-
Computational Complexity-Constrained Spectral Efficiency Analysis for 6G Waveforms
Authors:
Saulo Queiroz,
João P. Vilela,
Benjamin Koon Kei Ng,
Chan-Tong Lam,
Edmundo Monteiro
Abstract:
In this work, we present a tutorial on how to account for the computational time complexity overhead of signal processing in the spectral efficiency (SE) analysis of wireless waveforms. Our methodology is particularly relevant in scenarios where achieving higher SE entails a penalty in complexity, a common trade-off present in 6G candidate waveforms. We consider that SE derives from the data rate,…
▽ More
In this work, we present a tutorial on how to account for the computational time complexity overhead of signal processing in the spectral efficiency (SE) analysis of wireless waveforms. Our methodology is particularly relevant in scenarios where achieving higher SE entails a penalty in complexity, a common trade-off present in 6G candidate waveforms. We consider that SE derives from the data rate, which is impacted by time-dependent overheads. Thus, neglecting the computational complexity overhead in the SE analysis grants an unfair advantage to more computationally complex waveforms, as they require larger computational resources to meet a signal processing runtime below the symbol period. We demonstrate our points with two case studies. In the first, we refer to IEEE 802.11a-compliant baseband processors from the literature to show that their runtime significantly impacts the SE perceived by upper layers. In the second case study, we show that waveforms considered less efficient in terms of SE can outperform their more computationally expensive counterparts if provided with equivalent high-performance computational resources. Based on these cases, we believe our tutorial can address the comparative SE analysis of waveforms that operate under different computational resource constraints.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Fast Computation of the Discrete Fourier Transform Square Index Coefficients
Authors:
Saulo Queiroz,
João P. Vilela,
Edmundo Monteiro
Abstract:
The $N$-point discrete Fourier transform (DFT) is a cornerstone for several signal processing applications. Many of these applications operate in real-time, making the computational complexity of the DFT a critical performance indicator to be optimized. Unfortunately, whether the $\mathcal{O}(N\log_2 N)$ time complexity of the fast Fourier transform (FFT) can be outperformed remains an unresolved…
▽ More
The $N$-point discrete Fourier transform (DFT) is a cornerstone for several signal processing applications. Many of these applications operate in real-time, making the computational complexity of the DFT a critical performance indicator to be optimized. Unfortunately, whether the $\mathcal{O}(N\log_2 N)$ time complexity of the fast Fourier transform (FFT) can be outperformed remains an unresolved question in the theory of computation. However, in many applications of the DFT -- such as compressive sensing, image processing, and wideband spectral analysis -- only a small fraction of the output signal needs to be computed because the signal is sparse. This motivates the development of algorithms that compute specific DFT coefficients more efficiently than the FFT algorithm. In this article, we show that the number of points of some DFT coefficients can be dramatically reduced by means of elementary mathematical properties. We present an algorithm that compacts the square index coefficients (SICs) of DFT (i.e., $X_{k\sqrt{N}}$, $k=0,1,\cdots, \sqrt{N}-1$, for a square number $N$) from $N$ to $\sqrt{N}$ points at the expense of $N-1$ complex sums and no multiplication. Based on this, any regular DFT algorithm can be straightforwardly applied to compute the SICs with a reduced number of complex multiplications. If $N$ is a power of two, one can combine our algorithm with the FFT to calculate all SICs in $\mathcal{O}(\sqrt{N}\log_2\sqrt{N})$ time complexity.
△ Less
Submitted 28 June, 2024;
originally announced July 2024.
