[go: up one dir, main page]

Next Issue
Volume 7, June
Previous Issue
Volume 6, December
 
 

Algorithms, Volume 7, Issue 1 (March 2014) – 8 articles , Pages 1-187

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
71 KiB  
Editorial
Editorial: Special Issue on Algorithms for Sequence Analysis and Storage
by Veli Mäkinen
Algorithms 2014, 7(1), 186-187; https://doi.org/10.3390/a7010186 - 25 Mar 2014
Viewed by 5022
Abstract
This special issue of Algorithms is dedicated to approaches to biological sequence analysis that have algorithmic novelty and potential for fundamental impact in methods used for genome research. Full article
(This article belongs to the Special Issue Algorithms for Sequence Analysis and Storage)
507 KiB  
Article
Pareto Optimization or Cascaded Weighted Sum: A Comparison of Concepts
by Wilfried Jakob and Christian Blume
Algorithms 2014, 7(1), 166-185; https://doi.org/10.3390/a7010166 - 21 Mar 2014
Cited by 79 | Viewed by 10251 | Correction
Abstract
Looking at articles or conference papers published since the turn of the century, Pareto optimization is the dominating assessment method for multi-objective nonlinear optimization problems. However, is it always the method of choice for real-world applications, where either more than four objectives have [...] Read more.
Looking at articles or conference papers published since the turn of the century, Pareto optimization is the dominating assessment method for multi-objective nonlinear optimization problems. However, is it always the method of choice for real-world applications, where either more than four objectives have to be considered, or the same type of task is repeated again and again with only minor modifications, in an automated optimization or planning process? This paper presents a classification of application scenarios and compares the Pareto approach with an extended version of the weighted sum, called cascaded weighted sum, for the different scenarios. Its range of application within the field of multi-objective optimization is discussed as well as its strengths and weaknesses. Full article
Show Figures

