Automata and Graph Compression

Total Page:16

File Type:pdf, Size:1020Kb

Automata and Graph Compression Automata and Graph Compression Mehryar Mohri Michael Riley Ananda Theertha Suresh Courant Institute and Google Research Google Research UCSD [email protected] [email protected] [email protected] Abstract—We present a theoretical framework for the compres- attention. Here, we precisely study the problem of structured sion of automata, which are widely used representations in speech data compression. Motivated by the examples just mentioned, processing, natural language processing and many other tasks. As we focus on the problem of automata compression and, as a a corollary, our framework further covers graph compression. We introduce a probabilistic process of graph and automata generation corollary, graph compression. that is similar to stationary ergodic processes and that covers An empirical study of web graph compression was given real-world phenomena. We also introduce a universal compression by [5], [6], [14]. A theoretical study of the problem was first scheme LZA for this probabilistic model and show that LZA presented by [1] who proposed a scheme using a minimum significantly outperforms other compression techniques such as gzip spanning tree to find similar nodes to compress. However, the and the UNIX compress command for several synthetic and real data sets. authors showed that many generalizations of their problem are Index Terms—Lempel-Ziv, universal compression, graphs NP-hard. Motivated by probabilistic models, [8], [9] later showed that arithmetic coding can be used to nearly optimally compress I. INTRODUCTION (the structure of) graphs generated by the Erdos-R˝ enyi´ model. Massive amounts of data are generated and processed by An empirical study of automata compression has been pre- modern search engines and popular online sites, which have sented by several authors in the past, including [11], [12]. been reported to be in the order of hundreds of petabytes. At However, we are not aware of any theoretical work focused a different level, sophisticated models are commonly stored on on automata compression. Our objective is three-fold: (i) pro- mobile devices for tasks such as speech-to-text conversion. Thus, pose a probabilistic model for automata that captures real- efficient storage and compression algorithms are needed both at world phenomena; (ii) provide a provably universal compression the data warehouse level (petabytes of data) and at a device algorithm; and (iii), show experimentally that the algorithm fares level (megabytes of data). Memory and storage constraints for well compared to techniques such as gzip and compress. Note the latter, as well as the communication costs of downloading that the probabilistic model we introduce can be viewed as a complex models, further motivate the need for effective com- generalization of Erdos-R˝ enyi´ graphs [4]. pression algorithms. The rest of the paper is organized as follows: in Section II, we Most existing compression techniques were designed for se- briefly describe finite automata and some of their key properties. quential data. They include Huffman coding and arithmetic In Section III, we describe our probabilistic model and show that coding, which are optimal compression schemes for sequences of it helps cover many real-world applications. In Section IV, we de- symbols distributed i.i.d. according to some unknown distribution scribe our proposed algorithm, LZA, and prove its optimality. In [10], or the Lempel-Ziv schemes, which are asymptotically opti- Section V, we further demonstrate our algorithm’s effectiveness mal for stationary ergodic processes [15], [20], or various combi- in terms of its degree of compression. Due to space constraints, nations of these schemes, such as the UNIX command compress, all the proofs are deferred to an extended version of the paper. an efficient implementation of Lempel-Ziv-Walsh (LZW) and gzip, a combination of Lempel-Ziv-77 (LZ77) and Huffman II. DIRECTED GRAPHS AND FINITE AUTOMATA coding. A finite automaton A is a 5-tuple (Q; Σ; δ; qI ;F ) where Q = However, much of the modern data processed at the data f1; 2; : : : ; ng is a finite set of states, Σ = f1; 2; : : : ; mg a finite ∗ warehouse or mobile device levels admits further structure: it alphabet, δ : Q × Σ ! Q the transition function, qI 2 Q an may represent segments of a very large graph such as the web initial state, and F ⊆ Q the set of final states. Thus, δ(q; a) graph or a social network, or include very large finite automata denotes the set of states reachable from state q via transitions or finite-state transducers such as those widely used in speech labeled with a 2 Σ. If there is no transition by label a, then recognition or in