The document discusses using algebraic topology and combinatorial structures like the Cech and Vietoris-Rips complexes to analyze the topology and connectivity of wireless sensor networks. It provides examples of how to compute topological properties like the number of connected components and holes from these complexes by analyzing their homology groups. The complexes provide a way to represent wireless network coverage and connectivity as combinatorial objects that can then be studied using tools from algebraic topology.
Noise Resilience of Variational Quantum CompilingKunalSharma515
APS March meeting 2020
Variational hybrid quantum-classical algorithms (VHQCAs) are near-term algorithms that leverage classical optimization to minimize a cost function, which is efficiently evaluated on a quantum computer. Recently VHQCAs have been proposed for quantum compiling, where a target unitary U is compiled into a short-depth gate sequence V. In this work, we report on a surprising form of noise resilience for these algorithms. Namely, we find one often learns the correct gate sequence V (i.e., the correct variational parameters) despite various sources of incoherent noise acting during the cost-evaluation circuit. Our main results are rigorous theorems stating that the optimal variational parameters are unaffected by a broad class of noise models, such as measurement noise, gate noise, and Pauli channel noise. Furthermore, our numerical implementations on IBM's noisy simulator demonstrate resilience when compiling the quantum Fourier transform, Toffoli gate, and W-state preparation. Hence, variational quantum compiling, due to its robustness, could be practically useful for noisy intermediate-scale quantum devices. Finally, we speculate that this noise resilience may be a general phenomenon that applies to other VHQCAs such as the variational quantum eigensolver.
In many scientific areas, systems can be described as interaction networks where elements correspond to vertices and interactions to edges. A variety of problems in those fields can deal with network comparison and characterization.
The problem of comparing and characterizing networks is the task of measuring their structural similarity and finding characteristics which capture structural information. In order to analyze complex networks, several methods can be combined, such as graph theory, information theory, and statistics.
In this project, we present methods for measuring Shannon’s entropy of graphs.
Noise Resilience of Variational Quantum CompilingKunalSharma515
APS March meeting 2020
Variational hybrid quantum-classical algorithms (VHQCAs) are near-term algorithms that leverage classical optimization to minimize a cost function, which is efficiently evaluated on a quantum computer. Recently VHQCAs have been proposed for quantum compiling, where a target unitary U is compiled into a short-depth gate sequence V. In this work, we report on a surprising form of noise resilience for these algorithms. Namely, we find one often learns the correct gate sequence V (i.e., the correct variational parameters) despite various sources of incoherent noise acting during the cost-evaluation circuit. Our main results are rigorous theorems stating that the optimal variational parameters are unaffected by a broad class of noise models, such as measurement noise, gate noise, and Pauli channel noise. Furthermore, our numerical implementations on IBM's noisy simulator demonstrate resilience when compiling the quantum Fourier transform, Toffoli gate, and W-state preparation. Hence, variational quantum compiling, due to its robustness, could be practically useful for noisy intermediate-scale quantum devices. Finally, we speculate that this noise resilience may be a general phenomenon that applies to other VHQCAs such as the variational quantum eigensolver.
In many scientific areas, systems can be described as interaction networks where elements correspond to vertices and interactions to edges. A variety of problems in those fields can deal with network comparison and characterization.
The problem of comparing and characterizing networks is the task of measuring their structural similarity and finding characteristics which capture structural information. In order to analyze complex networks, several methods can be combined, such as graph theory, information theory, and statistics.
In this project, we present methods for measuring Shannon’s entropy of graphs.
Presentation at AICOL Workshop: AI Approaches to the Complexity of Legal Systems
Abstract: the paper is an investigation on how behaviour relates to norms, i.e. on how a certain conduct acquires meaning in institutional terms. The simplest example of this phenomenon is given by the ’count-as’ relation, generally associated to constitutive rules, through which an agent has the legal capacity, via performing a certain action, to create, modify or destroy a certain institutional fact. In the literature, however, the ‘count-as’ relation is mostly accounted for its classificatory functions. Introducing an extension of the Petri Net notation, we argue that the structure of constitutive rules cannot be completely captured by logic conditionals, nor by causal connectives, but it can approached by the notion of supervenience.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
Transferring Quantum Information through the Quantum Channel using Synchronou...josephjonse
Transmission of information in the form of qubits much faster than the speed of light is the important aspects of quantum information theory. Quantum information processing exploits the quantum nature of information that needs to be stored, encoded, transmit, receive and decode the information in the form of qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum communication. This paper does the study of quantum channels and how best it can be implemented with the existing infrastructure that is the classical communication. Multiple access to the quantum network is the requirement where multiple users want to transmit their quantum information simultaneously without interfering with each others.
