-
The Complexity of 2-Intersection Graphs of 3-Hypergraphs Recognition for Claw-free Graphs and triangulated Claw-free Graphs
Authors:
Niccolò Di Marco,
Andrea Frosini,
Christophe Picouleau
Abstract:
Given a 3-uniform hypergraph H, its 2-intersection graph G has for vertex set the hyperedges of H and ee' is an edge of G whenever e and e' have exactly two common vertices in H. Di Marco et al. prove that deciding wether a graph G is the 2-intersection graph of a 3-uniform hypergraph is NP-complete. The main problems we study concern the class of claw-free graphs. We show that the recognition pro…
▽ More
Given a 3-uniform hypergraph H, its 2-intersection graph G has for vertex set the hyperedges of H and ee' is an edge of G whenever e and e' have exactly two common vertices in H. Di Marco et al. prove that deciding wether a graph G is the 2-intersection graph of a 3-uniform hypergraph is NP-complete. The main problems we study concern the class of claw-free graphs. We show that the recognition problem remains NP-complete when G is claw-free graphs but becomes polynomial if in addition G is triangulated.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
On a conjecture on prime double square tiles
Authors:
Michela Ascolese,
Andrea Frosini
Abstract:
In [2], while studying a relevant class of polyominoes that tile the plane by translation, i.e., double square polyominoes, the authors found that their boundary words, encoded by the Freeman chain coding on a four letters alphabet, have specific interesting properties that involve notions of combinatorics on words such as palindromicity, periodicity and symmetry. Furthermore, they defined a notio…
▽ More
In [2], while studying a relevant class of polyominoes that tile the plane by translation, i.e., double square polyominoes, the authors found that their boundary words, encoded by the Freeman chain coding on a four letters alphabet, have specific interesting properties that involve notions of combinatorics on words such as palindromicity, periodicity and symmetry. Furthermore, they defined a notion of reducibility on double squares using homologous morphisms, so leading to a set of irreducible tile elements called prime double squares. The authors, by inspecting the boundary words of the smallest prime double squares, conjectured the strong property that no runs of two (or more) consecutive equal letters are present there. In this paper, we prove such a conjecture using combinatorics on words tools, and setting the path to the definition of a fast generation algorithm and to the possibility of enumerating the elements of this class w.r.t. standard parameters, as perimeter and area.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
Logarithmic equal-letter runs for BWT of purely morphic words
Authors:
Andrea Frosini,
Ilaria Mancini,
Simone Rinaldi,
Giuseppe Romana,
Marinella Sciortino
Abstract:
In this paper we study the number $r_{bwt}$ of equal-letter runs produced by the Burrows-Wheeler transform ($BWT$) when it is applied to purely morphic finite words, which are words generated by iterating prolongable morphisms. Such a parameter $r_{bwt}$ is very significant since it provides a measure of the performances of the $BWT$, in terms of both compressibility and indexing. In particular, w…
▽ More
In this paper we study the number $r_{bwt}$ of equal-letter runs produced by the Burrows-Wheeler transform ($BWT$) when it is applied to purely morphic finite words, which are words generated by iterating prolongable morphisms. Such a parameter $r_{bwt}$ is very significant since it provides a measure of the performances of the $BWT$, in terms of both compressibility and indexing. In particular, we prove that, when $BWT$ is applied to any purely morphic finite word on a binary alphabet, $r_{bwt}$ is $\mathcal{O}(\log n)$, where $n$ is the length of the word. Moreover, we prove that $r_{bwt}$ is $Θ(\log n)$ for the binary words generated by a large class of prolongable binary morphisms. These bounds are proved by providing some new structural properties of the \emph{bispecial circular factors} of such words.
△ Less
Submitted 5 February, 2022;
originally announced February 2022.
-
On some geometric aspects of the class of hv-convex switching components
Authors:
Paolo Dulio,
Andrea Frosini
Abstract:
In the usual aim of discrete tomography, the reconstruction of an unknown discrete set is considered, by means of projection data collected along a set $U$ of discrete directions. Possible ambiguous reconstructions can arise if and only if switching components occur, namely, if and only if non-empty images exist having null projections along all the directions in $U$. In order to lower the number…
▽ More
In the usual aim of discrete tomography, the reconstruction of an unknown discrete set is considered, by means of projection data collected along a set $U$ of discrete directions. Possible ambiguous reconstructions can arise if and only if switching components occur, namely, if and only if non-empty images exist having null projections along all the directions in $U$. In order to lower the number of allowed reconstructions, one tries to incorporate possible extra geometric constraints in the tomographic problem. In particular, the class $\mathbb{P}$ of horizontally and vertically convex connected sets (briefly, $hv$-convex polyominoes) has been largely considered. In this paper we introduce the class of $hv$-convex switching components, and prove some preliminary results on their geometric structure. The class includes all switching components arising when the tomographic problem is considered in $\mathbb{P}$, which highly motivates the investigation of such configurations. It turns out that the considered class can be partitioned in two disjointed subclasses of closed patterns, called windows and curls, respectively. It follows that all windows have a unique representation, while curls consist of interlaced sequences of sub-patterns, called $Z$-paths, which leads to the problem of understanding the combinatorial structure of such sequences. We provide explicit constructions of families of curls associated to some special sequences, and also give additional details on further allowed or forbidden configurations by means of a number of illustrative examples.
