A Novel Technique for Cohomology Computations in Engineering Practice

Total Page:16

File Type:pdf, Size:1020Kb

A Novel Technique for Cohomology Computations in Engineering Practice Comput. Methods Appl. Mech. Engrg. 253 (2013) 530–542 Contents lists available at SciVerse ScienceDirect Comput. Methods Appl. Mech. Engrg. journal homepage: www.elsevier.com/locate/cma A novel technique for cohomology computations in engineering practice ⇑ Paweł Dłotko a,1, Ruben Specogna b, a Jagiellonian University, Institute of Computer Science, Lojasiewicza 4, 30348 Kraków, Poland b Università di Udine, Dipartimento di Ingegneria Elettrica, Gestionale e Meccanica, Via delle Scienze 208, 33100 Udine, Italy article info abstract Article history: The problem of computing cohomology generators of a cell complex is gaining more and more interest in Received 14 February 2012 various branches of science ranging from computational physics to biology. Focusing on engineering Received in revised form 13 June 2012 applications, cohomology generators are currently used in computer aided design (CAD) and in potential Accepted 9 August 2012 definition for computational electromagnetics and fluid dynamics. Available online 24 August 2012 The aim of this paper is to introduce a novel technique to effectively compute cohomology generators focusing on the application involving the potential definition for h-oriented eddy-current formulations. Keywords: This technique, which has been called Thinned Current Technique (TCT), is completely automatic, compu- (Co) homology computation tationally efficient and general. The TCT runs in most cases in linear time and exhibits a speed up of (Co) homology generators Definition of potentials orders of magnitude with respect to the best alternative documented implementation. Eddy-currents Ó 2012 Elsevier B.V. All rights reserved. Thick cuts 1. Introduction mathematics where cohomology group has been computed (with cup and cap products [32,5]) is group theory [33,34]. As for the The problem of computing cohomology generators [1–5] of a case of computing cohomology of cell complexes the only ap- cell complex is gaining more and more interest in various branches proach known to the Authors has been by using the concept of of science ranging from computational physics [6–23] to biology graph pyramids in [29]. However, this approach is limited to [24] and quantum chemistry [25]. Focusing on engineering, coho- two-dimensional cubical complexes only. The lack of results con- mology generators are currently used in computer aided design cerning cohomology computations—in contrast with the great (CAD) for feature detection [26,27], shape analysis [28,29], param- number of publications concerning homology computations— etrization and mesh generation [30,31] and in definition of poten- could be due to several reasons. One may be that cohomology the- tials for magnetostatic, eddy-current problems [6–23] and for ory is less intuitive and render finding novel applications more Navier–Stokes equations [16]. In particular, in the last 25 years, difficult. cohomology computation draw sensible attention in the computa- A general algorithm for the computation of a basis of the coho- tional electromagnetics community. In fact, generators of the first mology group over integers is well known since many decades cohomology group—usually called thick cuts [10–23] in this con- ago and it is based on the Smith Normal Form [1–5] computation. text—are expressly needed to solve eddy-current problems with The problem of this algorithm is that its computational complexity the efficient magnetic scalar potential-based T-X formulation is hyper-cubical with the best implementation available [35] and [11,17,18,20,23]. Even though a considerable effort has been in- consequently it cannot be used in practice even on extremely coarse vested by the computational electromagnetics community to de- meshes. The same problem in case of homology computations has velop fast and general algorithms to produce cohomology been solved by using a sparse matrix data structure [36] and reduc- generators, the required computational complexity and memory tions techniques [37]. Sparse matrices are used to effectively store consumption render them still far from being attractive. boundary matrices and reduction techniques are used to reduce In mathematics and computer science communities, computa- the complex before the Smith Normal Form computation is run. A tions of cohomology groups and generators has not been exten- survey of these reduction techniques in the context of computa- sively explored so far. As far as we know, the only field of tional electromagnetics is addressed in the review paper [38]. One can in fact use Smith Normal Form and some of the reductions ⇑ designed for homology computations in order to obtain cohomology Corresponding author. Tel.: +39 0432 558285; fax: +39 0432 558251. groups and their generators. Once the cohomology generators are E-mail addresses: [email protected] (P. Dłotko), [email protected] (R. Specogna). found on the reduced complex via the standard Smith Normal Form 1 P.D. was partially supported by grant IP 2010 046370. algorithm, they are restored into the original complex by the 0045-7825/$ - see front matter Ó 2012 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.cma.2012.08.009 P. Dłotko, R. Specogna / Comput. Methods Appl. Mech. Engrg. 