-
Computation-Limited Signals: A Channel Capacity Regime Constrained by Computational Complexity
Authors:
Saulo Queiroz,
João P. Vilela,
Edmundo Monteiro
Abstract:
In this letter, we introduce the computational-limited (comp-limited) signals, a communication capacity regime in which the signal time computational complexity overhead is the key constraint -- rather than power or bandwidth -- to the overall communication capacity. We present the Spectro-Computational (SC) analysis, a novel mathematical framework that enhances classic concepts of information the…
▽ More
In this letter, we introduce the computational-limited (comp-limited) signals, a communication capacity regime in which the signal time computational complexity overhead is the key constraint -- rather than power or bandwidth -- to the overall communication capacity. We present the Spectro-Computational (SC) analysis, a novel mathematical framework that enhances classic concepts of information theory -- such as throughput, spectral efficiency and capacity -- to account for the signal processing computational complexity overhead. We consider a specific Shannon regime under which capacity is expected to get arbitrarily large as channel resources grow. Under that regime, we identify the conditions under which the time complexity overhead causes capacity to decrease rather than increasing, thereby creating the case for the comp-limited regime. We also provide examples of the SC analysis and show the OFDM waveform is comp-limited unless the lower-bound computational complexity of the $N$-point DFT problem verifies as $Ω(N)$, which remains an open challenge.
△ Less
Submitted 25 March, 2024; v1 submitted 9 October, 2023;
originally announced October 2023.
-
Efficient labeling algorithms for adjacent quadratic shortest paths
Authors:
João Vilela,
Bruno Fanzeres,
Rafael Martinelli,
Claudio Contardo
Abstract:
In this article, we study the Adjacent Quadratic Shortest Path Problem (AQSPP), which consists in finding the shortest path on a directed graph when its total weight component also includes the impact of consecutive arcs. We provide a formal description of the AQSPP and propose an extension of Dijkstra's algorithm (that we denote aqD) for solving AQSPPs in polynomial-time and provide a proof for i…
▽ More
In this article, we study the Adjacent Quadratic Shortest Path Problem (AQSPP), which consists in finding the shortest path on a directed graph when its total weight component also includes the impact of consecutive arcs. We provide a formal description of the AQSPP and propose an extension of Dijkstra's algorithm (that we denote aqD) for solving AQSPPs in polynomial-time and provide a proof for its correctness under some mild assumptions. Furthermore, we introduce an adjacent quadratic A* algorithm (that we denote aqA*) with a backward search for cost-to-go estimation to speed up the search. We assess the performance of both algorithms by comparing their relative performance with benchmark algorithms from the scientific literature and carry out a thorough collection of sensitivity analysis of the methods on a set of problem characteristics using randomly generated graphs. Numerical results suggest that: (i) aqA* outperforms all other algorithms, with a performance being about 75 times faster than aqD and the fastest alternative; (ii) the proposed solution procedures do not lose efficiency when the magnitude of quadratic costs vary; (iii) aqA* and aqD are fastest on random graph instances, compared with benchmark algorithms from scientific literature. We conclude the numerical experiments by presenting a stress test of the AQSPP in the context of real grid graph instances, with sizes up to $16 \times 10^6$ nodes, $64 \times 10^6$ arcs, and $10^9$ quadratic arcs.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
The Jordan-Hölder Theorem for Monoids with Group Action
Authors:
Alfilgen Sebandal,
Jocelyn P. Vilela
Abstract:
In this article, we prove an isomorphism theorem for the case of refinement $Γ$-monoids. Based on this we show a version of the well-known Jordan-Hölder theorem in this framework. The main theorem of this article states that - as in the case of modules - a monoid $T$ has a $Γ$-composition series if and only if it is both $Γ$-Noetherian and $Γ$-Artinian. As in module theory, these two concepts can…
▽ More
In this article, we prove an isomorphism theorem for the case of refinement $Γ$-monoids. Based on this we show a version of the well-known Jordan-Hölder theorem in this framework. The main theorem of this article states that - as in the case of modules - a monoid $T$ has a $Γ$-composition series if and only if it is both $Γ$-Noetherian and $Γ$-Artinian. As in module theory, these two concepts can be defined via ascending and descending chains respectively.
△ Less
Submitted 27 November, 2021;
originally announced November 2021.