△ Less
Submitted 11 December, 2020;
originally announced December 2020.
-
A study on the fixed points of the $γ$ function
Authors:
Andrea Frosini,
Giulia Palma,
Elisa Pergola,
Simone Rinaldi
Abstract:
Recently a permutation on Dyck paths, related to the chip firing game, was introduced and studied by Barnabei et al.. It is called $γ$-operator, and uses symmetries and reflections to relate Dyck paths having the same length. A relevant research topic concerns the study of the fixed points of $γ$ and a characterization of these objects was provided by Barnabei et al, leaving the problem of their e…
▽ More
Recently a permutation on Dyck paths, related to the chip firing game, was introduced and studied by Barnabei et al.. It is called $γ$-operator, and uses symmetries and reflections to relate Dyck paths having the same length. A relevant research topic concerns the study of the fixed points of $γ$ and a characterization of these objects was provided by Barnabei et al, leaving the problem of their enumeration open. In this paper, using tools from combinatorics of words, we determine new combinatorial properties of the fixed points of $γ$. Then we present an algorithm, denoted by \textbf{GenGammaPath}($t$), which receives as input an array $t=(t_0, \ldots ,t_{k})$ of positive integers and generates all the elements of $F_γ$ with degree $k$.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
Video Surveillance of Highway Traffic Events by Deep Learning Architectures
Authors:
Matteo Tiezzi,
Stefano Melacci,
Marco Maggini,
Angelo Frosini
Abstract:
In this paper we describe a video surveillance system able to detect traffic events in videos acquired by fixed videocameras on highways. The events of interest consist in a specific sequence of situations that occur in the video, as for instance a vehicle stop** on the emergency lane. Hence, the detection of these events requires to analyze a temporal sequence in the video stream. We compare di…
▽ More
In this paper we describe a video surveillance system able to detect traffic events in videos acquired by fixed videocameras on highways. The events of interest consist in a specific sequence of situations that occur in the video, as for instance a vehicle stop** on the emergency lane. Hence, the detection of these events requires to analyze a temporal sequence in the video stream. We compare different approaches that exploit architectures based on Recurrent Neural Networks (RNNs) and Convolutional Neural Networks (CNNs). A first approach extracts vectors of features, mostly related to motion, from each video frame and exploits a RNN fed with the resulting sequence of vectors. The other approaches are based directly on the sequence of frames, that are eventually enriched with pixel-wise motion information. The obtained stream is processed by an architecture that stacks a CNN and a RNN, and we also investigate a transfer-learning-based model. The results are very promising and the best architecture will be tested online in real operative conditions.
△ Less
Submitted 6 September, 2019;
originally announced September 2019.
-
Permutation classes and polyomino classes with excluded submatrices
Authors:
Daniela Battaglino,
Mathilde Bouvel,
Andrea Frosini,
Simone Rinaldi
Abstract:
This article introduces an analogue of permutation classes in the context of polyominoes. For both permutation classes and polyomino classes, we present an original way of characterizing them by avoidance constraints (namely, with excluded submatrices) and we discuss how canonical such a description by submatrix-avoidance can be. We provide numerous examples of permutation and polyomino classes wh…
▽ More
This article introduces an analogue of permutation classes in the context of polyominoes. For both permutation classes and polyomino classes, we present an original way of characterizing them by avoidance constraints (namely, with excluded submatrices) and we discuss how canonical such a description by submatrix-avoidance can be. We provide numerous examples of permutation and polyomino classes which may be defined and studied from the submatrix-avoidance point of view, and conclude with various directions for future research on this topic.
△ Less
Submitted 27 November, 2014; v1 submitted 10 February, 2014;
originally announced February 2014.