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...researchinventy
A quantum channel can be used to transmit classical information as well as to deliver quantum data from one location to another . Classical information theory is a subset of Quantum information theory which is fundamentally richer, because quantum mechanics includes so many more elementary classes of static and dynamic resources. Quantum information theory contains many more facts other than described here, including the study of quantum data processing, manipulation and Quantum data compression. Here we consider quantum channel as Bosonic channels, which are a quantum-mechanical model for free space or fibre optic communication. In this paper the overview of theoretical scenario of quantum networks in particular to multiple user access to the quantum communication channel is considered. Multiple qubits are generated in different system, the proper alignment of qubits is a must it can be first come first serve or round robin fashion. The received data are grouped into codewords each of n qubits and quantum error correction is performed. These codewords are agreed between the transmitter and the receiver before transmitting over the quantum channel known as valid codewords.
Complete Photoproduction Experiments - 12th International Conference on Meson-Nucleon Physics and the Structure of the Nucleon, Virginia, USA, 31 May-4 June 2010. AIP Conference Proceedings, October 2011, Vol. 1374, pp. 17-22, ISSN: 0094-243X, doi: 10.1063/1.3647092
di A. D’Angelo, K. Ardashev, C. Bade, O. Bartalini, V. Bellini, M. Blecher, J. P. Bocquet, M. Capogni, A. Caracappa, L. E. Casano, M. Castoldi, R. Di Salvo, A. Fantini, D. Franco, G. Gervino, F. Ghio, G. Giardina, C. Gibson, B. Girolami, A. Giusa, H. Glu, K. Hicks, S. Hoblit, A. Honig, T. Kageya, M. Khandaker, O. C. Kistner, S. Kizilgul, S. Kucuker, A. Lapikf, A. Lehmann, P. Levi Sandri, A. Lleres, M. Lowry, M. Lucas, J. Mahon, F. Mammoliti, G. Mandaglio, M. Manganaro, L. Miceli, D. Moricciani, A. Mushkarenkovf, V. Nedorezovf, B. Norum, M. Papb, B. Preedom, H. Seyfarthb, C. Randieri, D. Rebreyend, N. Rudnevf, G. Russo, A. Sandorfi, C. Schaerf, M. L. Sperduto, H. Stroher, M. C. Sutera, C. E. Thorn, A. Turingef, V. Vegna, C. S. Whisnanth, K. Wang, X. Wei (2011)
Abstract
The extraction of resonance parameters from meson photo-reaction data is a challenging effort, that would greatly benefit from the availability of several polarization observables, measured for each reaction channel on both proton and neutron targets. In the aim of obtaining such complete experiments, polarized photon beams and targets have been developed at facilities, worldwide. We report on the latest results from the LEGS and GRAAL collaborations, providing single and double polarization measurements on pseudo-scalar meson photo-production from the nucleon.
Presentation at AICOL Workshop: AI Approaches to the Complexity of Legal Systems
Abstract: the paper is an investigation on how behaviour relates to norms, i.e. on how a certain conduct acquires meaning in institutional terms. The simplest example of this phenomenon is given by the ’count-as’ relation, generally associated to constitutive rules, through which an agent has the legal capacity, via performing a certain action, to create, modify or destroy a certain institutional fact. In the literature, however, the ‘count-as’ relation is mostly accounted for its classificatory functions. Introducing an extension of the Petri Net notation, we argue that the structure of constitutive rules cannot be completely captured by logic conditionals, nor by causal connectives, but it can approached by the notion of supervenience.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
Transferring Quantum Information through the Quantum Channel using Synchronou...josephjonse
Transmission of information in the form of qubits much faster than the speed of light is the important aspects of quantum information theory. Quantum information processing exploits the quantum nature of information that needs to be stored, encoded, transmit, receive and decode the information in the form of qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum communication. This paper does the study of quantum channels and how best it can be implemented with the existing infrastructure that is the classical communication. Multiple access to the quantum network is the requirement where multiple users want to transmit their quantum information simultaneously without interfering with each others.
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...researchinventy
A quantum channel can be used to transmit classical information as well as to deliver quantum data from one location to another . Classical information theory is a subset of Quantum information theory which is fundamentally richer, because quantum mechanics includes so many more elementary classes of static and dynamic resources. Quantum information theory contains many more facts other than described here, including the study of quantum data processing, manipulation and Quantum data compression. Here we consider quantum channel as Bosonic channels, which are a quantum-mechanical model for free space or fibre optic communication. In this paper the overview of theoretical scenario of quantum networks in particular to multiple user access to the quantum communication channel is considered. Multiple qubits are generated in different system, the proper alignment of qubits is a must it can be first come first serve or round robin fashion. The received data are grouped into codewords each of n qubits and quantum error correction is performed. These codewords are agreed between the transmitter and the receiver before transmitting over the quantum channel known as valid codewords.