a variety of other language processing tasks δ(q; a) = ;. We denote by E ⊆ Q × Σ × Q the set of all such as machine translation, information extraction, and tagging transitions (q; a; q0) and by E[q] the set of all transitions from [17]. These data sets are typically very large. Web graphs contain state q. With the automata notation just introduced, a directed tens of billions of nodes (web pages). In speech processing, a graph can be defined as a pair (Q; δ) where Q = f1; 2; 3; : : : ; ng large-alphabet language model may have billions of word edges. is a finite set of nodes and δ : Q ! Q∗ a finite set of edges These examples and applications strongly motivate the need for where, for any node q, δ(q) denotes the set of nodes connected structured data compression in practice. to q. But, how can we exploit this structure to devise better com- An example of an automaton is given in Figure 1(a). State pression algorithms? Can we improve upon the straightforward 0 in this simple example is the initial state (depicted with the serialization of that data followed by the subsequent application bold circle) and state 1 is the final state (depicted with double of an existing sequence compression algorithm? Surprisingly, the circle). The strings 12 and 222 are among those accepted by this problem of compressing such structured data has received little automaton. By using symbolic labels on this automaton in place 1 2 push coin 1:2/.75 2:1/.5 2 coin 2:3/.25 0 1 locked unlocked 0 1/.25 1 push 1:1/.25 (a) (b) (c) Fig. 1: (a) An example automaton; (b) a subway turnstile automaton; (c) an example weighted transducer. of the usual integers, as depicted in Figure 1(b), we can interpret 2) Probabilistic processes on automata: Before deriving mod- this automaton as the operation of a subway turnstile. It has two els for automata generation, we first discuss an invariance states locked and unlocked and actions (alphabet) coin and push. property of automata that is useful in practice. The set of If the turnstile is in the locked state and you push, it remains strings accepted by an automaton and the time and space of locked and if you insert a coin, it becomes unlocked. If it is its use are not affected by the state numbering. Two automata unlocked and you insert a coin it remains unlocked, but if you are isomorphic if they coincide modulo a renumbering of the 0 0 0 0 push once it becomes locked. states. Thus, automata (Q; Σ; δ; qI ;F ) and (Q ; Σ; δ ; qI ;F ) are Note that directed graphs form a subset of automata with isomorphic, if there is a one-to-one mapping f : Q ! Q0 such Σ = f1g. Thus, in what follows, we can focus on automata that f(δ(q; a)) = δ0(f(q); a), for all q 2 Q and a 2 Σ, 0 0 compression. Furthermore, to be consistent with the existing f(qI ) = qI , and f(F ) = F , where f(F ) = ff(q): q 2 F g. automata literature, we use states to refer to nodes and transitions Under stationary ergodic processes, two sequences with the to refer to edges in both graphs and automata going forward. same order of observed symbols have the same probabilities. Some key applications motivating the study of automata are Similarly we wish to construct a probabilistic model of automata speech and natural language processing. In these applications, it such that any two isomorphic automata have the same probabil- is often useful to augment transitions with both an output label ities. For example, the probabilities of automata in Figure 2 are and some real-valued weight. The resulting devices, weighted the same. finite-state transducers (FSTs), are extensively used in these There are several probabilistic models of automata and graphs fields [2], [17], [18]. An example of an FST is given in that satisfy this property. Perhaps the most studied random model Figure 1(c). The string 12 is among those accepted by this is the Erdos-R˝ enyi´ model G(n; p), where each state is connected transducer. For this input, the transducer outputs the string 23 and to every other state independently with probability p [4]. Note has weight :046875 (transitions weights 0:75 times 0:25 times that if two automata are isomorphic then the Erdos-R˝ enyi´ model final weight 0:25). assigns them the same probability. The Erdos-R˝ enyi´ model is We propose an algorithm for unweighted automata compres- analogous to i.i.d. sampling on sequences. We wish to generalize sion. For FSTs, we use the same algorithm by treating the input- the Erdos-R˝ enyi´ model to more realistic models of automata. output label pair as a single label. If the automaton is weighted, Since the automata model should not depend on the state we just add the weights at the end of the compressed file by numbering, it could only depend on the set of incoming or using some standard representation.