Figure 1

Figure 1
<p>Feasible region <span class="html-italic">S</span> and its image, the feasible objective region <span class="html-italic">Z</span> for <span class="html-italic">n</span> = <span class="html-italic">k</span> = 2. The set of weakly Pareto optimal solutions is shown as a bold green line in the diagram on the right. The subset of Pareto optimal solutions is the part of the green line between the black circles. The ideal objective vector <span class="html-italic">z</span><b>*</b> consists of the upper bounds of the Pareto set.</p>
Full article ">Figure 2
<p>By using appropriate weights, every point of a convex Pareto front can be achieved by the weighted sum. Here, point <b>P</b> can be obtained for the weights <span class="html-italic">w</span><sub>1</sub> and <span class="html-italic">w</span><sub>2</sub>. The arrows show the movement direction of points where the largest quality gain is obtained.</p>
Full article ">Figure 3
<p>For non-convex Pareto fronts, it is possible that parts of the front can not be obtained by the weighted sum. The region between points <b>A</b> and <b>B</b> is an example of this serious draw back of this aggregation method.</p>
Full article ">Figure 4
<p>Example of a penalty function. It turns constraint violations into a penalty value between 1 and 0, which serves as a factor for decreasing the weighted sum.</p>
Full article ">Figure 5
<p>Restricted objective region using the <span class="html-italic">ε</span>-constrained method. The hatched region is excluded due to the lower bound <span class="html-italic">ε</span><sub>2</sub>. The remaining Pareto front is limited by <b>F1</b> and <b>F2</b>. For too large bounds like <span class="html-italic">ε<sub>bad</sub></span>, the problem becomes unsolvable.</p>
Full article ">Figure 6
<p>Cascaded weighted sum for <span class="html-italic">k</span> = 2 and objective two having a higher priority than objective one. Thus, solutions in the hatched area are bettered according to <span class="html-italic">f</span><sub>2</sub> only and will find the largest quality gain in upward moves (<b>red arrow</b>). This changes, if <span class="html-italic">ε</span><sub>2</sub> is exceeded and <span class="html-italic">f</span><sub>1</sub> starts to contribute to the resulting sum, as shown by the black arrows.</p>
Full article ">Figure 7
<p>Cascaded weighted sum and region of interest for the example with a non-convex Pareto front given in <a href="#algorithms-07-00166-f005" class="html-fig">Figure 5</a>.</p>
Full article ">Figure 8
<p>Tuning the normalization of Equation (3) (<b>blue straight line</b>) to the interval of interest of one objective <span class="html-italic">f<sub>i</sub></span>. The decline outside of this interval is reduced drastically to allow for a strong increase inside, as shown by the green graph.</p>
Full article ">Figure 9
<p>The number of required data points (Pareto-optimal solutions) of an approximation of a Pareto front increases exponentially with a growing number of conflicting objectives. The green line is based on a resolution of 7 data points per additional objective (axis), while the blue one uses 5 only.</p>
Full article ">Figure 10
<p>Both diagrams show a sample population of an advanced search more or less shortly before convergence. The CWS concentrates the best individuals (<b>black dots</b>) more or less on the region of interest, as shown in the left diagram. In contrast to that, Pareto-based optimization procedures attempt to distribute their solutions along the Pareto front as best as they can, see the right diagram. Thus, fewer solutions will be found in the area of interest.</p>
Full article ">
708 KiB  
Article
The Minimum Scheduling Time for Convergecast in Wireless Sensor Networks
by Changyong Jung, Suk Jin Lee and Vijay Bhuse
Algorithms 2014, 7(1), 145-165; https://doi.org/10.3390/a7010145 - 17 Mar 2014
Cited by 6 | Viewed by 5900
Abstract
We study the scheduling problem for data collection from sensor nodes to the sink node in wireless sensor networks, also referred to as the convergecast problem. The convergecast problem in general network topology has been proven to be NP-hard. In this paper, we [...] Read more.
We study the scheduling problem for data collection from sensor nodes to the sink node in wireless sensor networks, also referred to as the convergecast problem. The convergecast problem in general network topology has been proven to be NP-hard. In this paper, we propose our heuristic algorithm (finding the minimum scheduling time for convergecast (FMSTC)) for general network topology and evaluate the performance by simulation. The results of the simulation showed that the number of time slots to reach the sink node decreased with an increase in the power. We compared the performance of the proposed algorithm to the optimal time slots in a linear network topology. The proposed algorithm for convergecast in a general network topology has 2.27 times more time slots than that of a linear network topology. To the best of our knowledge, the proposed method is the first attempt to apply the optimal algorithm in a linear network topology to a general network topology. Full article
Show Figures

