Literature DB >> 36038610

Practical counting of substitutive paths on a planar infrastructure network.

Yukio Hayashi1, Atsushi Tanaka2.   

Abstract

When there are many non-intersecting paths between two vertices on a network, the connectivity is fault-tolerant. Because of no common vertices on these paths, they can be emergently used in avoiding destroyed parts on the usual paths by any disasters or attacks. It gives a tolerance index whether the combination of non-intersecting paths is many or few. However, to enumerate such paths is an intractable combinatorial problem, no practical algorithm has been known. On the other hand, many socio-technological infrastructure networks are embedded on the surface of Earth. Thus, as an approximate solution, we extendedly apply the counting method based on a path matrix with our proposed mapping to directed acyclic graphs from a planar network according to each pair of source and terminal vertices. The tendency of many or few combinations of the paths is clearly investigated through computer simulations for realistic networks. This approach will be useful for evaluating the existence of substitutive paths to improve the tolerance in risk management.
© 2022. The Author(s).

Entities:  

Year:  2022        PMID: 36038610      PMCID: PMC9424307          DOI: 10.1038/s41598-022-18927-w

Source DB:  PubMed          Journal:  Sci Rep        ISSN: 2045-2322            Impact factor:   4.996


Introduction

The resilience has attracted much attention pointed out as follows[1]. The state-of-the-art in the study of the resilience of complex systems is to see resilience as the ability to withstand and recover from some specific shock[1-3]. The ability to withstand shocks is often referred to as robustness[4,5] and is often seen as a structural component of the resilience of a system. In this case, it could correspond to the connectivity of the network through non-intersecting paths. The ability to recover basic function of networking from shocks is instead a dynamical property[6,7]. It requires time to be accounted for and is not part of the study in this article. For example, in this case, it could refer to the time it takes the network to switch to an alternative available path or create a new one to re-establish connectivity. In other words, if substitutive paths between two vertices exist, they can be emergently used just after unspecified disasters or attacks. We discuss the robustness of path between two end vertices, whose combination number of substitutive paths is changeable according to the selection of end vertices. Our problem setting for the changeable number differs to discuss the percolation or robustness of whole connectivity against random failures in bicomponent[8] or component of k-connectivity[9] as a set of vertices such that every pair of vertices has at least 2 or (a fixed) k node-disjoint paths. In the previous studies, the importance of edge for disconnecting a network is evaluated by using the ratio cut partitioning[10,11]. Since the minimum ratio cut problem is NP-hard[12] with the constraint of integer values as the selection number of vertices for partitioning, it is relaxed with real values to analyze the Laplacian of graph. In the approximation, a given graph is divided into two parts by cutting (removing) the most vulnerable minimum edges whose end-vertices have positive and negative signs of the eigenvector’s elements for the second smallest eigenvalue of the Laplacian[13]. However, in this method, we can not discriminate whether substitutive paths between two vertices exist or not. Thus, we aim to investigate the number of non-intersecting paths which give the possibility of passing through undamaged vertices and edges as a measure of bypass effect, when a usually worked path is disconnected by partial removals after any disasters or attacks. Here, non-intersecting paths means that there are no common vertices and edges on each other’s path. On the other hand, to determine the existence of non-intersecting paths is also called disjoint paths problem in computer science for a given vertex sets of source and terminal in a graph. This problem is known as NP-complete[14] for a fixed integer variable even in a planar undirected graph. Although only the existence of polynomial-time algorithm has been shown, it is unfamiliar and incomprehensible except for graph theory researchers because of its great length proof (with more than hundred pages in series papers) based on the difficult theorems in graph minors[15]. Moreover, no practical algorithm has been known even for [16]. In a naive method, all combinations of the vertices are checked on k candidates of paths to be non-intersecting, this is obviously inefficient and practically intractable with huge computation. Thus, as another approach, we focus on the counting method applied to Young tableaux or plain partitions in mathematical physics related to representation theory or combinatorics. Because we can use a theorem that the combination number of non-intersecting paths is given by the determinant of a path matrix with total positivity[17]. However, since the targets of this counting based on a path matrix are only directed acyclic graphs, we must develop a mapping in order to apply it for counting the number of non-intersecting paths on a given network as undirected planar graph. Our key idea is that the direction of edge is not fixed but temporally assigned for each pair of source and terminal vertices. In application point of view, a reason of considering planar graphs is that many infrastructure networks, such as power-grid, gas-pipeline, water-supply, transportation, and communication systems, are constructed on the surface of Earth, therefore considered as planar graphs conceptually.