Recommended publications
  • Genetic Databases
    Stefano Lonardi March, 2000 Compression of Biological Sequences by Greedy Off-line Textual Substitution Alberto Apostolico Stefano Lonardi Purdue University Università di Padova Genetic Databases § Massive § Growing exponentially Example: GenBank contains approximately 4,654,000,000 bases in 5,355,000 sequence records as of December 1999 Data Compression Conference 2000 1 Stefano Lonardi March, 2000 DNA Sequence Records Composed by annotations (in English) and DNA bases (on the alphabet {A,C,G,T,U,M,R,W,S,Y,K,V,H,D,B,X,N}) >RTS2 RTS2 upstream sequence, from -200 to -1 TCTGTTATAGTACATATTATAGTACACCAATGTAAATCTGGTCCGGGTTACACAACACTT TGTCCTGTACTTTGAAAACTGGAAAAACTCCGCTAGTTGAAATTAATATCAAATGGAAAA GTCAGTATCATCATTCTTTTCTTGACAAGTCCTAAAAAGAGCGAAAACACAGGGTTGTTT GATTGTAGAAAATCACAGCG >MEK1 MEK1 upstream sequence, from -200 to -1 TTCCAATCATAAAGCATACCGTGGTYATTTAGCCGGGGAAAAGAAGAATGATGGCGGCTA AATTTCGGCGGCTATTTCATTCATTCAAGTATAAAAGGGAGAGGTTTGACTAATTTTTTA CTTGAGCTCCTTCTGGAGTGCTCTTGTACGTTTCAAATTTTATTAAGGACCAAATATACA ACAGAAAGAAGAAGAGCGGA >NDJ1 NDJ1 upstream sequence, from -200 to -1 ATAAAATCACTAAGACTAGCAACCACGTTTTGTTTTGTAGTTGAGAGTAATAGTTACAAA TGGAAGATATATATCCGTTTCGTACTCAGTGACGTACCGGGCGTAGAAGTTGGGCGGCTA TTTGACAGATATATCAAAAATATTGTCATGAACTATACCATATACAACTTAGGATAAAA ATACAGGTAGAAAAACTATA Problem Textual compression of DNA data is difficult, i.e., “standard” methods do not seem to exploit the redundancies (if any) inherent to DNA sequences cfr. C.Nevill-Manning, I.H.Witten, “Protein is incompressible”, DCC99 Data Compression Conference 2000 2 Stefano Lonardi March, 2000
    [Show full text]
  • ARC-LEAP User Instructions for The
    ARC-LEAP User Instructions Appalachian Regional Commission Local Economic Assessment Package prepared for the Appalachian Regional Commission prepared by Economic Development Research Group, Inc. Glen Weisbrod Teresa Lynch Margaret Collins January, 2004 ARC-LEAP User Instructions Appalachian Regional Commission Local Economic Assessment Package prepared for the Appalachian Regional Commission prepared by Economic Development Research Group, Inc. 2 Oliver Street, 9th Floor, Boston, MA 02109 Telephone 617.338.6775 Fax 617.338.1174 e-mail [email protected] Website www.edrgroup.com January, 2004 ARC-LEAP User Instructions PREFACE LEAP is a software tool that was designed and developed by Economic Development Research Group, Inc. (www.edrgroup.com) to assist practitioners in evaluating local economic development needs and opportunities. ARC-LEAP is a version of this tool developed specifically for the Appalachian Regional Commission (ARC) and it’s Local Development Districts (LDDs). Development of this user guide was funded by ARC as a companion to the ARC-LEAP analysis system. This document presents user instructions and technical documentation for ARC-LEAP. It is organized into three parts: I. overview of the ARC-LEAP tool II. instructions for users to obtain input information and run the analysis model III. interpretation of output tables . A separate Handbook document provides more detailed discussion of the economic development assessment process, including analysis of local economic performance, diagnosis of local strengths and weaknesses, and application of business opportunity information for developing an economic development strategy. Economic Development Research Group i ARC-LEAP User Instructions I. OVERVIEW The ARC-LEAP model serves to three related purposes, each aimed at helping practitioners identify target industries for economic development.