Figure 1

Figure 1
<p>Interference range when Node <span class="html-italic">u</span> sent a message to Node <span class="html-italic">v</span>.</p>
Full article ">Figure 2
<p>Node set (<span class="html-italic">Ns</span>) in the FMSTC algorithm (<span class="html-italic">v<sub>1</sub></span>, <span class="html-italic">v<sub>3</sub></span> and <span class="html-italic">v<sub>6</sub></span>, respectively, are chosen instead of <span class="html-italic">v<sub>2</sub></span><sub>,</sub> <span class="html-italic">v<sub>4</sub></span> and <span class="html-italic">v<sub>5</sub></span>, because they are closer to the sink node (<span class="html-italic">s</span>)).</p>
Full article ">Figure 3
<p>Building a sub-tree set.</p>
Full article ">Figure 4
<p>Constructing the minimum spanning trees for nodes in the node set (<span class="html-italic">Ns</span>) using the FMLSP algorithm.</p>
Full article ">Figure 5
<p>Optimal scheduling time in a linear topology with fixed power.</p>
Full article ">Figure 6
<p>(<b>a</b>) 40 sensors distribution with p = 3; (<b>b</b>) 50 sensors distribution with p = 3. Example of the simulation: <b>1</b>, node distribution; <b>2</b>, fully connected graph based on chosen nodes near the sink node; <b>3</b>, constructing minimum spanning trees.</p>
Full article ">Figure 7
<p>Scheduling time for convergecast in the general topology.</p>
Full article ">Figure 8
<p>Power <span class="html-italic">vs.</span> the number of nodes <span class="html-italic">vs.</span> optimal time slots in a linear topology.</p>
Full article ">Figure 9
<p>Power <span class="html-italic">vs.</span> number of nodes <span class="html-italic">vs.</span> time slots in the general topology.</p>
Full article ">
613 KiB  
Article
Modeling Dynamic Programming Problems over Sequences and Trees with Inverse Coupled Rewrite Systems
by Robert Giegerich and H´el'ene Touzet
Algorithms 2014, 7(1), 62-144; https://doi.org/10.3390/a7010062 - 7 Mar 2014
Cited by 13 | Viewed by 10630
Abstract
Dynamic programming is a classical algorithmic paradigm, which often allows the evaluation of a search space of exponential size in polynomial time. Recursive problem decomposition, tabulation of intermediate results for re-use, and Bellman’s Principle of Optimality are its well-understood ingredients. However, algorithms often [...] Read more.
Dynamic programming is a classical algorithmic paradigm, which often allows the evaluation of a search space of exponential size in polynomial time. Recursive problem decomposition, tabulation of intermediate results for re-use, and Bellman’s Principle of Optimality are its well-understood ingredients. However, algorithms often lack abstraction and are difficult to implement, tedious to debug, and delicate to modify. The present article proposes a generic framework for specifying dynamic programming problems. This framework can handle all kinds of sequential inputs, as well as tree-structured data. Biosequence analysis, document processing, molecular structure analysis, comparison of objects assembled in a hierarchic fashion, and generally, all domains come under consideration where strings and ordered, rooted trees serve as natural data representations. The new approach introduces inverse coupled rewrite systems. They describe the solutions of combinatorial optimization problems as the inverse image of a term rewrite relation that reduces problem solutions to problem inputs. This specification leads to concise yet translucent specifications of dynamic programming algorithms. Their actual implementation may be challenging, but eventually, as we hope, it can be produced automatically. The present article demonstrates the scope of this new approach by describing a diverse set of dynamic programming problems which arise in the domain of computational biology, with examples in biosequence and molecular structure analysis. Full article
(This article belongs to the Special Issue Algorithms for Sequence Analysis and Storage)
Show Figures