-
Graphs with disjoint cycles, classification via the talented monoid
Authors:
Roozbeh Hazrat,
Alfilgen N. Sebandal,
Jocelyn P. Vilela
Abstract:
We characterise directed graphs consisting of disjoint cycles via their talented monoids. We show that a graph $E$ consists of disjoint cycles precisely when its talented monoid $T_E$ has a certain Jordan-Hölder composition series. These are graphs whose associated Leavitt path algebras have finite Gelfand-Kirillov dimension (GKdim). We show that this dimension can be determined as the length of c…
▽ More
We characterise directed graphs consisting of disjoint cycles via their talented monoids. We show that a graph $E$ consists of disjoint cycles precisely when its talented monoid $T_E$ has a certain Jordan-Hölder composition series. These are graphs whose associated Leavitt path algebras have finite Gelfand-Kirillov dimension (GKdim). We show that this dimension can be determined as the length of certain ideal series of the talented monoid. Since $T_E$ is the positive cone of the graded Grothendieck group $K_0^{gr}(L_K (E))$, we conclude that for graphs $E$ and $F$, if $K_0^{gr}(L_K (E))\cong K_0^{gr}(L_K (F))$ then $GKdim L_K(E) = GKdim L_K(F)$, thus providing more evidence for the Graded Classification Conjecture for Leavitt path algebras.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
Is FFT Fast Enough for Beyond-5G Communications?
Authors:
Saulo Queiroz,
João P. Vilela,
Edmundo Monteiro
Abstract:
In this paper, we study the impact of computational complexity on the throughput limits of the {\color{black}fast Fourier transform (FFT)} algorithm for {\color{black}orthogonal frequency division multiplexing(OFDM)} waveforms. Based on the spectro-computational {\color{\corcorrecao}complexity} (SC) analysis, {\color{\corcorrecao} we verify that the complexity of an $N$-point FFT grows faster than…
▽ More
In this paper, we study the impact of computational complexity on the throughput limits of the {\color{black}fast Fourier transform (FFT)} algorithm for {\color{black}orthogonal frequency division multiplexing(OFDM)} waveforms. Based on the spectro-computational {\color{\corcorrecao}complexity} (SC) analysis, {\color{\corcorrecao} we verify that the complexity of an $N$-point FFT grows faster than the number of bits in the OFDM symbol.} Thus, we show that FFT nullifies the OFDM throughput on $N$ unless the $N$-point discrete Fourier transform (DFT) problem verifies as $Ω(N)$, which remains a "fascinating" open question in theoretical computer science. Also, because FFT demands $N$ to be a power of two $2^i$ ($i>0$), the spectrum widening leads to an exponential complexity on $i$, i.e. $O(2^ii)$. To overcome these limitations, {\color{\corcorrecao} we consider the alternative frequency-time transform formulation of vector OFDM (V-OFDM), in which an $N$-point FFT is replaced by $N/L$ ($L$$>$$0$) smaller {\color{\corcorrecao}$L$-point} FFTs to mitigate the cyclic prefix overhead of OFDM. Building on that, we replace FFT by the straightforward DFT algorithm to release the V-OFDM parameters from growing as powers of two and to benefit from flexible numerology (e.g., $L=3$, $N=156$). Besides, by setting $L$ to $Θ(1)$, the resulting solution can run linearly on $N$ (rather than exponentially on $i$) while sustaining a non null throughput as $N$ grows. }
△ Less
Submitted 29 September, 2022; v1 submitted 14 December, 2020;
originally announced December 2020.