253 (2013) 530–542 531 so-called pull-back operation [37]. Pulling back the generators rep- (TCT) which is easy to implement in a parallel or distributed com- resents, however, a considerable extra computational cost. There- puting environment. fore, a so-called shaving for cohomology is desired, which enables The paper is structured as follows. In Section 2 the need of a first a reduction of the complex without the need of pulling-back the cohomology group basis for electromagnetic potentials definition generators. This is due to the property that the cohomology gener- is recalled. In Section 3, we present a novel algorithm for cohomol- ators of the shaved complex are generators also of the original com- ogy computation called Thinned Current Technique (TCT), which plex. The concept of shaving for cohomology has been introduced in stems from an alternative approach with respect to the ones pre- [20]. In the same paper, the authors introduced an automatic, gen- sented in the literature survey. Section 4 describes the modifica- eral, and efficient algorithm to compute cohomology generators in tions that need to be applied when one wants to take advantage computational electromagnetics. The [20] algorithm uses as shav- of some symmetry in the eddy-current problem. In Section 5, ings the reduction procedures presented in [39,40]. real-life examples are provided to benchmark the efficiency and An attempt of producing thick cuts avoiding (co) homology robustness of the presented method with respect to the ones doc- computations has been reported in [11]. First, the first cohomology umented in literature. Finally, in Section 6, the conclusions are group generators are found on the surface of conductors. However, drawn. only half of them have to be selected, namely the ones that are non-bounding in the conducting region. The question of how to se- 2. (Co) homology in electromagnetic modeling lect them automatically and efficiently is left unaddressed in the paper. Second, it grows an acyclic sub-complex inside the insulat- For the sake of brevity, the relevant concepts from algebraic ing region and, at the end of this process, the complement of the topology as (co) chains, (co) boundaries and (co) homology are acyclic sub-complex is considered as the support of thick cuts. not recalled in this paper. For an informal introduction to the sub- Again, how to construct the acyclic sub-complex is not described ject the reader is invited to consult [13,18,21]. A more formal pre- at all in the paper. The lack of these and other necessary details sentation can be found in any algebraic topology textbook as [5]. does not allow a serious analysis of this algorithm. Let us assume that the cell complex K provided by the input In [12], a different algorithm—which the Authors call General- mesh of the computational domain is homeomorphic to the ized Spanning Tree Technique (GSTT)—has been introduced. This three-dimensional ball, which is a standard assumption in practical algorithm attempts to generate a basis for the first cohomology meaningful problems. Elements of K belonging to the conducting group once a basis for the first homology group is given as input. region are stored in the sub-complex Kc, whereas the elements In [12], homology generators have been constructed ‘‘by hand’’ of K belonging to the insulating region form the sub-complex Ka. and no discussion about the termination of the algorithm has been Moreover, we assume, that K; Ka and Kc are combinatorial mani- addressed. In [18], an efficient algorithm to automatically produce folds (see [42]). the homology generators has been described and in [21] a detailed In this section, we intuitively explain why cohomology theory is analysis of the GSTT has been presented by the Authors. The con- expressly needed in the context of computational electromagnet- clusion is that the GSTT algorithm may present many termination ics. A more comprehensive and detailed treatment on this topic failures that are very difficult to solve in practice. is presented in [23]. To this aim, let us concentrate on the defini- We would like also to point out that an algorithm similar to the tion of potentials in the insulating region Ka for h-oriented eddy- GSTT has been introduced by Kotiuga in the pioneering works [6– current formulations.2 The discrete Ampère’s law in the insulating 8,13]. More precisely, a GSTT-like algorithm is applied on the dual region can be written as complex to obtain the so-called thin cuts, that are generators of the first cohomology group of the insulating domain on the dual com- dF I 0; 1 plex. This technique is not attractive from the computational com- ¼ ¼ ð Þ plexity point of view because a non-physical Poisson problem have to be solved for each generator to avoid cut self-intersections (i.e.
Recommended publications
  • Minimum Cycle Bases and Their Applications
    Minimum Cycle Bases and Their Applications Franziska Berger1, Peter Gritzmann2, and Sven de Vries3 1 Department of Mathematics, Polytechnic Institute of NYU, Six MetroTech Center, Brooklyn NY 11201, USA [email protected] 2 Zentrum Mathematik, Technische Universit¨at M¨unchen, 80290 M¨unchen, Germany [email protected] 3 FB IV, Mathematik, Universit¨at Trier, 54286 Trier, Germany [email protected] Abstract. Minimum cycle bases of weighted undirected and directed graphs are bases of the cycle space of the (di)graphs with minimum weight. We survey the known polynomial-time algorithms for their con- struction, explain some of their properties and describe a few important applications. 1 Introduction Minimum cycle bases of undirected or directed multigraphs are bases of the cycle space of the graphs or digraphs with minimum length or weight. Their intrigu- ing combinatorial properties and their construction have interested researchers for several decades. Since minimum cycle bases have diverse applications (e.g., electric networks, theoretical chemistry and biology, as well as periodic event scheduling), they are also important for practitioners. After introducing the necessary notation and concepts in Subsections 1.1 and 1.2 and reviewing some fundamental properties of minimum cycle bases in Subsection 1.3, we explain the known algorithms for computing minimum cycle bases in Section 2. Finally, Section 3 is devoted to applications. 1.1 Definitions and Notation Let G =(V,E) be a directed multigraph with m edges and n vertices. Let + E = {e1,...,em},andletw : E → R be a positive weight function on E.A cycle C in G is a subgraph (actually ignoring orientation) of G in which every vertex has even degree (= in-degree + out-degree).
    [Show full text]
  • Lab05 - Matroid Exercises for Algorithms by Xiaofeng Gao, 2016 Spring Semester
    Lab05 - Matroid Exercises for Algorithms by Xiaofeng Gao, 2016 Spring Semester Name: Student ID: Email: 1. Provide an example of (S; C) which is an independent system but not a matroid. Give an instance of S such that v(S) 6= u(S) (should be different from the example posted in class). 2. Matching matroid MC : Let G = (V; E) be an arbitrary undirected graph. C is the collection of all vertices set which can be covered by a matching in G. (a) Prove that MC = (V; C) is a matroid. (b) Given a graph G = (V; E) where each vertex vi has a weight w(vi), please give an algorithm to find the matching where the weight of all covered vertices is maximum. Prove the correctness and analyze the time complexity of your algorithm. Note: Given a graph G = (V; E), a matching M in G is a set of pairwise non-adjacent edges; that is, no two edges share a common vertex. A vertex is covered (or matched) if it is an endpoint of one of the edges in the matching. Otherwise the vertex is uncovered. 3. A Dyck path of length 2n is a path in the plane from (0; 0) to (2n; 0), with steps U = (1; 1) and D = (1; −1), that never passes below the x-axis. For example, P = UUDUDUUDDD is a Dyck path of length 10. Each Dyck path defines an up-step set: the subset of [2n] consisting of the integers i such that the i-th step of the path is U.
    [Show full text]
  • BIOINFORMATICS Doi:10.1093/Bioinformatics/Btt213
    Vol. 29 ISMB/ECCB 2013, pages i352–i360 BIOINFORMATICS doi:10.1093/bioinformatics/btt213 Haplotype assembly in polyploid genomes and identical by descent shared tracts Derek Aguiar and Sorin Istrail* Department of Computer Science and Center for Computational Molecular Biology, Brown University, Providence, RI 02912, USA ABSTRACT Standard genome sequencing workflows produce contiguous Motivation: Genome-wide haplotype reconstruction from sequence DNA segments of an unknown chromosomal origin. De novo data, or haplotype assembly, is at the center of major challenges in assemblies for genomes with two sets of chromosomes (diploid) molecular biology and life sciences. For complex eukaryotic organ- or more (polyploid) produce consensus sequences in which the isms like humans, the genome is vast and the population samples are relative haplotype phase between variants is undetermined. The growing so rapidly that algorithms processing high-throughput set of sequencing reads can be mapped to the phase-ambiguous sequencing data must scale favorably in terms of both accuracy and reference genome and the diploid chromosome origin can be computational efficiency. Furthermore, current models and methodol- determined but, without knowledge of the haplotype sequences, ogies for haplotype assembly (i) do not consider individuals sharing reads cannot be mapped to the particular haploid chromosome haplotypes jointly, which reduces the size and accuracy of assembled sequence. As a result, reference-based genome assembly algo- haplotypes, and (ii) are unable to model genomes having more than rithms also produce unphased assemblies. However, sequence two sets of homologous chromosomes (polyploidy). Polyploid organ- reads are derived from a single haploid fragment and thus pro- isms are increasingly becoming the target of many research groups vide valuable phase information when they contain two or more variants.
