a one being the a connected graph which means that between any two vertices there exists a walk a sequence of adjacent vertices from vertex (A) to vertex (B) or path which is a walk with no repeated vertices in the walk, if there exist a walk then there exist a path the reverse is also true. Regular and complete and cycles, a graph is regular if each vertex’s has the same number of degree (same number of edges) denoted by i-regular where i is the degree of each vertices, cycles graph is a special type 2-regular where it connected and therefore has a path from vertex (A) to (A), and complete graph which is a regular graph with is (n-1)-regular where n is the number vertices in the graph commonly denoted by ki where I is the number of vertices in the graph this is also the maxim number of edges for a simple graph. -
Dynamic Matching Algorithms in Practice
Dynamic Matching Algorithms in Practice Monika Henzinger University of Vienna, Faculty of Computer Science, Austria [email protected] Shahbaz Khan Department of Computer Science, University of Helsinki, Finland shahbaz.khan@helsinki.fi Richard Paul University of Vienna, Faculty of Computer Science, Austria [email protected] Christian Schulz University of Vienna, Faculty of Computer Science, Austria [email protected] Abstract In recent years, significant advances have been made in the design and analysis of fully dynamic maximal matching algorithms. However, these theoretical results have received very little attention from the practical perspective. Few of the algorithms are implemented and tested on real datasets, and their practical potential is far from understood. In this paper, we attempt to bridge the gap between theory and practice that is currently observed for the fully dynamic maximal matching problem. We engineer several algorithms and empirically study those algorithms on an extensive set of dynamic instances. 2012 ACM Subject Classification Mathematics of computing → Graph algorithms Keywords and phrases Matching, Dynamic Matching, Blossom Algorithm Digital Object Identifier 10.4230/LIPIcs.ESA.2020.58 Supplementary Material Source code and instances are available at https://github.com/ schulzchristian/DynMatch. Funding The research leading to these results has received funding from the European Research Council under the European Community’s Seventh Framework Programme (FP7/2007-2013) /ERC grant agreement No. 340506. 1 Introduction The matching problem is one of the most prominently studied combinatorial graph problems having a variety of practical applications. A matching M of a graph G = (V, E) is a subset of edges such that no two elements of M have a common end point. -
Lecture 3: July 31 3.1 Gallai Edmonds Decomposition
CSL851: Algorithmic Graph Theory Fall 2013 Lecture 3: July 31 Lecturer: Naveen Garg Scribes: Khaleeque Ansari* Note: LaTeX template courtesy of UC Berkeley EECS dept. Disclaimer: These notes have not been subjected to the usual scrutiny reserved for formal publications. They may be distributed outside this class only with the permission of the Instructor. (*Based on notes by Douglas B. West) Last Lecture: • Finding a matching in a General Graph ( Blossom Algorithm) • Tuttes Theorem: A graph G = (V; E) has a perfect matching if and only if for every subset U of V , the subgraph induced by V − U has at most jUj connected components with an odd number of vertices. 3.1 Gallai Edmonds Decomposition In a graph G, let B be the set of vertices covered by every maximum matching in G, and let D = V (G) − B. Further partition B by letting A be the subset consisting of vertices with at least one neighbor outside B, and let C = B −A. The Gallai-Edmonds Decomposition of G is the partition of V (G) into the three sets A; C; D. 3-1 3-2 Lecture 3: July 31 Figure 3.1: The Gallai-Edmonds Decomposition of G Theorem 3.1 (Gallai-Edmonds Structure Theorem) Let A,C,D be the sets in the Gallai Edmonds Decom- position of a graph G. Let G1,...,Gk be the components of G[D]. If M is a maximum matching in G, then the following properties hold. a) Every vertex in C is matched. b) Every vertex in A is matched to distinct components in G[D]. -
Clique Generalizations and Related Problems by Cynthia Ivette Wood
RICE UNIVERSITY Clique Generalizations and Related Problems by Cynthia Ivette Wood A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE Doctor of Philosophy APPROVED, THESIS COMMITTEE: Illya V. · s, Chair Professo · of Computational and Applied Mathematics Swarat Chaudhuri Associate Professor of Computer Science Andrew J. Schaefer Noah Harding Chair Professor of Computational and Applied Mathematics Yin Zhang Professor of Computational and Applied Mathematics Houston, Texas November, 2015 ABSTRACT Clique Generalizations and Related Problems by Cynthia Ivette Wood A large number of real-world problems can be model as optimization problems in graphs. The clique model was introduced to aid the study of network structure for social interaction. Each vertex represented an actor and the edges represented the relations between them. Nevertheless, the model has been shown to be restrictive for modeling real-world problems, since it leaves out subgraphs that do not have all pos- sible edges. As a consequence, clique generalizations were introduced to overcome the disadvantages of the clique model. In this thesis, I present three computationally dif- ficult combinatorial optimization problems related to clique generalization problems: co-2-plexes and k-cores. A k-core is a subgraph with minimum degree greater than or equal to k. In this work, I discuss the minimal k-core problem and the minimum k-core problem. I present a backtracking algorithm to find all minimal k-cores of a given undirected graph and its applications to the study of associative memory. The proposed method is a modification of the Bron and Kerbosch algorithm for finding all cliques of an undirected graph. -
Delivery Optimization in Logistics Using Advanced Analytics and Interactive Visualization*
Proceedings_____________________________________________________________________________________________________ of the Central European Conference on Information and Intelligent Systems 35 Delivery Optimization in Logistics Using Advanced Analytics and Interactive Visualization* Leo Mršić Algebra University College Zagreb, Croatia [email protected] Abstract. Paper is based on research and PoC with called a Eulerian Cycle. Finding such a cycle is more goal to unlock business value in delivery optimization, “feasible” and can be used efficiently to create business using advanced analytics and interactive visualization. value. This problem was first solved Mei-Ko Kuan, a There are several common approaches including Chinese mathematician, in 1962 [Kuan, 1962]. He was travelling salesman problem (TSP) that has various first one who consider this problem from the practical applications even in its purest formulation, such as perspective of a postman picking up mail at the post planning or logistics. Knowledge base powered by office, delivering it along a set of streets, and returning large data set is described through development and to the post office. Since he must follow route at least final, interactive, form. Using common principles, once, the problem is referred to as "Chinese" postman paper describe business value that can be extracted problem to investigate how to cover every street along using advanced analytics and interactive visualization, path and return to the post office under the least cost. how to structure steps as best practice to achieve In practice, there are a lot of applications of this success and what additional benefits can be expected technique such as road maintenance, waste collection, by supporting this approach. As part of research, bus scheduling etc. -
Theory of Graph Traversal Edit Distance, Extensions, and Applications
THESIS THEORY OF GRAPH TRAVERSAL EDIT DISTANCE, EXTENSIONS, AND APPLICATIONS Submitted by Ali Ebrahimpour Boroojeny Department of Computer Science In partial fulfillment of the requirements For the Degree of Master of Science Colorado State University Fort Collins, Colorado Spring 2019 Master’s Committee: Advisor: Hamidreza Chitsaz Asa Ben-Hur Zaid Abdo Copyright by Ali Ebrahimpour Boroojeny 2019 All Rights Reserved ABSTRACT THEORY OF GRAPH TRAVERSAL EDIT DISTANCE, EXTENSIONS, AND APPLICATIONS Many problems in applied machine learning deal with graphs (also called networks), including social networks, security, web data mining, protein function prediction, and genome informatics. The kernel paradigm beautifully decouples the learning algorithm from the underlying geometric space, which renders graph kernels important for the aforementioned applications. In this paper, we give a new graph kernel which we call graph traversal edit distance (GTED). We introduce the GTED problem and give the first polynomial time algorithm for it. Informally, the graph traversal edit distance is the minimum edit distance between two strings formed by the edge labels of respective Eulerian traversals of the two graphs. Also, GTED is motivated by and provides the first mathematical formalism for sequence co-assembly and de novo variation detection in bioinformatics. We demonstrate that GTED admits a polynomial time algorithm using a linear program in the graph product space that is guaranteed to yield an integer solution. To the best of our knowledge, this is the first approach to this problem. We also give a linear programming relaxation algorithm for a lower bound on GTED. We use GTED as a graph kernel and evaluate it by computing the accuracy of an SVM classifier on a few datasets in the literature. -
Matching Algorithms (Hungarian Method + Blossom Algorithm)
Matching algorithms (Hungarian method + blossom algorithm) Graph theory University of Szeged Szeged, 2019. Lec. 5 Hungarian method 1/11 O r1 r2 r3 r4 r5 r6 r7 r8 HUNGARIAN METHOD INPUT: A bipartite graph G (with color classes A and B) and a matching M in G which does not cover A. OUTPUT: An augmenting path for M, or „M is of maximum size”. Lec. 5 Hungarian method 1/11 O r1 r2 r3 r4 r5 r6 r7 r8 Sketch of the algorithm: Starting from the unmatched points of A (as roots), build a forest from the alternating paths of G. The forest is constructed by a „greedy method”, which will be discussed on the next slide. We define two sets of vertices, the sets of inner and outer vertices, I and O. Initially, O := fr1; : : : ; r8g and I := ;. Lec. 5 Details of the Hungarian method (Greedy expansion step) 2/11 I O r1 r2 r3 r4 r5 r6 r7 r8 Greedy expansion step: If some outer vertex u is adjacent to some matched vertex v outside the forest, then add v to the forest, together with its pair v0 in M (and edges uv and vv0). v is designated as inner vertex, v0 is designated as outer vertex. Lec. 5 Details of the Hungarian method (Greedy expansion step) 2/11 I O r1 r2 r3 r4 r5 r6 r7 r8 Greedy expansion step: If some outer vertex u is adjacent to some matched vertex v outside the forest, then add v to the forest, together with its pair v0 in M (and edges uv and vv0). -
A Combinatoric Interpretation of Dual Variables for Weighted Matching Problems
A Combinatoric Interpretation of Dual Variables for Weighted Matching Problems Harold N. Gabow ∗ March 2, 2012 Abstract We consider four weighted matching-type problems: the bipartite graph and general graph versions of matching and f-factors. The linear program duals for these problems are shown to be weights of certain subgraphs. Specifically the so-called y duals are the weights of certain maximum matchings or f-factors; z duals (used for general graphs) are the weights of certain 2-factors or 2f-factors. The y duals are canonical in a well-defined sense; z duals are canonical for matching and more generally for b-matchings (a special case of f-factors) but for f-factors their support can vary. As weights of combinatorial objects the duals are integral for given integral edge weights, and so they give new proofs that the linear programs for these problems are TDI. 1 Introduction The weighted versions of combinatorial problems, e.g., weighted bipartite matching, minimum cost network flow, are usually studied by introducing linear programming duals to ideas developed in the cardinality version of the problem (e.g., augmenting paths for many problems [7]; blossoms in [5] and [4] for matching, etc.), This paper takes a closer look at the combinatorics of the weighted problems without reference to the unweighted cardinality version. We present combinatoric interpretations of the linear programming duals, that are in some sense canonical. These duals give simple proofs of classic minimax theorems for cardinality problems. The results are easily summarized. We study weighted versions of bipartite and general graph matching, and bipartite and general graph f-factors and b-matchings. -
Everystreet Algorithm
#everystreet algorithm Matej Kerekrety [email protected] www.everystreetchallenge.com August 26, 2020 Abstract A simple application of Chinese postman problem on #everystreet run- ning challenge, where a runner attempts to visit every street of given area at least once. In order to run the challenge optimally and avoid unnec- essary detours and running same street twice (or more often) we used an algorithm based on maximal matching which gives us an induced eulerian multigraph where optimal Euler route exists. Keywords: graph theory, Chinese Postman Problem, maximal matching, every street challenge, running 1 Motivation Over the COVID-19 lockdown many runners and cyclist found themselves cap- tured within their cities. Some of them ended up running or spinning endless hours on virtual races such as Zwift, but some as e.g. Mark Beaumont [1] de- cided to join #everystreet challenge. Every street is a challenge originated by Rickey Gates [2, 3] who run every single street in city of San Francisco in fall 2018 which took him 46 days and run 1,303 miles. Inspired by Mark Beaumont who did this challenge over the lockdown in Edinburgh, place where I spend the lockdown, and literally everybody else who managed to accomplish this challenge.1 We tried to find a algorithm finding an optimal route for given street network area starting and ending in the same point. 2 Every street challenge Rules of every street challenge are run or cycle2 every single street of given (metropolitan) area which is usually a city or a neighborhood. Till this point 1I would have never had the patience and motivation to run that much in the city. -