Results

At first, we summarize symbols used in this paper as shown in Table 1.
Table 1

Symbol table.

NotationDescription
NNumber of vertices
MNumber of edges
kFixed number of non-intersecting paths
sSource vertex for a path
tTerminal vertex for a path
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\partial s$$\end{document}sSet of the neighbors of vertex s
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$| \partial s |$$\end{document}|s|Size of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\partial s$$\end{document}s
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$s_{1}, s_{2}, \ldots , s_{k}$$\end{document}s1,s2,,skSome vertices chosen from the nearest or next-nearest neighbors of s
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{1}, t_{2}, \ldots , t_{k}$$\end{document}t1,t2,,tkSome vertices chosen from the nearest or next-nearest neighbors of t
SI-IT-FRPath through vertices of countries or other indices SI, IT, and FR in this order
SI \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\sim$$\end{document} FRPaths between SI and FR
PQPath between vertices
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{{\mathcal {P}}}}(s_{i}, t_{j})$$\end{document}P(si,tj)Set of paths from \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$s_{i}$$\end{document}si to \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{j}$$\end{document}tj
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w_{ij}$$\end{document}wiji-j element of path matrix W
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\det W$$\end{document}detWDeterminant of matrix W
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Pi _{i} L_{ii}$$\end{document}ΠiLiiProduct of the diagonal elements \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$L_{ii}$$\end{document}Lii of matrix L
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$u \rightarrow v$$\end{document}uvVector from u to v
Symbol table. We briefly explain the outline of experiments. The top in Fig. 1 shows combinations of non-intersecting paths, which we want to count the number. The colored paths by blue or green and red or magenta have no common vertices. For any pairs of source and terminal vertices denoted by s and t, we consider non-intersecting paths between and . Figure 2a shows that and are chosen by the basic process in our method explained later. Non-intersecting paths between them must pass through different vertices from to as start and end points, respectively, since no common vertex on the paths is necessary except s and t. Therefore, the maximum k is smaller number of or . Here, denotes a set of the connecting nearest-neighbors of s, is the size as its degree (the number of edges emanated from s). Moreover, to make detour routes as shown in Fig. 2b, the neighbors can be extended from the nearest ones or to the next-nearest ones or (or next-next-nearest, next-next-next-nearest ones if necessary). Thus, our experiments are to find the combination number of k non-intersecting paths for each of pairs as s and t in a given planar network with N vertices. Note that the number of paths from s to t is equal to that from t to s by symmetry on an (undirected) network.
Figure 1

Example of six combinations of two non-intersecting paths from to and from to . (Top-Left) A planar directed graph with pairs of boundary vertices. (Top-Middle) One - path colored by red and its corresponding three - paths colored by blue. (Top-Right) Two - paths colored by blue or green and their corresponding - paths colored by red or magenta. Note that any two paths from to and from to are intersected. (Bottom-Left) From to or , (Bottom-Right) from to or , the numbers of paths calculated by token-passing in the “Methods” section. 1, 2, 3, 4, 6 are the numbers of reached tokens at the tips of arrows. They represent the numbers of paths which go through each edge from or .

Figure 2

Basic process in the mapping to directed acyclic graphs from a planar network. (a) Parts of the connecting nearest-neighbors of s and t. Solid lines are connection edges. Dashed line represents the virtual s-t line segment. (b) Red dotted lines represent detour routes. and are the next-nearest neighbors of s and t.