    [Show full text]
  • Short Cycles
    Short Cycles Minimum Cycle Bases of Graphs from Chemistry and Biochemistry Dissertation zur Erlangung des akademischen Grades Doctor rerum naturalium an der Fakultat¨ fur¨ Naturwissenschaften und Mathematik der Universitat¨ Wien Vorgelegt von Petra Manuela Gleiss im September 2001 An dieser Stelle m¨ochte ich mich herzlich bei all jenen bedanken, die zum Entstehen der vorliegenden Arbeit beigetragen haben. Allen voran Peter Stadler, der mich durch seine wissenschaftliche Leitung, sein ub¨ er- w¨altigendes Wissen und seine Geduld unterstutzte,¨ sowie Josef Leydold, ohne den ich so manch tieferen Einblick in die Mathematik nicht gewonnen h¨atte. Ivo Hofacker, dermich oftmals aus den unendlichen Weiten des \Computer Universums" rettete. Meinem Bruder Jurgen¨ Gleiss, fur¨ die Einfuhrung¨ und Hilfstellungen bei meinen Kampf mit C++. Daniela Dorigoni, die die Daten der atmosph¨arischen Netzwerke in den Computer eingeben hat. Allen Kolleginnen und Kollegen vom Institut, fur¨ die Hilfsbereitschaft. Meine Eltern Erika und Franz Gleiss, die mir durch ihre Unterstutzung¨ ein Studium erm¨oglichten. Meiner Oma Maria Fischer, fur¨ den immerw¨ahrenden Glauben an mich. Meinen Schwiegereltern Irmtraud und Gun¨ ther Scharner, fur¨ die oftmalige Betreuung meiner Kinder. Zum Schluss Roland Scharner, Florian und Sarah Gleiss, meinen drei Liebsten, die mich immer wieder aufbauten und in die reale Welt zuruc¨ kfuhrten.¨ Ich wurde teilweise vom osterreic¨ hischem Fonds zur F¨orderung der Wissenschaftlichen Forschung, Proj.No. P14094-MAT finanziell unterstuzt.¨ Zusammenfassung In der Biochemie werden Kreis-Basen nicht nur bei der Betrachtung kleiner einfacher organischer Molekule,¨ sondern auch bei Struktur Untersuchungen hoch komplexer Biomolekule,¨ sowie zur Veranschaulichung chemische Reaktionsnetzwerke herange- zogen. Die kleinste kanonische Menge von Kreisen zur Beschreibung der zyklischen Struk- tur eines ungerichteten Graphen ist die Menge der relevanten Kreis (Vereingungs- menge aller minimaler Kreis-Basen).
    [Show full text]
  • A Cycle-Based Formulation for the Distance Geometry Problem
    A cycle-based formulation for the Distance Geometry Problem Leo Liberti, Gabriele Iommazzo, Carlile Lavor, and Nelson Maculan Abstract The distance geometry problem consists in finding a realization of a weighed graph in a Euclidean space of given dimension, where the edges are realized as straight segments of length equal to the edge weight. We propose and test a new mathematical programming formulation based on the incidence between cycles and edges in the given graph. 1 Introduction The Distance Geometry Problem (DGP), also known as the realization problem in geometric rigidity, belongs to a more general class of metric completion and embedding problems. DGP. Given a positive integer K and a simple undirected graph G = ¹V; Eº with an edge K weight function d : E ! R≥0, establish whether there exists a realization x : V ! R of the vertices such that Eq. (1) below is satisfied: fi; jg 2 E kxi − xj k = dij; (1) 8 K where xi 2 R for each i 2 V and dij is the weight on edge fi; jg 2 E. L. Liberti LIX CNRS Ecole Polytechnique, Institut Polytechnique de Paris, 91128 Palaiseau, France, e-mail: [email protected] G. Iommazzo LIX Ecole Polytechnique, France and DI Università di Pisa, Italy, e-mail: giommazz@lix. polytechnique.fr C. Lavor IMECC, University of Campinas, Brazil, e-mail: [email protected] N. Maculan COPPE, Federal University of Rio de Janeiro (UFRJ), Brazil, e-mail: [email protected] 1 2 L. Liberti et al. In its most general form, the DGP might be parametrized over any norm.
    [Show full text]
  • Dominating Cycles in Halin Graphs*
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Discrete Mathematics 86 (1990) 215-224 215 North-Holland DOMINATING CYCLES IN HALIN GRAPHS* Mirosiawa SKOWRONSKA Institute of Mathematics, Copernicus University, Chopina 12/18, 87-100 Torun’, Poland Maciej M. SYStO Institute of Computer Science, University of Wroclaw, Przesmyckiego 20, 51-151 Wroclaw, Poland Received 2 December 1988 A cycle in a graph is dominating if every vertex lies at distance at most one from the cycle and a cycle is D-cycle if every edge is incident with a vertex of the cycle. In this paper, first we provide recursive formulae for finding a shortest dominating cycle in a Hahn graph; minor modifications can give formulae for finding a shortest D-cycle. Then, dominating cycles and D-cycles in a Halin graph H are characterized in terms of the cycle graph, the intersection graph of the faces of H. 1. Preliminaries The various domination problems have been extensively studied. Among them is the problem whether a graph has a dominating cycle. All graphs in this paper have no loops and multiple edges. A dominating cycle in a graph G = (V(G), E(G)) is a subgraph C of G which is a cycle and every vertex of V(G) \ V(C) is adjacent to a vertex of C. There are graphs which have no dominating cycles, and moreover, determining whether a graph has a dominating cycle on at most 1 vertices is NP-complete even in the class of planar graphs [7], chordal, bipartite and split graphs [3].
    [Show full text]
  • Exam DM840 Cheminformatics (2016)
    Exam DM840 Cheminformatics (2016) Time and Place Time: Thursday, June 2nd, 2016, starting 10:30. Place: The exam takes place in U-XXX (to be decided) Even though the expected total examination time per student is about 27 minutes (see below), it is not possible to calculate the exact examination time from the placement on the list, since students earlier on the list may not show up. Thus, students are expected to show up plenty early. In principle, all students who are taking the exam on a particular date are supposed to show up when the examination starts, i.e., at the time the rst student is scheduled. This is partly because of the way external examiners are paid, which is by the number of students who show up for examination. For this particular exam, we do not expect many no-shows, so showing up one hour before the estimated time of the exam should be safe. Procedure The exam is in English. When it is your turn for examination, you will draw a question. Note that you have no preparation time. The list of questions can be found below. Then the actual exam takes place. The whole exam (without the censor and the examiner agreeing on a grade) lasts approximately 25-30 minutes. You should start by presenting material related to the question you drew. Aim for a reasonable high pace and focus on the most interesting material related to the question. You are not supposed to use note material, textbooks, transparencies, computer, etc. You are allowed to bring keywords for each question, such that you can remember what you want to present during your presentation.