Figure 1

Figure 1
<p>Overview of sequence analysis problems addressed in <a href="#sec5-algorithms-07-00062" class="html-sec">Section 5</a>. Solid arrow lines indicate transformations between icores that are detailed in the text. Dashed arrow lines indicate transformations that are left as exercise for the reader.</p>
Full article ">Figure 2
<p>(<b>a</b>) Finite State Automaton for alignment with affine gap weights (source [<a href="#B20-algorithms-07-00062" class="html-bibr">20</a>]); (<b>b</b>) Dependency graph for the grammar <span class="html-small-caps">Affi</span>; (<b>c</b>) for the grammar <span class="html-small-caps">AffiOsci</span>; (<b>d</b>) and for the grammar <span class="html-small-caps">AffiTrace</span>. The start state/axiom symbol is marked by an arrowhead.</p>
Full article ">Figure 3
<p>(<b>a</b>) Graphical representation of a profile HMM (left, source: [<a href="#B20-algorithms-07-00062" class="html-bibr">20</a>], <a href="#algorithms-07-00062-f005" class="html-fig">Figure 5</a>.2.); (<b>b</b>) dependency graph for grammar <span class="html-small-caps">MatchAffi_S</span>; (<b>c</b>) for <span class="html-small-caps">MatchOsci_S</span>; and (<b>d</b>) <span class="html-small-caps">MatchTrace_S</span>.</p>
Full article ">Figure 4
<p>Example of RNA secondary structure. This diagram shows a 2D representation of a secondary structure for the sequence <tt>"ACGACGGAUCUU"</tt> (left). This structure contains four base pairings: <tt>A-U</tt>, <tt>C-G</tt>, <tt>G-C</tt> and <tt>G-C</tt>. We also display its bracket-dot representation (middle), and its encoding within the satellite signature <span class="html-italic">RNA</span>, <span class="html-italic">SAS</span> and <span class="html-italic">DOT</span> (right).</p>
Full article ">Figure 5
<p>Operators for edit operations in the core signature. Deletion of a base pair may remove both bases (<math display="inline"> <mrow> <mi mathvariant="monospace">pair</mi> <mo>_</mo> <mi mathvariant="monospace">del</mi> </mrow> </math>) or solely the 5’ or 3’ partner leaving the remaining partner as a bulge (<math display="inline"> <mrow> <mi mathvariant="monospace">pairL</mi> <mo>_</mo> <mi mathvariant="monospace">del</mi> </mrow> </math> and <math display="inline"> <mrow> <mi mathvariant="monospace">pairR</mi> <mo>_</mo> <mi mathvariant="monospace">del</mi> </mrow> </math>). Symmetrically, we have all operators for insertion operations.</p>
Full article ">Figure 6
<p>Core term for secondary structure of <a href="#algorithms-07-00062-f004" class="html-fig">Figure 4</a>.</p>
Full article ">Figure 7
<p>Example of a structural RNA alignment. Vertical bars indicate matching bases in the sequences. Note that the two structures are different, but similar.</p>
Full article ">Figure 8
<p>Overview of all RNA related problems adressed in <a href="#sec6-algorithms-07-00062" class="html-sec">Section 6</a>. These problems are classified according to the edit operations they use (column on the left) and to the kind of inputs. For each problem, we indicate meaningful restrictions that are detailed in the text.</p>
Full article ">Figure 9
<p>Relationships between our five main RNA problems.</p>
Full article ">Figure 10
<p>Gaps for tree comparison.</p>
Full article ">Figure 11
<p>Graphical view of tree alignment with oscillating gaps. Core operators <math display="inline"><mi mathvariant="monospace">mty</mi></math> and ∼ are not shown. Note that after the gap opening for the deletion of <span class="html-italic">e</span>, oscillation allows for a gap extension when inserting <span class="html-italic">f</span>. In this core term, the top <math display="inline"><mi mathvariant="monospace">rep</mi></math> node and the <math display="inline"><mrow> <mi mathvariant="monospace">open</mi> <mo>_</mo> <mi mathvariant="monospace">del</mi> </mrow></math> are derived from nonterminal symbol <span class="html-italic">N</span>, the two <math display="inline"><mi mathvariant="monospace">ins</mi></math> nodes from <span class="html-italic">S</span>, and the others from <span class="html-italic">P</span>.</p>
Full article ">Figure 12
<p>Structure representation where a <span class="html-italic">P</span>-node indicates a base pair bond between its left- and rightmost child, while the other subtrees represent structures enclosed by this base pair. In this representation, the left- or rightmost child of a <span class="html-italic">P</span>-node can never be another <span class="html-italic">P</span>-node, while the other children can.</p>
Full article ">Figure 13
<p>Transducers for edit string distance: simple edit distance (left) and edit distance with affine gap weights (right). In Searls’ terminology, these transducers are called <span class="html-italic">editors</span>.</p>
Full article ">
80 KiB  
Editorial
Acknowledgement to Reviewers of Algorithms in 2013
by Algorithms Editorial Office
Algorithms 2014, 7(1), 60-61; https://doi.org/10.3390/a7010060 - 25 Feb 2014
Viewed by 4468
Abstract
The editors of Algorithms would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2013. [...] Full article
312 KiB  
Article
Choice Function-Based Two-Sided Markets: Stability, Lattice Property, Path Independence and Algorithms
by Tamàs Fleiner and Zsuzsanna Jankó
Algorithms 2014, 7(1), 32-59; https://doi.org/10.3390/a7010032 - 14 Feb 2014
Cited by 13 | Viewed by 6006
Abstract
We build an abstract model, closely related to the stable marriage problem and motivated by Hungarian college admissions. We study different stability notions and show that an extension of the lattice property of stable marriages holds in these more general settings, even if [...] Read more.
We build an abstract model, closely related to the stable marriage problem and motivated by Hungarian college admissions. We study different stability notions and show that an extension of the lattice property of stable marriages holds in these more general settings, even if the choice function on one side is not path independent. We lean on Tarski’s fixed point theorem and the substitutability property of choice functions. The main virtue of the work is that it exhibits practical, interesting examples, where non-path independent choice functions play a role, and proves various stability-related results. Full article
(This article belongs to the Special Issue Special Issue on Matching under Preferences)
Show Figures