    [Show full text]
  • Sequence Alignment/Map Format Specification
    Sequence Alignment/Map Format Specification The SAM/BAM Format Specification Working Group 3 Jun 2021 The master version of this document can be found at https://github.com/samtools/hts-specs. This printing is version 53752fa from that repository, last modified on the date shown above. 1 The SAM Format Specification SAM stands for Sequence Alignment/Map format. It is a TAB-delimited text format consisting of a header section, which is optional, and an alignment section. If present, the header must be prior to the alignments. Header lines start with `@', while alignment lines do not. Each alignment line has 11 mandatory fields for essential alignment information such as mapping position, and variable number of optional fields for flexible or aligner specific information. This specification is for version 1.6 of the SAM and BAM formats. Each SAM and BAMfilemay optionally specify the version being used via the @HD VN tag. For full version history see Appendix B. Unless explicitly specified elsewhere, all fields are encoded using 7-bit US-ASCII 1 in using the POSIX / C locale. Regular expressions listed use the POSIX / IEEE Std 1003.1 extended syntax. 1.1 An example Suppose we have the following alignment with bases in lowercase clipped from the alignment. Read r001/1 and r001/2 constitute a read pair; r003 is a chimeric read; r004 represents a split alignment. Coor 12345678901234 5678901234567890123456789012345 ref AGCATGTTAGATAA**GATAGCTGTGCTAGTAGGCAGTCAGCGCCAT +r001/1 TTAGATAAAGGATA*CTG +r002 aaaAGATAA*GGATA +r003 gcctaAGCTAA +r004 ATAGCT..............TCAGC -r003 ttagctTAGGC -r001/2 CAGCGGCAT The corresponding SAM format is:2 1Charset ANSI X3.4-1968 as defined in RFC1345.
    [Show full text]
  • Official Service Contractor for The2018 International Bluegrass Music Association
    International Bluegrass Musical Association OFFICIAL SERVICE September 26 - 29, 2018 CONTRACTOR Raleigh Convention Center Hall C Raleigh, NC Information and Order Forms Table of Contents General Information General Information................................................................2, 3 Payment Policy & Credit Card Authorization.........................4 Third Party Billing & Credit Card Charge Authorization..5,6 Color Chart for Drape, Table Skirts and Carpet...................7 Decorating Services Custom Booth Packages...........................................................8 Furnishing Rentals.......................................................................9 Mailing Address: Custom Signs and Graphics...................................................10 P. O. Box 49837 Greensboro, NC 27419 Labor Cleaning Service.........................................................................11 Street Address: Installation and Dismantle Labor............................................12 121 North Chimney Rock Road Exhibitor Appointed Contractor.........................................13,14 Greensboro, NC 27409 Material Handling Phone: (336) 315-5225 Material Handling General Information............................15,16 Fax: (336) 315-5220 Material Handling Rate Schedule and Order Form.......17,18 Shipping Labels........................................................................19 2 General 2 Information HOLLINS Exposition Services is pleased to have been selected as the Official Service Contractor for the2018 International
    [Show full text]
  • Galileo Formats
    Galileo Formats October 1998 edition Chapters INDEX Introduction Booking File Air Transportation Fares Cars Hotels LeisureShopper Document Production Queues Client File/TravelScreen Travel Information Miscellaneous SECURITY Sign On H/SON SON/Z217 or Sign on at own office SON/ followed by Z and a 1 to 3 character I.D.; the I.D. can be SON/ZHA initials, a number or a combination of both SON/ZGL4HA Sign on at branch agency SON/ followed by Z, own pseudo city code and a 1 to 3 character I.D. SON/Z7XX1/UMP Sign on at 4 character PCC branch agency SON/ followed by Z, own pseudo city code, second delimiter and 1 to 3 character I.D. SB Change to work area B SA/TA Change to work area A; different duty code TA (Training) SAI/ZHA Sign back into all work areas at own office SAI/ZGL4HA Sign back into all work areas at branch agency; SAI/ followed by Z, own pseudo city code and a 1 to 3 character I.D. Sign Off SAO Temporary sign out; incomplete Booking Files must be ignored or completed SOF Sign off; incomplete Booking Files must be ignored or completed SOF/ZHA Sign off override (at own office); incomplete transactions are not protected SOF/ZGL4HA Sign off override (at branch agency); incomplete transactions are not protected; SOF/ followed by Z, own pseudo city code and a 1 to 3 character I.D. SECURITY Security Profile STD/ZHA Display security profile, for sign on HA; once displayed, password may be changed SDA List security profiles created by user (second level authoriser and above) SDA/ZXXØ List security profiles associated with agency XXØ (second level authoriser and above) STD/ZXX1UMP or Display profile STD/ followed by Z, own pseudo city code, second delimiter if pseudo STD/Z7XX1/UMP city code is 4 characters and 1 to 3 character I.D.