-
Bringing Network Coding into SDN: A Case-study for Highly Meshed Heterogeneous Communications
Authors:
Alejandro Cohen,
Homa Esfahanizadeh,
Bruno Sousa,
João P. Vilela,
Miguel Luís,
Duarte Raposo,
Francois Michel,
Susana Sargento,
Muriel Médard
Abstract:
Modern communications have moved away from point-to-point models to increasingly heterogeneous network models. In this article, we propose a novel controller-based protocol to deploy adaptive causal network coding in heterogeneous and highly-meshed communication networks. Specifically, we consider using Software-Defined-Network (SDN) as the main controller. We first present an architecture for the…
▽ More
Modern communications have moved away from point-to-point models to increasingly heterogeneous network models. In this article, we propose a novel controller-based protocol to deploy adaptive causal network coding in heterogeneous and highly-meshed communication networks. Specifically, we consider using Software-Defined-Network (SDN) as the main controller. We first present an architecture for the highly-meshed heterogeneous multi-source multi-destination networks that represents the practical communication networks encountered in the fifth generation of wireless networks (5G) and beyond. Next, we present a promising solution to deploy network coding over the new architecture. In fact, we investigate how to generalize adaptive and causal random linear network coding (AC-RLNC), proposed for multipath multi-hop (MP-MH) communication channels, to a protocol for the new multi-source multi-destination network architecture using controller. To this end, we present a modularized implementation of AC-RLNC solution where the modules work together in a distributed fashion and perform the AC-RLNC technology. We also present a new controller-based setting through which the network coding modules can communicate and can attain their required information. Finally, we briefly discuss how the proposed architecture and network coding solution provide a good opportunity for future technologies, e.g., distributed coded computation and storage, mmWave communication environments, and innovative and efficient security features.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Optimal Mapper for OFDM with Index Modulation: A Spectro-Computational Analysis
Authors:
Saulo Queiroz,
João P. Vilela,
Edmundo Monteiro
Abstract:
In this work, we present an optimal mapper for OFDM with index modulation (OFDM-IM). By optimal we mean the mapper achieves the lowest possible asymptotic computational complexity (CC) when the spectral efficiency (SE) gain over OFDM maximizes. We propose the spectro-computational (SC) analysis to capture the trade-off between CC and SE and to demonstrate that an $N$-subcarrier OFDM-IM mapper must…
▽ More
In this work, we present an optimal mapper for OFDM with index modulation (OFDM-IM). By optimal we mean the mapper achieves the lowest possible asymptotic computational complexity (CC) when the spectral efficiency (SE) gain over OFDM maximizes. We propose the spectro-computational (SC) analysis to capture the trade-off between CC and SE and to demonstrate that an $N$-subcarrier OFDM-IM mapper must run in exact $Θ(N)$ time complexity. We show that an OFDM-IM mapper running faster than such complexity cannot reach the maximal SE whereas one running slower nullifies the map** throughput for arbitrarily large $N$. We demonstrate our theoretical findings by implementing an open-source library that supports all DSP steps to map/demap an N-subcarrier complex frequency-domain OFDM-IM symbol. Our implementation supports different index selector algorithms and is the first to enable the SE maximization while preserving the same time and space asymptotic complexities of the classic OFDM mapper.
△ Less
Submitted 3 April, 2020; v1 submitted 21 February, 2020;
originally announced February 2020.
-
Maximal Spectral Efficiency of OFDM with Index Modulation under Polynomial Space Complexity
Authors:
Saulo Queiroz,
Wesley Silva,
João P. Vilela,
Edmundo Monteiro
Abstract:
In this letter, we demonstrate a mapper that enables all waveforms of OFDM with Index Modulation (OFDM-IM) while preserving polynomial time and space computational complexities. Enabling all OFDM-IM waveforms maximizes the spectral efficiency (SE) gain over the classic OFDM but, as far as we know, the computational overhead of the resulting mapper remains conjectured as prohibitive across the OFDM…
▽ More
In this letter, we demonstrate a mapper that enables all waveforms of OFDM with Index Modulation (OFDM-IM) while preserving polynomial time and space computational complexities. Enabling all OFDM-IM waveforms maximizes the spectral efficiency (SE) gain over the classic OFDM but, as far as we know, the computational overhead of the resulting mapper remains conjectured as prohibitive across the OFDM-IM literature. We show that the largest number of binomial coefficient calculations performed by the original OFDM-IM mapper is polynomial on the number of subcarriers, even under the setup that maximizes the SE gain over OFDM. Also, such coefficients match the entries of the so-called Pascal's triangle (PT). Thus, by assisting the OFDM-IM mapper with a PT table, we show that the maximum SE gain over OFDM can be achieved under polynomial (rather than exponential) time and space complexities.
△ Less
Submitted 24 January, 2020; v1 submitted 7 August, 2019;
originally announced August 2019.