Example of six combinations of two non-intersecting paths from to and from to . (Top-Left) A planar directed graph with pairs of boundary vertices. (Top-Middle) One - path colored by red and its corresponding three - paths colored by blue. (Top-Right) Two - paths colored by blue or green and their corresponding - paths colored by red or magenta. Note that any two paths from to and from to are intersected. (Bottom-Left) From to or , (Bottom-Right) from to or , the numbers of paths calculated by token-passing in the “Methods” section. 1, 2, 3, 4, 6 are the numbers of reached tokens at the tips of arrows. They represent the numbers of paths which go through each edge from or . Basic process in the mapping to directed acyclic graphs from a planar network. (a) Parts of the connecting nearest-neighbors of s and t. Solid lines are connection edges. Dashed line represents the virtual s-t line segment. (b) Red dotted lines represent detour routes. and are the next-nearest neighbors of s and t. We investigate non-intersecting paths for the following two test cases of realistic infrastructure networks. The first test case is a network defined by neighborhood relations of countries in Europe[18] (see Supplementary Fig. S1 online for the visualization). It is supposed to be used for emergent transportation of relief supplies by land. Although an edge between two countries is simplified as a straight line, it actually consists of complexly connecting several roads. As a reason to simplify them, we consider that each line between two countries is corresponded to the minimum required immigration check or agreement to pass for emergent transportation. We use the two-letter codes[19] for representing countries in Europe, although some countries are omitted in the following exceptions. Small countries on national border Andora, Republic of Kosovo, San Marino, Status Civitatis Vaticanae, Monaco, Liechtenstein. Only one edge to its connecting neighbor, no substitutive path Spain, Denmark, Portugal. Island countries without land continuation Cyprus, Iceland, Ireland, United Kingdom, Malta. Figure 3 shows the combination numbers of (Top) and (Bottom) 3 non-intersecting paths between two countries by land in Europe. In particular, as colored by dark blue, there are many combinations of or 3 non-intersecting paths between a few countries in the west and the east of Europe. While as colored by red, no substitutive path exists between some countries mainly in the west and the south of Europe (see Supplementary Information online for the detail list). Between these countries, one of the counterplans for the vulnerability of connection by land may be enhancement of air-routes. In such a table of the combination numbers, each value at ij element in the upper triangle is smaller than that at ji element in the corresponding lower triangle, because the paths from to are limitted without long detour paths. Note that the diagonal parts in Fig. 3 are omitted because of the meaningless case of .
Figure 3

Heatmap for the combination number of (Top) or (Bottom) 3 non-intersecting paths on a planar network defined by neighboring countries in Europe. The right color bar indicates the number of paths from zero (white) to the maximum (blue) by gradation. The case of no substitutive path is emphasized by red. The upper triangle represents the numbers for choosing the nearest neighbors as start and end points, while the lower triangle represents the numbers for choosing the next-nearest neighbors as start and end points.

Heatmap for the combination number of (Top) or (Bottom) 3 non-intersecting paths on a planar network defined by neighboring countries in Europe. The right color bar indicates the number of paths from zero (white) to the maximum (blue) by gradation. The case of no substitutive path is emphasized by red. The upper triangle represents the numbers for choosing the nearest neighbors as start and end points, while the lower triangle represents the numbers for choosing the next-nearest neighbors as start and end points. More specifically as an example, for three non-intersecting paths from s:SI to t:FR, the following three cases of chosen neighbors are investigated. The above sequence of codes with hyphens represents a path of connecting vertices in the order from left to right. The total combination number is , whose value is written with white background on the bottom at the cross point of row SI and column FR in the upper triangle of Fig. 3(Bottom). Each element of path matrix W represents the number of paths between and in the directed graph without edges of s- and t-, . The directed graph is mapped for a given pair of s:SI and t:FR, although the detail is explained in the “Methods” section. Other cases are investigated in the same way for choosing different s, t, , , and the value of k. :HU, :AT, :IT, and :DE, :CH, :IT, one combination of paths by , SI-HU-SK-CZ-DE-FR, SI-AT-CH-FR, SI-IT-FR. :HU, :AT, :IT, and :BE, :CH, :IT, three combinations of paths by , SI-HU-SK-CZ-DE-BE-FR, SI-AT-CH-FR, SI-IT-FR. SI-HU-SK-CZ-DE-LU-BE-FR, SI-AT-CH-FR, SI-IT-FR. SI-HU-SK-CZ-DE-NL-BE-FR, SI-AT-CH-FR, SI-IT-FR. :HU, :AT, :IT, and :LU, :CH, :IT, one combination of paths by , SI-HU-SK-CZ-DE-LU-FR, SI-AT-CH-FR, SI-IT-FR. In addition, the existing cases of more than three non-intersecting paths are mainly in UA PL, UA DE, UA AT, PL DE, and SK AT. Here, denotes the paths between s and t (see Supplementary Fig. S2 online for the cases of ). However, paths are intersecting in our method for the first test case. The second test case is a backbone communication network connected with cables in the main island of Japan[20]. Note that the vertices are numbering from 1 to 20 according to the locations, e.g. from north to south in omitting some vertices that have only one neighbor as a common gate on paths from each of these vertices. The exact locations of vertices and the visualization should be secret for avoiding to be targets of attacks chosen by terrorists or other malice. Figure 4 shows the combination numbers of (Left) and (Right) 3 non-intersecting paths between two vertices in the communication network. However, paths are intersecting in our method for the second test case. As colored by dark blue, there are many combinations of or 3 non-intersecting paths between the vertices: for , , , , , , , , , , in the lower triangle of Fig. 4(Left), and for , in the upper triangle, , , in the lower triangle of Fig. 4(Right). While as colored by red, no substitutive path exists from each of vertices: 7, 17, 18, 19, 20, for which some sort of counterplans should be taken.
Figure 4