Figure 1

Figure 1
<p>Three-partition of the edge-set.</p>
Full article ">Figure 2
<p>Example for three-stability.</p>
Full article ">Figure 3
<p>Four-partition of the edge-set.</p>
Full article ">Figure 4
<p><span class="html-italic">A counterexample</span>.</p>
Full article ">Figure 5
<p>Graphs of the connections.</p>
Full article ">Figure 6
<p>Score-decreasing algorithm.</p>
Full article ">Figure 7
<p>Score-increasing algorithm.</p>
Full article ">Figure 8
<p>Four-partition.</p>
Full article ">Figure 9
<p>Example graph 3.</p>
Full article ">Figure 10
<p>Example graph 4.</p>
Full article ">Figure 11
<p>Example graph 5.</p>
Full article ">Figure 12
<p>Example graph 6.</p>
Full article ">Figure 13
<p>Example graph 7.</p>
Full article ">
251 KiB  
Article
Bio-Inspired Meta-Heuristics for Emergency Transportation Problems
by Min-Xia Zhang, Bei Zhang and Yu-Jun Zheng
Algorithms 2014, 7(1), 15-31; https://doi.org/10.3390/a7010015 - 11 Feb 2014
Cited by 18 | Viewed by 7152
Abstract
Emergency transportation plays a vital role in the success of disaster rescue and relief operations, but its planning and scheduling often involve complex objectives and search spaces. In this paper, we conduct a survey of recent advances in bio-inspired meta-heuristics, including genetic algorithms [...] Read more.
Emergency transportation plays a vital role in the success of disaster rescue and relief operations, but its planning and scheduling often involve complex objectives and search spaces. In this paper, we conduct a survey of recent advances in bio-inspired meta-heuristics, including genetic algorithms (GA), particle swarm optimization (PSO), ant colony optimization (ACO), etc., for solving emergency transportation problems. We then propose a new hybrid biogeography-based optimization (BBO) algorithm, which outperforms some state-of-the-art heuristics on a typical transportation planning problem. Full article
231 KiB  
Article
On Stable Matchings and Flows
by Tamás Fleiner
Algorithms 2014, 7(1), 1-14; https://doi.org/10.3390/a7010001 - 22 Jan 2014
Cited by 10 | Viewed by 6384
Abstract
We describe a flow model related to ordinary network flows the same way as stable matchings are related to maximum matchings in bipartite graphs. We prove that there always exists a stable flow and generalize the lattice structure of stable marriages to stable [...] Read more.
We describe a flow model related to ordinary network flows the same way as stable matchings are related to maximum matchings in bipartite graphs. We prove that there always exists a stable flow and generalize the lattice structure of stable marriages to stable flows. Our main tool is a straightforward reduction of the stable flow problem to stable allocations. For the sake of completeness, we prove the results we need on stable allocations as an application of Tarski’s fixed point theorem. Full article
(This article belongs to the Special Issue Special Issue on Matching under Preferences)
Show Figures

Figure 1

Figure 1
<p>Node splitting to create <math display="inline"> <msub> <mi>G</mi> <mi>D</mi> </msub> </math>.</p>
Full article ">Figure 2
<p>Stable flows have a blocking cycle.</p>
Full article ">Figure 3
<p>Network for a stable flow.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop