-
A Learning Search Algorithm for the Restricted Longest Common Subsequence Problem
Authors:
Marko Djukanović,
Jaume Reixach,
Ana Nikolikj,
Tome Eftimov,
Aleksandar Kartelj,
Christian Blum
Abstract:
This paper addresses the Restricted Longest Common Subsequence (RLCS) problem, an extension of the well-known Longest Common Subsequence (LCS) problem. This problem has significant applications in bioinformatics, particularly for identifying similarities and discovering mutual patterns and important motifs among DNA, RNA, and protein sequences. Building on recent advancements in solving this probl…
▽ More
This paper addresses the Restricted Longest Common Subsequence (RLCS) problem, an extension of the well-known Longest Common Subsequence (LCS) problem. This problem has significant applications in bioinformatics, particularly for identifying similarities and discovering mutual patterns and important motifs among DNA, RNA, and protein sequences. Building on recent advancements in solving this problem through a general search framework, this paper introduces two novel heuristic approaches designed to enhance the search process by steering it towards promising regions in the search space. The first heuristic employs a probabilistic model to evaluate partial solutions during the search process. The second heuristic is based on a neural network model trained offline using a genetic algorithm. A key aspect of this approach is extracting problem-specific features of partial solutions and the complete problem instance. An effective hybrid method, referred to as the learning beam search, is developed by combining the trained neural network model with a beam search framework. An important contribution of this paper is found in the generation of real-world instances where scientific abstracts serve as input strings, and a set of frequently occurring academic words from the literature are used as restricted patterns. Comprehensive experimental evaluations demonstrate the effectiveness of the proposed approaches in solving the RLCS problem. Finally, an empirical explainability analysis is applied to the obtained results. In this way, key feature combinations and their respective contributions to the success or failure of the algorithms across different problem types are identified.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
A Three-Stage Algorithm for the Closest String Problem on Artificial and Real Gene Sequences
Authors:
Alireza Abdi,
Marko Djukanovic,
Hesam Tahmasebi Boldaji,
Hadis Salehi,
Aleksandar Kartelj
Abstract:
The Closest String Problem is an NP-hard problem that aims to find a string that has the minimum distance from all sequences that belong to the given set of strings. Its applications can be found in coding theory, computational biology, and designing degenerated primers, among others. There are efficient exact algorithms that have reached high-quality solutions for binary sequences. However, there…
▽ More
The Closest String Problem is an NP-hard problem that aims to find a string that has the minimum distance from all sequences that belong to the given set of strings. Its applications can be found in coding theory, computational biology, and designing degenerated primers, among others. There are efficient exact algorithms that have reached high-quality solutions for binary sequences. However, there is still room for improvement concerning the quality of solutions over DNA and protein sequences. In this paper, we introduce a three-stage algorithm that comprises the following process: first, we apply a novel alphabet pruning method to reduce the search space for effectively finding promising search regions. Second, a variant of beam search to find a heuristic solution is employed. This method utilizes a newly developed guiding function based on an expected distance heuristic score of partial solutions. Last, we introduce a local search to improve the quality of the solution obtained from the beam search. Furthermore, due to the lack of real-world benchmarks, two real-world datasets are introduced to verify the robustness of the method. The extensive experimental results show that the proposed method outperforms the previous approaches from the literature.
△ Less
Submitted 17 July, 2024;
originally announced July 2024.
-
Graph Protection under Multiple Simultaneous Attacks: A Heuristic Approach
Authors:
Marko Djukanovic,
Stefan Kapunac,
Aleksandar Kartelj,
Dragan Matic
Abstract:
This work focuses on developing an effective meta-heuristic approach to protect against simultaneous attacks on nodes of a network modeled using a graph. Specifically, we focus on the $k$-strong Roman domination problem, a generalization of the well-known Roman domination problem on graphs. This general problem is about assigning integer weights to nodes that represent the number of field armies s…
▽ More
This work focuses on developing an effective meta-heuristic approach to protect against simultaneous attacks on nodes of a network modeled using a graph. Specifically, we focus on the $k$-strong Roman domination problem, a generalization of the well-known Roman domination problem on graphs. This general problem is about assigning integer weights to nodes that represent the number of field armies stationed at each node in order to satisfy the protection constraints while minimizing the total weights. These constraints concern the protection of a graph against any simultaneous attack consisting of $k \in \mathbb{N}$ nodes. An attack is considered repelled if each node labeled 0 can be defended by borrowing an army from one of its neighboring nodes, ensuring that the neighbor retains at least one army for self-defense. The $k$-SRD problem has practical applications in various areas, such as developing counter-terrorism strategies or managing supply chain disruptions. The solution to this problem is notoriously difficult to find, as even checking the feasibility of the proposed solution requires an exponential number of steps. We propose a variable neighborhood search algorithm in which the feasibility of the solution is checked by introducing the concept of quasi-feasibility, which is realized by careful sampling within the set of all possible attacks. Extensive experimental evaluations show the scalability and robustness of the proposed approach compared to the two exact approaches from the literature. Experiments are conducted with random networks from the literature and newly introduced random wireless networks as well as with real-world networks. A practical application scenario, using real-world networks, involves applying our approach to graphs extracted from GeoJSON files containing geographic features of hundreds of cities or larger regions.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Theoretical Studies of the k-Strong Roman Domination Problem
Authors:
Bojan Nikolić,
Marko Djukanović,
Milana Grbić,
Dragan Matić
Abstract:
The concept of Roman domination has been a subject of intrigue for more than two decades with the fundamental Roman domination problem standing out as one of the most significant challenges in this field. This article studies a practically motivated generalization of this problem, known as the k-strong Roman domination. In this variation, defenders within a network are tasked with safeguarding any…
▽ More
The concept of Roman domination has been a subject of intrigue for more than two decades with the fundamental Roman domination problem standing out as one of the most significant challenges in this field. This article studies a practically motivated generalization of this problem, known as the k-strong Roman domination. In this variation, defenders within a network are tasked with safeguarding any k vertices simultaneously, under multiple attacks. The objective is to find a feasible mapping that assigns an (integer) weight to each vertex of the input graph with a minimum sum of weights across all vertices. A function is considered feasible if any non-defended vertex, i.e. one labeled by zero, is protected by at least one of its neighboring vertices labeled by at least two. Furthermore, each defender ensures the safety of a non-defended vertex by imparting a value of one to it while always retaining a one for themselves. To the best of our knowledge, this paper represents the first theoretical study on this problem. The study presents results for general graphs, establishes connections between the problem at hand and other domination problems, and provides exact values and bounds for specific graph classes, including complete graphs, paths, cycles, complete bipartite graphs, grids, and a few selected classes of convex polytopes. Additionally, an attainable lower bound for general cubic graphs is provided.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
Signed double Roman domination on cubic graphs
Authors:
Enrico Iurlano,
Tatjana Zec,
Marko Djukanovic,
Günther R. Raidl
Abstract:
The signed double Roman domination problem is a combinatorial optimization problem on a graph asking to assign a label from $\{\pm{}1,2,3\}$ to each vertex feasibly, such that the total sum of assigned labels is minimized. Here feasibility is given whenever (i) vertices labeled $\pm{}1$ have at least one neighbor with label in $\{2,3\}$; (ii) each vertex labeled $-1$ has one $3$-labeled neighbor o…
▽ More
The signed double Roman domination problem is a combinatorial optimization problem on a graph asking to assign a label from $\{\pm{}1,2,3\}$ to each vertex feasibly, such that the total sum of assigned labels is minimized. Here feasibility is given whenever (i) vertices labeled $\pm{}1$ have at least one neighbor with label in $\{2,3\}$; (ii) each vertex labeled $-1$ has one $3$-labeled neighbor or at least two $2$-labeled neighbors; and (iii) the sum of labels over the closed neighborhood of any vertex is positive. The cumulative weight of an optimal labeling is called signed double Roman domination number (SDRDN). In this work, we first consider the problem on general cubic graphs of order $n$ for which we present a sharp $n/2+Θ(1)$ lower bound for the SDRDN by means of the discharging method. Moreover, we derive a new best upper bound. Observing that we are often able to minimize the SDRDN over the class of cubic graphs of a fixed order, we then study in this context generalized Petersen graphs for independent interest, for which we propose a constraint programming guided proof. We then use these insights to determine the SDRDNs of subcubic $2\times m$ grid graphs, among other results.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
The Signed (Total) Roman Domination Problem on some Classes of Planar Graphs -- Convex Polytopes
Authors:
Tatjana Zec,
Marko Djukanovic,
Dragan Matic
Abstract:
In this paper we deal with the calculation of the signed (total) Roman domination numbers, $γ_{sR}$ and $γ_{stR}$ respectively, on a few classes of planar graphs from the literature. We give proofs for the exact values of the numbers $γ_{sR}(A_n)$ and $γ_{sR}(R_n)$ as well as the numbers
$γ_{stR}(S_n)$ and $γ_{stR}(T_n)$. For some other classes of planar graphs, such as $Q_n$, %$S_n"$ and…
▽ More
In this paper we deal with the calculation of the signed (total) Roman domination numbers, $γ_{sR}$ and $γ_{stR}$ respectively, on a few classes of planar graphs from the literature. We give proofs for the exact values of the numbers $γ_{sR}(A_n)$ and $γ_{sR}(R_n)$ as well as the numbers
$γ_{stR}(S_n)$ and $γ_{stR}(T_n)$. For some other classes of planar graphs, such as $Q_n$, %$S_n"$ and $T_n"$, lower and upper bounds on $γ_{sR}$ are calculated and proved. %We give some open problems on the exact values of $γ_{sR}$ and $γ_{stR}$ for some classes of planar graphs.
△ Less
Submitted 17 July, 2021;
originally announced July 2021.
-
Families of (3,3)-split Jacobians
Authors:
Martin Djukanović
Abstract:
We compute all the "special" cases of (3,3)-split Jacobians and we parametrize the Igusa-Clebsch invariants of curves of genus two whose Jacobian is (3,3)-isogenous to a product of two elliptic curves from the Hesse pencil.
We compute all the "special" cases of (3,3)-split Jacobians and we parametrize the Igusa-Clebsch invariants of curves of genus two whose Jacobian is (3,3)-isogenous to a product of two elliptic curves from the Hesse pencil.
△ Less
Submitted 29 September, 2019; v1 submitted 25 November, 2018;
originally announced November 2018.
-
Generalizations of Divisor Methods to Approval and Score Voting
Authors:
Martin Djukanović
Abstract:
We introduce several electoral systems for multi-winner elections with approval ballots, generalizing the classical methods of Sainte-Laguë and D'Hondt. Our approach is based on the works of Phragmén and Thiele. In the last section we discuss possible generalizations to score voting.
We introduce several electoral systems for multi-winner elections with approval ballots, generalizing the classical methods of Sainte-Laguë and D'Hondt. Our approach is based on the works of Phragmén and Thiele. In the last section we discuss possible generalizations to score voting.
△ Less
Submitted 23 January, 2017; v1 submitted 9 January, 2017;
originally announced January 2017.