    [Show full text]
  • Arc Welding Solutions from ESAB
    Arc Welding solutions from ESAB ESAB Welding & Cutting Products / esabna.com / 1.800.ESAB.123 A full line of arc welding equipment for every application, industry and environment. Arc Welding Equipment Table of Contents Description Page Description Page Process Description .....................................................2 Genuine Heliarc® Tig Torches Arc Welding Equipment Selection Guide ...................4 Heliarc Tig Torch Selection Guide ................................56 Compacts (power source with built-in wire feeder) Gas-Cooled Torches Caddy Mig C200i ............................................................6 HW-24 ...................................................................57 Migmaster™ 215 Pro/280 Pro .........................................8 HW-90 ...................................................................59 MIG, DC Power Sources, CV/CVCC HW-9 .....................................................................61 Aristo™ Mig U5000i .......................................................10 HW-17 ...................................................................63 Origo™ Mig 320/410 ......................................................12 HW-26 ...................................................................65 Origo Mig 4002c/6502c ................................................21 Water-Cooled Torches Wire Feeders - Semi-Automatic HW-20 ...................................................................67 MobileFeed™ 300AVS .....................................................15 HW-18 ...................................................................69
    [Show full text]
  • DICOM Compression 2002
    The Medicine Behind the Image DDIICCOOMM CCoommpprreessssiioonn 22000022 David Clunie Director of Technical Operations Princeton Radiology Pharmaceutical Research The Medicine SScchheemmeess SSuuppppoorrtteedd Behind the Image • RLE • JPEG - lossless and lossy • JPEG-LS - more efficient, fast lossless • JPEG 2000 - progressive, ROI encoding • Deflate (zip/gzip) - for non-image objects The Medicine IInn pprraaccttiiccee mmoossttllyy …… Behind the Image • Lossless JPEG for cardiac angio – multi-frame 512x512x8, 1024x1024x10 – CD-R and on network • Lossless JPEG for CT/MR – mostly on MOD media rather than over network – 256x256 to 1024x1024, 12-16 bits • RLE/lossless/lossy JPEG for Ultrasound – 640x480 single and multiframe 8 bits gray/RGB, text The Medicine BBuutt …… Behind the Image • JPEG lossless not the most effective • JPEG lossy limited to 12 bits unsigned • Undesirable JPEG blockiness • Perception that wavelets are better • Need for better progressive encoding • Need for region-of-interest encoding The Medicine JJPPEEGG LLoosssslleessss Behind the Image • Reasonable predictive scheme – Most often only previous pixel predictor used (SV1), which is not always the best choice • No run-length mode – No way to take advantage of large background areas • Huffman entropy coder – Slow (multi-pass) The Medicine LLoosssslleessss CCoommpprreessssiioonn Behind the Image CALIC Arithmetic 3.91 JPEG2000 VM4 5x3 3.81 JPEG-LS MINE 3.81 JPEG2000 VM4 3.66 2x10 S+P Arithmetic 3.4 JPEG-LS MINE - NO 3.31 Byte All RUN NASA szip 3.09 JPEG best 3.04 JPEG SV
    [Show full text]
  • On the Spectral Theorem of Langlands
    On the Spectral Theorem of Langlands Patrick Delorme April 22, 2021 A` Chantal Abstract We show that the Hilbert subspace of L2pGpF qzGpAqq generated by wave packets of Eisenstein series built from discrete series is the whole space. To- gether with the work of Lapid [18], it achieves a proof of the spectral theorem of R.P. Langlands based on the work of J. Bernstein and E. Lapid [7] on the meromorphic continuation of Eisenstein series from I use truncation on compact sets as J. Arthur did for the local trace formula in [2]. 1 Introduction We denote by E the isometry introduced by E. Lapid in [18], Theorem 2, whose proof involves the meromorphic continuation of of Eisenstein series built from discrete data. A dense subspace of its image is generated by wave packets of these Eisenstein series. We show that this image is equal to L2pGpF qzGpAqq. This is what Lapid calls the second half of the proof of the spectral theorem of Langlands. It achieves a new proof of the spectral theorem of R.P. Langlands ([17], [20]). Notice that the proof of Langlands describes the spectrum as residues of Eisenstein series built from cuspidal data. arXiv:2006.12893v3 [math.RT] 21 Apr 2021 One uses the notion of temperedness of automorphic forms introduced by J. Franke [15](cf. also [21] section 4.4). We show this notion of temperedness is weaker than the notion of temperedness introduced by Joseph Bernstein in [6]. We prove that for bounded sets of unitary parameters, the Eisenstein series are uniformly tempered when the parameter is unitary and bounded.
    [Show full text]
  • TTHRESH: Tensor Compression for Multidimensional Visual Data
    TTHRESH: Tensor Compression for Multidimensional Visual Data Rafael Ballester-Ripoll, Member, IEEE, Peter Lindstrom, Senior Member, IEEE, and Renato Pajarola, Senior Member, IEEE (a) Original (512MB) (b) 10:1 compression (51.2MB) (c) 300:1 compression (1.71MB) Fig. 1. (a) a 5123 isotropic turbulence volume [1]; (b) visually identical compression result; (c) result after extreme compression. Abstract—Memory and network bandwidth are decisive bottlenecks when handling high-resolution multidimensional data sets in visualization applications, and they increasingly demand suitable data compression strategies. We introduce a novel lossy compression algorithm for multidimensional data over regular grids. It leverages the higher-order singular value decomposition (HOSVD), a generalization of the SVD to three dimensions and higher, together with bit-plane, run-length and arithmetic coding to compress the HOSVD transform coefficients. Our scheme degrades the data particularly smoothly and achieves lower mean squared error than other state-of-the-art algorithms at low-to-medium bit rates, as it is required in data archiving and management for visualization purposes. Further advantages of the proposed algorithm include very fine bit rate selection granularity and the ability to manipulate data at very small cost in the compression domain, for example to reconstruct filtered and/or subsampled versions of all (or selected parts) of the data set. Index Terms—Transform-based compression, scientific visualization, higher-order singular value decomposition, Tucker model, tensor decompositions 1 INTRODUCTION Most scientific and visual computing applications face heavy compu- support for arbitrary dimensionality, ease of parallelization, topological tational and data management challenges when handling large and/or robustness, etc.
    [Show full text]
  • MRCZ – a Proposed Fast Compressed MRC File Format and Direct Detector Normalization Strategies
    bioRxiv preprint doi: https://doi.org/10.1101/116533; this version posted March 13, 2017. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available under aCC-BY 4.0 International license. MRCZ – A proposed fast compressed MRC file format and direct detector normalization strategies Robert A. McLeod1*, Ricardo Diogo Righetto1, Andy Stewart2, Henning Stahlberg1 1 Center for Cellular Imaging and NanoAnalytics (C-CINA), University of Basel, Basel, Switzerland 2 Department of Physics, University of Limerick, Limerick, Ireland * Corresponding author: Robert A. McLeod, C-CINA, Biozentrum, University of Basel ([email protected]) Abstract The introduction of high-speed CMOS detectors is fast marching the field of transmission electron microscopy into an intersection with the computer science field of big data. Automated data pipelines to control the instrument and the initial processing steps are imposing more and more onerous requirements on data transfer and archiving. We present a proposal for expansion of the venerable MRC file format to combine integer decimation and lossless compression to reduce storage requirements and improve file read/write times by >1000 % compared to uncompressed floating-point data. The integer decimation of data necessitates application of the gain normalization and outlier pixel removal at the data destination, rather than the source. With direct electron detectors, the normalization step is typically provided by the vendor and is not open- source. We provide robustly tested normalization algorithms that perform at-least as well as vendor software.