Online Assessment of Graph Theory
ONLINE ASSESSMENT OF GRAPH THEORY A thesis submitted for the degree of Doctor of Philosophy By Justin Dale Hatt College of Engineering, Design and Physical Sciences Brunel University August 2016 Abstract The objective of this thesis is to establish whether or not online, objective questions in elementary graph theory can be written in a way that exploits the medium of computer-aided assessment. This required the identification and resolution of question design and programming issues. The resulting questions were trialled to give an extensive set of answer files which were analysed to identify whether computer delivery affected the questions in any adverse ways and, if so, to identify practical ways round these issues. A library of questions spanning commonly-taught topics in elementary graph theory has been designed, programmed and added to the graph theory topic within an online assessment and learning tool used at Brunel University called Mathletics. Distracters coded into the questions are based on errors students are likely to make, partially evidenced by final examination scripts. Questions were provided to students in Discrete Mathematics modules with an extensive collection of results compiled for analysis. Questions designed for use in practice environments were trialled on students from 2007 – 2008 and then from 2008 to 2014 inclusive under separate testing conditions. Particular focus is made on the relationship of facility and discrimination between comparable questions during this period. Data is grouped between topic and also year group for the 2008 – 2014 tests, namely 2008 to 2011 and 2011 to 2014, so that it may then be determined what factors, if any, had an effect on the overall results for these questions. -
Introduction to Graph Theory
DRAFT Introduction to Graph Theory A short course in graph theory at UCSD February 18, 2020 Jacques Verstraete Department of Mathematics University of California at San Diego California, U.S.A. [email protected] Contents Annotation marks5 1 Introduction to Graph Theory6 1.1 Examples of graphs . .6 1.2 Graphs in practice* . .9 1.3 Basic classes of graphs . 15 1.4 Degrees and neighbourhoods . 17 1.5 The handshaking lemmaDRAFT . 17 1.6 Digraphs and networks . 19 1.7 Subgraphs . 20 1.8 Exercises . 22 2 Eulerian and Hamiltonian graphs 26 2.1 Walks . 26 2.2 Connected graphs . 27 2.3 Eulerian graphs . 27 2.4 Eulerian digraphs and de Bruijn sequences . 29 2.5 Hamiltonian graphs . 31 2.6 Postman and Travelling Salesman Problems . 33 2.7 Uniquely Hamiltonian graphs* . 34 2.8 Exercises . 35 2 3 Bridges, Trees and Algorithms 41 3.1 Bridges and trees . 41 3.2 Breadth-first search . 42 3.3 Characterizing bipartite graphs . 45 3.4 Depth-first search . 45 3.5 Prim's and Kruskal's Algorithms . 46 3.6 Dijkstra's Algorithm . 47 3.7 Exercises . 50 4 Structure of connected graphs 52 4.1 Block decomposition* . 52 4.2 Structure of blocks : ear decomposition* . 54 4.3 Decomposing bridgeless graphs* . 57 4.4 Contractible edges* . 58 4.5 Menger's Theorems . 58 4.6 Fan Lemma and Dirac's Theorem* . 61 4.7 Vertex and edge connectivity . 63 4.8 Exercises . 64 5 Matchings and Factors 67 5.1 Independent sets and covers . 67 5.2 Hall's Theorem . -
D1 Route Inspection.Rtf
D1 Route inspection PhysicsAndMathsTutor.com 1. (a) Explain why a network cannot have an odd number of vertices of odd degree. (2) The figure above shows a network of paths in a public park. The number on each arc represents the length of that path in metres. Hamish needs to walk along each path at least once to check the paths for frost damage starting and finishing at A. He wishes to minimise the total distance he walks. (b) Use the route inspection algorithm to find which paths, if any, need to be traversed twice. (4) (c) Find the length of Hamish’s route. [The total weight of the network in Figure 4 is 4180m.] (1) (Total 7 marks) Edexcel Internal Review 1 D1 Route inspection PhysicsAndMathsTutor.com 2. [The total weight of the network is 73.3 km] The diagram above models a network of tunnels that have to be inspected. The number on each arc represents the length, in km, of that tunnel. Malcolm needs to travel through each tunnel at least once and wishes to minimise the length of his inspection route. He must start and finish at A. (a) Use the route inspection algorithm to find the tunnels that will need to be traversed twice. You should make your method and working clear. (5) (b) Find a route of minimum length, starting and finishing at A. State the length of your route. (3) Edexcel Internal Review 2 D1 Route inspection PhysicsAndMathsTutor.com A new tunnel, CG, is under construction. It will be 10 km long. Malcolm will have to include the new tunnel in his inspection route.