-
Characterization of the degree sequences of (quasi) regular uniform hypergraphs
Authors:
A. Frosini,
C. Picouleau,
S. Rinaldi
Abstract:
In hypergraph theory, determining a characterization of the degree sequence $d=(d_1,d_2,\ldots,d_n)$ where $d_1\ge d_2\ge\ldots,d_n$ are positive integers, of an $h$-uniform simple hypergraph $\cal H$, and deciding the complexity status of the reconstruction of $\cal H$ from $d$, are two challenging open problems. They can be formulated in the context of discrete tomography: asks whether there is…
▽ More
In hypergraph theory, determining a characterization of the degree sequence $d=(d_1,d_2,\ldots,d_n)$ where $d_1\ge d_2\ge\ldots,d_n$ are positive integers, of an $h$-uniform simple hypergraph $\cal H$, and deciding the complexity status of the reconstruction of $\cal H$ from $d$, are two challenging open problems. They can be formulated in the context of discrete tomography: asks whether there is a matrix $A$ with positive projection vectors $H=(h,h,\ldots,h)$ and $V=(d_1,d_2,\ldots,d_n)$ with distinct rows. In this paper we consider the two subcases where the vector $V$ is an homogeneous vector, and where $V$ is almost homogeneous, i.e., $d_1-d_n=1$. We give a simple characterization for these two subcases, and we show how to solve the related reconstruction problems in polynomial time. To reach our goal, we use the concepts of Lyndon words and necklaces of fixed density, and we apply some already known algorithms for their efficient generation.
△ Less
Submitted 30 September, 2013;
originally announced September 2013.
-
A closed formula for the number of convex permutominoes
Authors:
Filippo Disanto,
Andrea Frosini,
Renzo Pinzani,
Simone Rinaldi
Abstract:
In this paper we determine a closed formula for the number of convex permutominoes of size n. We reach this goal by providing a recursive generation of all convex permutominoes of size n+1 from the objects of size n, according to the ECO method, and then translating this construction into a system of functional equations satisfied by the generating function of convex permutominoes. As a conseque…
▽ More
In this paper we determine a closed formula for the number of convex permutominoes of size n. We reach this goal by providing a recursive generation of all convex permutominoes of size n+1 from the objects of size n, according to the ECO method, and then translating this construction into a system of functional equations satisfied by the generating function of convex permutominoes. As a consequence we easily obtain also the enumeration of some classes of convex polyominoes, including stack and directed convex permutominoes.
△ Less
Submitted 19 February, 2007;
originally announced February 2007.
-
Binary Matrices under the Microscope: A Tomographical Problem
Authors:
A. Frosini,
M. Nivat
Abstract:
A binary matrix can be scanned by moving a fixed rectangular window (submatrix) across it, rather like examining it closely under a microscope. With each viewing, a convenient measurement is the number of 1s visible in the window, which might be thought of as the luminosity of the window. The rectangular scan of the binary matrix is then the collection of these luminosities presented in matrix f…
▽ More
A binary matrix can be scanned by moving a fixed rectangular window (submatrix) across it, rather like examining it closely under a microscope. With each viewing, a convenient measurement is the number of 1s visible in the window, which might be thought of as the luminosity of the window. The rectangular scan of the binary matrix is then the collection of these luminosities presented in matrix form. We show that, at least in the technical case of a smooth m x n binary matrix, it canbe reconstructed from its rectangular scan in polynomial time in the parameters m and n, where the degree of the polynomial depends on the size of the window of inspection. For an arbitrary binary matrix, we then extend this result by determining the entries in its rectangular scan that preclude the smoothness of the matrix.
△ Less
Submitted 28 September, 2006;
originally announced September 2006.
-
Discrete Tomography: Reconstruction under periodicity constraints
Authors:
Alberto Del Lungo,
Andrea Frosini,
Maurice Nivat,
Laurent Vuillon
Abstract:
This paper studies the problem of reconstructing binary matrices that are only accessible through few evaluations of their discrete X-rays. Such question is prominently motivated by the demand in material science for develo** a tool for the reconstruction of crystalline structures from their images obtained by high-resolution transmission electron microscopy. Various approaches have been sugge…
▽ More
This paper studies the problem of reconstructing binary matrices that are only accessible through few evaluations of their discrete X-rays. Such question is prominently motivated by the demand in material science for develo** a tool for the reconstruction of crystalline structures from their images obtained by high-resolution transmission electron microscopy. Various approaches have been suggested for solving the general problem of reconstructing binary matrices that are given by their discrete X-rays in a number of directions, but more work have to be done to handle the ill-posedness of the problem. We can tackle this ill-posedness by limiting the set of possible solutions, by using appropriate a priori information, to only those which are reasonably typical of the class of matrices which contains the unknown matrix that we wish to reconstruct. Mathematically, this information is modelled in terms of a class of binary matrices to which the solution must belong. Several papers study the problem on classes of binary matrices on which some connectivity and convexity constraints are imposed. We study the reconstruction problem on some new classes consisting of binary matrices with periodicity properties, and we propose a polynomial-time algorithm for reconstructing these binary matrices from their orthogonal discrete X-rays.
△ Less
Submitted 27 May, 2002;
originally announced May 2002.