Heatmap for the combination number of (Left) or (Right) 3 non-intersecting paths on a backbone communication network in Japan. The right color bar indicates the number of paths from zero (white) to the maximum (blue) by gradation. The case of no substitutive path is emphasized by red. The upper triangle represents the numbers for choosing the nearest neighbors as start and end points, while the lower triangle represents the numbers for choosing the next-nearest neighbors as start and end points

Heatmap for the combination number of (Left) or (Right) 3 non-intersecting paths on a backbone communication network in Japan. The right color bar indicates the number of paths from zero (white) to the maximum (blue) by gradation. The case of no substitutive path is emphasized by red. The upper triangle represents the numbers for choosing the nearest neighbors as start and end points, while the lower triangle represents the numbers for choosing the next-nearest neighbors as start and end points Figure 5 illustrates the combinations of three non-intersecting paths from 3 to 5. In this example, the following two cases of chosen neighbors are investigated. Thus, the total combination number is , whose value is written with light blue background on the top at the cross point of row 3 and column 5 in the upper triangle of Fig. 4(Right). We remark that blue paths are broken in Fig. 5, if a vertex 8, 9 or 10 is attacked and removed. However, red and green paths are remained, the connectivity between vertices 3 and 5 is sustained because of non-intersecting at the damaged point. We consider the robustness of paths as this meaning.
Figure 5

Example of non-intersecting paths from 3 to 5. Three non-intersecting paths are colored by red, green, and blue. (Left) A part of directed graph, (Middle) five combinations of the paths, (Right) other five combinations of the paths. Note that only red line is different via vertex 2.

:10, :6, :4, and :8, :7, :4, five combinations of paths by , :10, :6, :2, and :8, :7, :4, five combinations of paths by . Example of non-intersecting paths from 3 to 5. Three non-intersecting paths are colored by red, green, and blue. (Left) A part of directed graph, (Middle) five combinations of the paths, (Right) other five combinations of the paths. Note that only red line is different via vertex 2. In this way, we have investigated the combination number of non-intersecting paths through computer simulations for realistic networks of countries by land in Europe and of backbone communication system in Japan. In particular, the tendency of many or few combinations of substitutive paths are found as follows.The above results exhibit the existing of substitutive paths, as mentioned in the next section, it becomes an issue how many non-intersecting paths is usable after what types of damages. Many substitutive paths between some countries in the west and the east of Europe No such paths between some countries in the west and the south of Europe, when long detour paths are limited without the extension to the nearest neighbors of s or t Similar tendency in some parts colored by blue and red in Fig. 4 for the backbone communication network In summary, in taking into account the construction of infrastructure networks on the surface of Earth, we have extendedly applied the counting method[21] of non-intersecting paths based on the path matrix for a directed acyclic graph. This application provides not exact but approximate solutions for counting substitutive paths between two vertices, in adaptive mapping the directions of edges for each pair of s and t on a planar network. However, it does not give an approximation guarantee theoretically, while the origin of NP-hardness is related to that each edge has two directions possibly. Therefore there are directed graphs in the search space. For example in the test cases of countries by land in Europe with and a backbone communication system in Japan with , the sizes are huge: and . It is intractable to get the exact solution as the ground truth. Remember that no practical algorithm is known[16] for counting the combination numbers of k non-intersecting paths. Even as approximation, it becomes possible to count them in a planar network. This is an advantage of our method at the current stage. In other words, our approach may give the first step to open the door for counting them.