-
Quantifying Equivocation for Finite Blocklength Wiretap Codes
Authors:
Jack Pfister,
Marco A. C. Gomes,
Joao P. Vilela,
Willie K. Harrison
Abstract:
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze normal error correcting codes. For this paper, we limit our analysis to coset-based wiretap…
▽ More
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze normal error correcting codes. For this paper, we limit our analysis to coset-based wiretap codes, and make several comparisons of different code families at small and medium blocklengths. Our results indicate that there are security advantages to using specific codes when using small to medium blocklengths.
△ Less
Submitted 19 January, 2017;
originally announced January 2017.
-
Breaking Through the Full-Duplex Wi-Fi Capacity Gain
Authors:
Saulo Queiroz,
João Vilela,
Roberto Hexsel
Abstract:
In this work we identify a seminal design guideline that prevents current Full-Duplex (FD) MAC protocols to scale the FD capacity gain (i.e. 2x the half-duplex throughput) in single-cell Wi-Fi networks. Under such guideline (referred to as 1:1), a MAC protocol attempts to initiate up to two simultaneous transmissions in the FD bandwidth. Since in single-cell Wi-Fi networks MAC performance is bound…
▽ More
In this work we identify a seminal design guideline that prevents current Full-Duplex (FD) MAC protocols to scale the FD capacity gain (i.e. 2x the half-duplex throughput) in single-cell Wi-Fi networks. Under such guideline (referred to as 1:1), a MAC protocol attempts to initiate up to two simultaneous transmissions in the FD bandwidth. Since in single-cell Wi-Fi networks MAC performance is bounded by the PHY layer capacity, this implies gains strictly less than 2x over half-duplex at the MAC layer. To face this limitation, we argue for the 1:N design guideline. Under 1:N, FD MAC protocols 'see' the FD bandwidth through N>1 orthogonal narrow-channel PHY layers. Based on theoretical results and software defined radio experiments, we show the 1:N design can leverage the Wi-Fi capacity gain more than 2x at and below the MAC layer. This translates the denser modulation scheme incurred by channel narrowing and the increase in the spatial reuse offer enabled by channel orthogonality. With these results, we believe our design guideline can inspire a new generation of Wi-Fi MAC protocols that fully embody and scale the FD capacity gain.
△ Less
Submitted 31 May, 2016;
originally announced May 2016.
-
Analysis of Short Blocklength Codes for Secrecy
Authors:
Willie K. Harrison,
Dinis Sarmento,
João P. Vilela,
Marco Gomes
Abstract:
In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secrecy…
▽ More
In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secrecy decoder. Our techniques are especially useful in cases where application of traditional information-theoretic security measures is either impractical or simply not yet understood. The metrics can aid both practical system analysis, and practical system design for physical-layer security codes. Furthermore, these new measures fill a void in the current landscape of practical security measures for physical-layer security coding, and may assist in the wide-scale adoption of physical-layer techniques for security in real-world systems. We also show how the new metrics provide techniques for reducing realistic channel models to simpler discrete memoryless wiretap channel equivalents over which existing secrecy code designs may achieve information-theoretic security.
△ Less
Submitted 23 September, 2015;
originally announced September 2015.
-
Network Coding Security: Attacks and Countermeasures
Authors:
Luísa Lima,
João P. Vilela,
Paulo F. Oliveira,
João Barros
Abstract:
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the diffe…
▽ More
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the differences between attack scenarios in which network coding is particularly vulnerable and other relevant cases in which the intrinsic properties of network coding allow for stronger and more efficient security solutions than classical routing. Furthermore, we give practical examples where network coding can be combined with classical cryptography both for secure communication and secret key distribution. Throughout the paper we identify a number of research challenges deemed relevant towards the applicability of secure network coding in practical networks.
△ Less
Submitted 8 September, 2008;
originally announced September 2008.
-
Lightweight Security for Network Coding
Authors:
Joao P. Vilela,
Luisa Lima,
Joao Barros
Abstract:
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows. We propose a low-complexity cryptographic scheme that exploits the inherent security provided by random linear network coding and offers the advantage of reduced overhead in comparison to traditional end-to-end encryptio…
▽ More
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows. We propose a low-complexity cryptographic scheme that exploits the inherent security provided by random linear network coding and offers the advantage of reduced overhead in comparison to traditional end-to-end encryption of the entire data. Confidentiality is achieved by protecting (or "locking") the source coefficients required to decode the encoded data, without preventing intermediate nodes from running their standard network coding operations. Our scheme can be easily combined with existing techniques that counter active attacks.
△ Less
Submitted 3 July, 2008;
originally announced July 2008.
-
Fighting cancer with virus
Authors:
S. C. Ferreira Jr.,
M. L. Martins,
M. J. Vilela
Abstract:
One of the most promising strategies to treat cancer is attacking it with viruses. Virus can kill tumor cells specifically or act as carriers that deliver normal genes into cancer cells. A model for virus therapy of cancer is investigated and some of its predictions are in agreement with results obtained from experimental tumors. Furthermore, the model reveals an oscillatory (periodic or aperiod…
▽ More
One of the most promising strategies to treat cancer is attacking it with viruses. Virus can kill tumor cells specifically or act as carriers that deliver normal genes into cancer cells. A model for virus therapy of cancer is investigated and some of its predictions are in agreement with results obtained from experimental tumors. Furthermore, the model reveals an oscillatory (periodic or aperiodic) response of tumor cells and virus populations which may difficult clinical prognosis. These results suggest the need for new \textit{in vivo} and \textit{in vitro} experiments aiming to detect this oscillatory response.
△ Less
Submitted 9 September, 2003;
originally announced September 2003.
-
Morphology transitions induced by chemotherapy in carcinomas "in situ"
Authors:
S. C. Ferreira Jr.,
M. L. Martins,
M. J. Vilela
Abstract:
Recently, we have proposed a nutrient-limited model for the avascular growth of tumors including cell proliferation, motility and death \cite{jr}, that, qualitatively reproduces commonly observed morphologies for carcinomas {\it in situ}. In the present work, we analyze the effects of distinct chemotherapeutic strategies on the patterns, scaling and growth laws obtained for such nutrient-limited…
▽ More
Recently, we have proposed a nutrient-limited model for the avascular growth of tumors including cell proliferation, motility and death \cite{jr}, that, qualitatively reproduces commonly observed morphologies for carcinomas {\it in situ}. In the present work, we analyze the effects of distinct chemotherapeutic strategies on the patterns, scaling and growth laws obtained for such nutrient-limited model. Two kinds of chemotherapeutic strategies were considered, namely, those that kill cancer cells and those that block cell mitosis but allows the cell to survive for some time. Depending on the chemotherapeutic schedule used, the tumors are completely eliminated, reach a stationary size or grow following power laws. The model suggests that the scaling properties of the tumors are not affected by the mild cytotoxic treatments, although a reduction in growth rates and an increase in invasiveness are observed. For the strategies based on antimitotic drugs a morphological transition in which compact tumors become more fractal under aggressive treatments was seen.
△ Less
Submitted 30 December, 2002;
originally announced December 2002.
-
A reaction-diffusion model for the growth of avascular tumor
Authors:
S. C. Ferreira Junior,
M. L. Martins,
M. J. Vilela
Abstract:
A nutrient-limited model for avascular cancer growth including cell proliferation, motility and death is presented. The model qualitatively reproduces commonly observed morphologies for primary tumors, and the simulated patterns are characterized by its gyration radius, total number of cancer cells, and number of cells on tumor periphery. These very distinct morphological patterns follow Gompert…
▽ More
A nutrient-limited model for avascular cancer growth including cell proliferation, motility and death is presented. The model qualitatively reproduces commonly observed morphologies for primary tumors, and the simulated patterns are characterized by its gyration radius, total number of cancer cells, and number of cells on tumor periphery. These very distinct morphological patterns follow Gompertz growth curves, but exhibit different scaling laws for their surfaces. Also, the simulated tumors incorporate a spatial structure composed of a central necrotic core, an inner rim of quiescent cells and a narrow outer shell of proliferating cells in agreement with biological data. Finally, our results indicate that the competition for nutrients among normal and cancer cells may be a determinant factor in generating papillary tumor morphology.
△ Less
Submitted 20 November, 2001; v1 submitted 25 September, 2001;
originally announced September 2001.