    [Show full text]
  • Cheminformatics for Genome-Scale Metabolic Reconstructions
    CHEMINFORMATICS FOR GENOME-SCALE METABOLIC RECONSTRUCTIONS John W. May European Molecular Biology Laboratory European Bioinformatics Institute University of Cambridge Homerton College A thesis submitted for the degree of Doctor of Philosophy June 2014 Declaration This thesis is the result of my own work and includes nothing which is the outcome of work done in collaboration except where specifically indicated in the text. This dissertation is not substantially the same as any I have submitted for a degree, diploma or other qualification at any other university, and no part has already been, or is currently being submitted for any degree, diploma or other qualification. This dissertation does not exceed the specified length limit of 60,000 words as defined by the Biology Degree Committee. This dissertation has been typeset using LATEX in 11 pt Palatino, one and half spaced, according to the specifications defined by the Board of Graduate Studies and the Biology Degree Committee. June 2014 John W. May to Róisín Acknowledgements This work was carried out in the Cheminformatics and Metabolism Group at the European Bioinformatics Institute (EMBL-EBI). The project was fund- ed by Unilever, the Biotechnology and Biological Sciences Research Coun- cil [BB/I532153/1], and the European Molecular Biology Laboratory. I would like to thank my supervisor, Christoph Steinbeck for his guidance and providing intellectual freedom. I am also thankful to each member of my thesis advisory committee: Gordon James, Julio Saez-Rodriguez, Kiran Patil, and Gos Micklem who gave their time, advice, and guidance. I am thankful to all members of the Cheminformatics and Metabolism Group.
    [Show full text]
  • Exam DM840 Cheminformatics (2014)
    Exam DM840 Cheminformatics (2014) Time and Place Time: Thursday, January 22, 2015, starting XX:00. Place: The exam takes place in U-XXX Even though the expected total examination time per student is about 27 minutes (see below), it is not possible to calculate the exact examination time from the placement on the list, since students earlier on the list may not show up. Thus, students are expected to show up plenty early. In principle, all students who are taking the exam on a particular date are supposed to show up when the examination starts, i.e., at the time the rst student is scheduled. This is partly because of the way external examiners are paid, which is by the number of students who show up for examination. For this particular exam, we do not expect many no-shows, so showing up one hour before the estimated time of the exam should be safe. Procedure The exam is in English. When it is your turn for examination, you will draw a question. Note that you have no preparation time. The list of questions can be found below. Then the actual exam takes place. The whole exam (without the censor and the examiner agreeing on a grade) lasts approximately 25-30 minutes. You should start by presenting material related to the question you drew. Aim for a reasonable high pace and focus on the most interesting material related to the question. You are not supposed to use note material, textbooks, transparencies, computer, etc. You are allowed to bring keywords for each question, such that you can remember what you want to present during your presentation.
    [Show full text]
  • From Las Vegas to Monte Carlo and Back: Sampling Cycles in Graphs
    From Las Vegas to Monte Carlo and back: Sampling cycles in graphs Konstantin Klemm SEHRLASSIGER¨ LEHRSASS--EL¨ for Bioinformatics University of Leipzig 1 Agenda • Cycles in graphs: Why? What? Sampling? • Method I: Las Vegas • Method II: Monte Carlo • Robust cycle bases 2 Why care about cycles? (1) Chemical Ring Perception 3 Why care about cycles? (2) Analysis of chemical reaction networks (Io's ath- mosphere) 4 Why care about cycles? (3) • Protein interaction networks • Internet graph • Social networks • : : : Aim: Detailed comparison between network models and empiri- cal networks with respect to presence / absence of cycles 5 Sampling • Interested in average value of a cycle property f(C) 1 hfi = X f(C) jfcyclesgj C2fcyclesg with f(C) = jCj or f(C) = δjCj;h or : : : • exhaustive enumeration of fcyclesg not feasible • approximate hfi by summing over representative, randomly selected subset S ⊂ fcyclesg • How do we generate S then? 6 Las Vegas • Sampling method based on self-avoiding random walk [Rozenfeld et al. (2004), cond-mat/0403536] • probably motivated by the movie \Lost in Las Vegas" (though the authors do not say explicitly) 1. Choose starting vertex s. 2. Hop to randomly chosen neighbour, avoiding previously vis- ited vertices except s. 3. Repeat 2. unless reaching s again or getting stuck 7 Las Vegas { trouble • Number of cycles of length h in complete graph KN N! W (h) = (2h)−1 (N − h)! • For N = 100, W (100)=W (3) ≈ 10150 • Flat cycle length distribution in KN from Rozenfeld method 1 p(h) = (N − 2) • Undersampling of long cycles 8 Las Vegas | results 100 12 10 h* Nh 8 10 10 100 1000 N 4 10 0 20 40 60 80 100 120 140 h Generalized random graphs ("static model") with N = 100; 200; 400; 800, hki = 2, β = 0:5 Leaving Las Vegas : : : 9 Monte Carlo | summing cycles • Sum of two cycles yields new cycle: + = + = • (generalized) cycle: subgraph, all degrees even • simple cycle: connected subgraph, all degrees = 2.