    [Show full text]
  • Introduc2on to Linux
    Introduc)on to Linux Geng so3ware Installing new so3ware • Downloading – wget http://<url>/file copies file to current place • Unpacking – Geng the file from the downloaded package • Compiling – Making the code into an executable program • Running – Run your new program Compressed File Extensions • bz2 - BZzip2 compressed archive file • gz - Gnu Zipped Archive File • gzip - Gnu Zipped File • tar - Consolidated Unix File Archive • tgz - Gzipped Tar File • zip - ZIP compression Geng the file out • tar xzf file.tar.gz -> file • gunzip file.gz -> file • tar xf file.tar -> file • tar xzf file.tgz -> file • tar xjf file.tar.bz2 -> file • bunzip2 file.bz2 -> file • rar x file.rar -> file • tar xjf file.tbz2 -> file • unzip file.zip -> file Compiling Normal procedure • ./configure --prefix=$HOME • make • make install To remove all but the source files • make clean Permissions • chmod - change file modes – Permissions are Read Write eXecute – People affected are User Group Others Example chmod u+xo-rwx file removes all permissions for the file file from other users and makes the file executable for the owner. Linking • In the wrong place • Too large to move or copy ln –s <source file> <target file> Redirec)on • Pung output to next program • Pung output into a file • Pung output at the end of a file (append) | > >> Part II Common file types in bioinformacs FASTA raw data • Line 1: Single line descrip)on, marked by “>” • Line 2…n: Lines of sequence data Example >gi|31563518|ref|NP_852610.1 MKMRFFSSPCGKAAVDPADRCKEVQQIRDQHPS KIPVIIERYKGEKQLPVLDKTKFLPDHVNMSEL VKIIRRRLQLNPTQAFFLLVNQHSMVSVSTPIA
    [Show full text]
  • Quantum Walled Brauer Algebra: Commuting Families, Baxterization, and Representations
    QUANTUM WALLED BRAUER ALGEBRA: COMMUTING FAMILIES, BAXTERIZATION, AND REPRESENTATIONS A.M. SEMIKHATOV AND I.YU. TIPUNIN ABSTRACT. For the quantum walled Brauer algebra, we construct its Specht modules and (for generic parameters of the algebra) seminormal modules. The latter construction yields the spectrum of a commuting family of Jucys–Murphy elements. We also propose a Baxterization prescription; it involves representing the quantum walled Brauer algebra in terms of morphisms in a braided monoidal category and introducing parameters into these morphisms, which allows constructing a “universal transfer matrix” that generates commuting elements of the algebra. 1. INTRODUCTION We study the quantum (“quantized”) walled Brauer algebra qwB and its representa- tions.1 The classical version of the algebra was introduced in [1, 2] in the context of generalized Schur–Weyl duality: the algebra was shown to centralize the gℓpNq action on “mixed” tensor products X ˚bm b X bn of the natural gℓpNq representation and its dual; for special parameter values, the walled Brauer algebra centralizes the action of gℓpM|Nq [3, 4]. The structure of the algebra was explored in [5]. The quantum version of the algebra was introduced in [6, 7, 8, 9], and its role as the centralizer of UqpgℓNq on the mixed tensor product X ˚bm b X bn was elucidated in [10, 11]. We also note a recent “super” extension of quantum walled Brauer algebras in [12]. We here view qwBm,n following [7] (also see [13]) as a diagram algebra, with the di- agrams supplied by a braided monoidal category.2 We use the diagrams representing category morphisms to construct two types of commutative families of qwBm,n elements: (i) a family of “conservation laws” following from a Baxterization procedure, and B arXiv:1512.06994v3 [math.QA] 22 Dec 2016 (ii) a family of Jucys–Murphy elements Jpnq2,...,Jpnqm`n P qw m,n (which we diag- onalize, as is discussed below).
    [Show full text]