Discussion

For further studies, the following issues are considered, although the limitation of our method is still unknown. First, to find longer detour paths, the further extension of or is required from the nearest neighbors. However, there is a trade off how effective is the extension and more complex computations involving with the next-next, next-next-next, neighbors of s or t. For an improvement, it is a challenge to detect some excluded Z-shaped paths (see Supplementary Fig. S1 online for the visualization, e.g. CZ-PL-SK-UA or BY-PL-UA-SK) in considering how to assign directions of edges or other technical ideas related to the extension of neighbors of s and t. Second, some directed planar graphs can exist in reality, although we assume undirected ones in this paper. If some edges are removed to be a acyclic graph, we may apply our method to such cases in satisfying the fitness condition and a homeomorphic boundary to circle[22]. It will be also a further study to perform some experiments in more complex networks, such as power-grid, gas-pipeline, water-supply, supply-chain, wireless communication system, and so on, in order to emphasize the practical effect of our method. Third, a method for counting the number of efficient paths has been discussed in a similar but different problem setting with link costs[23]. The efficient paths are considered within a small range beyond the shortest ones. This method has a polynomial time-complexity because of having link costs. Therefore, for the quantitative evaluation, it can be not compared to our method. Although the minimizing link costs, such as distances or travel times, is one of the selections, the maintaining flows within capacities or other objectives are also possible. We wander what criteria is the optimal or sub-optimal, it is not uniquely determined in depending on a purpose of application for utilizing paths in transportation or communication. Apart from a general counting method on a planar network in this paper, the discussion involves what is desirable on what target system is considered. Moreover, there are several robustness measures[24], average efficiency defined by the shortest path length, algebraic connectivity related to the graph spectrum, and so on, instead of our measure of the connectivity through paths. Their analyses are different respectively. Since we aim to investigate a local property: which pairs of vertices have many or few substitutive paths, the above global measures of whole network seem to be not suitable. Even if we concentrate the connectivity through paths as the robustness, the following problems are happen. We assume that one of non-intersecting paths is emergently used as the substitutive path instead of a disconnected usual path by unspecific disasters or attacks, while as specific ones, many malicious attacks have been known: high degree attacks[25], localized attacks (by removing a fraction of connected part)[26], loop destruction attacks[27], and others[28,29] for giving strong damages to a network. It is important to investigate how many non-intersecting paths are remained after such attacks. The worst case called critical node detection (CND)[30] is given by a set of vertices, whose removals minimize the connectivity of paths between vertices on the network. However, the CND problem becomes another NP-hard. Thus, the decreasing of the number of non-intersecting paths depends on the various types of attacks, further discussions are required through many computer simulations or theoretical analyses if possible.

Methods

Brief review of path matrix

We review the counting method of non-intersecting paths on a planar graph which is directed acyclic[17]. It has 2k boundary vertices of source and terminal, which are labeled counterclockwise as and , respectively, on a homeomorphic boundary to circle. Each edge has a direction, e.g. from left to right or from top to down (see Fig. 2a again). Such a graph satisfies the fitness condition[22]:where denotes a set of paths from to on the graph. This condition can be understood intuitively for a planar graph as follows. When , , , and are set on a circle’s circumference in the order of counterclockwise, the circle is divided into upper and lower parts by a path from to . Then, since is on the lower circle’s circumference while is on the upper circle’s circumference, any path from to must be intersect (crossing) to the path from to as the border line of division. if , , , and , then any two paths P and Q are intersect, A path matrix W is defined for a directed acyclic graph with 2k boundary vertices. Each element of W represents the number of paths from to , which may be intersecting. For example in Fig. 1, it is given byThus, the combination number is six for two non-intersecting paths from to and from to at the top in Fig. 1. Each element are calculated by token-passing, such as , , and shown at the bottom in Fig. 1. The above matrix W has a property of totally positivity. In general, a matrix W is called totally nonnegative (or positive) if each of its minor determinants is nonnegative (or positive)[17,21]. For example, this condition is unsatisfied when , then has to be connected to a path to one of or ; even if there exist one path from to or and another path from or to , these paths are intersect. A totally nonnegative matrix and its corresponding planar graphs are theoretically associated to the analysis of symmetric functions such as Schur polynomials[17], however the related discussion is beyond our current scope of practice. For a planar graph, its corresponding nonnegative matrix is determined uniquely, while the existing of some planar graphs is possible for a nonnegative matrix in the one-to-many relations. Returning to the remaining subject in our proposed method as mentioned later, we consider and as sets of connecting neighbors of two vertices s and t at different locations. In this case, the number or of boundary vertices is corresponded to a degree of vertex. Since the average degree is less than six in a planar graph[31], it is expected that k, , or is a small constant. Note that the direct computation of determinant is O(k!) for any matrix. However, even if k is large, a totally positive matrix can be factorized into a LU decomposition[17]where L and U denote lower triangle and upper triangle matrices, and are their diagonal i-th elements. Then, the determinant is quickly computed with O(k). As the preprocessing, the additional computation of LU decomposition is . We should remark that k is a given fixed integer, therefore the above evaluation becomes a constant multiplier for the time-complexity with respect to the size N or M.

How to count the combination number of non-intersecting paths

We propose a mapping to directed acyclic graphs from a given planar network. The directions of edges are changeable for chosen each pair of s and t. In the mapping, we must solve (1) how to assign a direction of edge, (2) how to define a path matrix W, and (3) how to calculate the element . We assume that , , s and t are not directly connected, otherwise the combination numbers of exceptional paths are counted in advance. For example, if there exist a direct path between s and t ( edge (s, t)) and another path of s--t via a common node , then instead of these exceptional two paths, the remaining paths from to are investigated after removing s, t, and to avoid passing through them on the other paths. In the following for the remaining paths, the connected part from to is mapped to a directed acyclic graph. Let us consider and for a pair of s and t on the network. Since a path matrix W is a square, we set as the smaller degree of vertex. As shown in Fig. 2a, the default suffix number from 1 to or is assigned according to the location of vertex in the orthogonal direction to the s-t line segment in order to satisfy the fitness condition. When two subsets of k vertices are chosen from and , they are renumbered from 1 to k by filling missing numbers of unchosen vertices. The total combination number of non-intersecting paths is given by the sum of countings for all of the combinations in choosing pairs of k vertices. In the case of choosing the next-nearest neighbors, a vertex in (or ) is chosen in corresponding to its connecting with the nearest neighbor (or ) of s (or t). Usually, and consist of different vertices. Here, the edges between s and or t and are ignored (removed) and not used in calculating to avoid that they become common vertices in the non-intersecting paths. Moreover, we consider the following greedy method without making cycles, which is slightly analogous to compass routing[32] in computer science. In principle, there are combinations of directions for the total M edges. However, in order to reduce the combinations, for an edge , one of two directions between its ends u and v is temporally assigned in to the s-t line segment. It can be checked by the inner-product of these vectors and (or ) based on which direction is suitable. Because the angle is in , when the inner-product is positive. As exceptions, the directions from s to and from to t are implicitly assumed to shape detour routes. Figure 2b illustrates detour routes. However this method excludes Z-shaped paths with mixing of forward and backward directional edges to the s-t line segment, therefore is not exact for counting paths. It gives just an approximate solution for practical use. In the scope for the definition of W, the related vertices to the paths should be included in an area whose boundary encloses the chosen pair of k vertices. Remember that the boundary can take any form which is homeomorphic to circle. After assigning the directions of edges according to a chosen pair of s and t, if a path from to is passing through the outside of both virtual lines - and - (or more than two lines) on the quadrilateral --- (or polygon ------ ) as shown in Fig. 6, then the path-matrix is not able to be applied because of the unsatisfied fitness condition. When such an outer path is found in the above pre-checking, it is treated individually and the remaining paths that are non-intersecting with the outer one are counted, e.g. in the case of (or ) after finding an outer path from to , the remaining non-intersecting path from to is explored (or in addition other non-intersecting paths from to from to are counted by using a path matrix).
Figure 6

Example of an exceptional case. Solid lines are paths. Dashed virtual lines form a boundary.

Example of an exceptional case. Solid lines are paths. Dashed virtual lines form a boundary. Token-passing from . (Top) Primary tokens which reach at first the layered vertices by hops. (Bottom-Left) Secondary tokens with a delay of one time-step delivered from the middle vertex on 1-hop layer. (Bottom-Right) Thirdly tokens with a delay of two time-steps delivered from the top vertex on 2-hop layer. The thickness of arrow is corresponding to the number of tokens: 1, 2, or 5. Each element is defined by the sum of primary, secondary, and thirdly tokens reached at the terminal vertices, in this case of and , or . On the above preparing, we calculate each element defined as the number of paths from to which may be intersecting. It is easily obtained by using token-passing as shown in Fig. 7 according to the directions of edges assigned for each pair of s and t, since the sum of received tokens at each vertex is equal to the number of paths from the source to that vertex. Here, the received tokens are broadcasted to the vertices which are connected by its outgoing edges. The computation of a set of elements is evaluated as follows. From to layered vertices by hops as shown in Fig. 7(Top), the primary tokens move on M edges at most. In addition, the number of some edges in a same layer is O(M) at most as shown in Fig. 7(Bottom), although they are few as expected. Each of these edges makes delayed flows on O(M) edges at most by the secondary, thirdly, tokens. Thus, the total time-complexity is estimated from pairs of s and t times by token-passing. Moreover, the token-passing is verified from the equivalence to a polynomial-time algorithm[33]. The graph is acyclic, therefore the passing process from to is terminated eventually without keeping turn-round of tokens forever. This halting property is important to be a practically solvable problem for counting non-intersecting paths.
Figure 7

Token-passing from . (Top) Primary tokens which reach at first the layered vertices by hops. (Bottom-Left) Secondary tokens with a delay of one time-step delivered from the middle vertex on 1-hop layer. (Bottom-Right) Thirdly tokens with a delay of two time-steps delivered from the top vertex on 2-hop layer. The thickness of arrow is corresponding to the number of tokens: 1, 2, or 5. Each element is defined by the sum of primary, secondary, and thirdly tokens reached at the terminal vertices, in this case of and , or .

Finally, we summarize these processes as the outline. For each setting of , the combination number of k non-intersecting paths is given by in choosing subsets of k vertices from and , and it is accumulated for all of the combinations of k vertices chosen as the subsets. We remark that the path matrix W and its elements are dynamically defined according to changeable directions of edges and chosen subsets of k vertices for each pair of s and t. Supplementary Information.
  8 in total

1.  Error and attack tolerance of complex networks

Authors: 
Journal:  Nature       Date:  2000-07-27       Impact factor: 49.962

Review 2.  Biological robustness.

Authors:  Hiroaki Kitano
Journal:  Nat Rev Genet       Date:  2004-11       Impact factor: 53.242

3.  Bicomponents and the robustness of networks to failure.

Authors:  M E J Newman; Gourab Ghoshal
Journal:  Phys Rev Lett       Date:  2008-03-31       Impact factor: 9.161

4.  Influence maximization in complex networks through optimal percolation.

Authors:  Flaviano Morone; Hernán A Makse
Journal:  Nature       Date:  2015-07-01       Impact factor: 49.962

Review 5.  Anticipating critical transitions.

Authors:  Marten Scheffer; Stephen R Carpenter; Timothy M Lenton; Jordi Bascompte; William Brock; Vasilis Dakos; Johan van de Koppel; Ingrid A van de Leemput; Simon A Levin; Egbert H van Nes; Mercedes Pascual; John Vandermeer
Journal:  Science       Date:  2012-10-19       Impact factor: 47.728

6.  Identifying optimal targets of network attack by belief propagation.

Authors:  Salomon Mugisha; Hai-Jun Zhou
Journal:  Phys Rev E       Date:  2016-07-11       Impact factor: 2.529

7.  Fast and simple decycling and dismantling of networks.

Authors:  Lenka Zdeborová; Pan Zhang; Hai-Jun Zhou
Journal:  Sci Rep       Date:  2016-11-29       Impact factor: 4.379

8.  The Downside of Heterogeneity: How Established Relations Counteract Systemic Adaptivity in Tasks Assignments.

Authors:  Giona Casiraghi; Christian Zingg; Frank Schweitzer
Journal:  Entropy (Basel)       Date:  2021-12-14       Impact factor: 2.524

  8 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.