    [Show full text]
  • Hapcompass: a Fast Cycle Basis Algorithm for Accurate Haplotype Assembly of Sequence Data
    HapCompass: A fast cycle basis algorithm for accurate haplotype assembly of sequence data Derek Aguiar 1;2 Sorin Istrail 1;2;∗ Dedicated to professors Michael Waterman's 70th birthday and Simon Tavare's 60th birthday 1Department of Computer Science, Brown University, Providence, RI, USA 2Center for Computational Molecular Biology, Brown University, Providence, RI, USA Abstract: Genome assembly methods produce haplotype phase ambiguous assemblies due to limitations in current sequencing technologies. Determin- ing the haplotype phase of an individual is computationally challenging and experimentally expensive. However, haplotype phase information is crucial in many bioinformatics workflows such as genetic association studies and genomic imputation. Current computational methods of determining hap- lotype phase from sequence data { known as haplotype assembly { have ∗to whom correspondence should be addressed: Sorin [email protected] 1 difficulties producing accurate results for large (1000 genomes-type) data or operate on restricted optimizations that are unrealistic considering modern high-throughput sequencing technologies. We present a novel algorithm, HapCompass, for haplotype assembly of densely sequenced human genome data. The HapCompass algorithm oper- ates on a graph where single nucleotide polymorphisms (SNPs) are nodes and edges are defined by sequence reads and viewed as supporting evidence of co- occuring SNP alleles in a haplotype. In our graph model, haplotype phasings correspond to spanning trees and each spanning tree uniquely defines a cycle basis. We define the minimum weighted edge removal global optimization on this graph and develop an algorithm based on local optimizations of the cycle basis for resolving conflicting evidence. We then estimate the amount of sequencing required to produce a complete haplotype assembly of a chro- mosome.
    [Show full text]
  • Cycle Bases in Graphs Characterization, Algorithms, Complexity, and Applications
    Cycle Bases in Graphs Characterization, Algorithms, Complexity, and Applications Telikepalli Kavitha∗ Christian Liebchen† Kurt Mehlhorn‡ Dimitrios Michail Romeo Rizzi§ Torsten Ueckerdt¶ Katharina A. Zweigk August 25, 2009 Abstract Cycles in graphs play an important role in many applications, e.g., analysis of electrical networks, analysis of chemical and biological pathways, periodic scheduling, and graph drawing. From a mathematical point of view, cycles in graphs have a rich structure. Cycle bases are a compact description of the set of all cycles of a graph. In this paper, we survey the state of knowledge on cycle bases and also derive some new results. We introduce different kinds of cycle bases, characterize them in terms of their cycle matrix, and prove structural results and apriori length bounds. We provide polynomial algorithms for the minimum cycle basis problem for some of the classes and prove -hardness for others. We also discuss three applications and show that they requirAPXe different kinds of cycle bases. Contents 1 Introduction 3 2 Definitions 5 3 Classification of Cycle Bases 10 3.1 Existence ...................................... 10 3.2 Characterizations............................... 11 3.3 SimpleExamples .................................. 15 3.4 VariantsoftheMCBProblem. 17 3.5 Directed and GF (p)-Bases............................. 20 3.6 CircuitsversusCycles . .. .. .. .. .. .. .. 21 3.7 Reductions ..................................... 24 ∗Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India †DB Schenker Rail Deutschland AG, Mainz, Germany. Part of this work was done at the DFG Research Center Matheon in Berlin ‡Max-Planck-Institut f¨ur Informatik, Saarbr¨ucken, Germany §Dipartimento di Matematica ed Informatica (DIMI), Universit degli Studi di Udine, Udine, Italy ¶Technische Universit¨at Berlin, Berlin, Germany, Supported by .
    [Show full text]