Complete Photoproduction Experiments - 12th International Conference on Meson-Nucleon Physics and the Structure of the Nucleon, Virginia, USA, 31 May-4 June 2010. AIP Conference Proceedings, October 2011, Vol. 1374, pp. 17-22, ISSN: 0094-243X, doi: 10.1063/1.3647092
di A. D’Angelo, K. Ardashev, C. Bade, O. Bartalini, V. Bellini, M. Blecher, J. P. Bocquet, M. Capogni, A. Caracappa, L. E. Casano, M. Castoldi, R. Di Salvo, A. Fantini, D. Franco, G. Gervino, F. Ghio, G. Giardina, C. Gibson, B. Girolami, A. Giusa, H. Glu, K. Hicks, S. Hoblit, A. Honig, T. Kageya, M. Khandaker, O. C. Kistner, S. Kizilgul, S. Kucuker, A. Lapikf, A. Lehmann, P. Levi Sandri, A. Lleres, M. Lowry, M. Lucas, J. Mahon, F. Mammoliti, G. Mandaglio, M. Manganaro, L. Miceli, D. Moricciani, A. Mushkarenkovf, V. Nedorezovf, B. Norum, M. Papb, B. Preedom, H. Seyfarthb, C. Randieri, D. Rebreyend, N. Rudnevf, G. Russo, A. Sandorfi, C. Schaerf, M. L. Sperduto, H. Stroher, M. C. Sutera, C. E. Thorn, A. Turingef, V. Vegna, C. S. Whisnanth, K. Wang, X. Wei (2011)
Abstract
The extraction of resonance parameters from meson photo-reaction data is a challenging effort, that would greatly benefit from the availability of several polarization observables, measured for each reaction channel on both proton and neutron targets. In the aim of obtaining such complete experiments, polarized photon beams and targets have been developed at facilities, worldwide. We report on the latest results from the LEGS and GRAAL collaborations, providing single and double polarization measurements on pseudo-scalar meson photo-production from the nucleon.
Abc pso optimization technique for parameter optimization in circular log per...eSAT Journals
Abstract
It is applicable to note that, in the overall wireless communication mechanism, the role played by the antenna is beyond the realm of words. In fact, the deployment of the antenna the wireless network faces the grave challenges of the communication of the high speed signals. Of late, the Nano_antennas make their elegant presence in several spheres of the technology. However, it is highly essential, at present, to have an overall awareness for the purpose of a balanced design of nano_antennas with broadband feedbacks. These days, many a technique is doing its elegant rounds invested in examining the spectral features of the log periodic nano_antenna by the excitation method of reception and discharge. The field improvement of nano_ antenna can be harmonized by several geometric, constraints, including the outer radius, the tooth angle, and the ratio of the radial sizes of consecutive teeth, which furnish effective check on the spectral resonance position and the field renovation. Taking the challenges in to consideration, a novel hybrid ABC0-PSO optimization approach is launched in the document, which involves a gifted prospect for planning and adapting the LPNA. With the result, the adaption of the related constraints incredibly increases the effectiveness of the mechanism to envision it to an acceptable level. The design of the LPNA is made by adapting the constraints which is highly appropriate for the wireless communication which is assessed for field improvement and the Purcell factor of Conventional Log periodic Toothed Antenna and Log periodic Toothed Circular Nano Antenna.
Keywords: Circular Log Periodic Nano Antenna, Field Enhancement, Purcell Factor, Genetic Algorithm, Artificial Bee Colony.
Abc pso optimization technique for parameter optimization in circular log per...eSAT Journals
Abstract
It is applicable to note that, in the overall wireless communication mechanism, the role played by the antenna is beyond the realm of words. In fact, the deployment of the antenna the wireless network faces the grave challenges of the communication of the high speed signals. Of late, the Nano_antennas make their elegant presence in several spheres of the technology. However, it is highly essential, at present, to have an overall awareness for the purpose of a balanced design of nano_antennas with broadband feedbacks. These days, many a technique is doing its elegant rounds invested in examining the spectral features of the log periodic nano_antenna by the excitation method of reception and discharge. The field improvement of nano_ antenna can be harmonized by several geometric, constraints, including the outer radius, the tooth angle, and the ratio of the radial sizes of consecutive teeth, which furnish effective check on the spectral resonance position and the field renovation. Taking the challenges in to consideration, a novel hybrid ABC0-PSO optimization approach is launched in the document, which involves a gifted prospect for planning and adapting the LPNA. With the result, the adaption of the related constraints incredibly increases the effectiveness of the mechanism to envision it to an acceptable level. The design of the LPNA is made by adapting the constraints which is highly appropriate for the wireless communication which is assessed for field improvement and the Purcell factor of Conventional Log periodic Toothed Antenna and Log periodic Toothed Circular Nano Antenna.
Keywords: Circular Log Periodic Nano Antenna, Field Enhancement, Purcell Factor, Genetic Algorithm, Artificial Bee Colony.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
Cancer cell metabolism: special Reference to Lactate PathwayAADYARAJPANDEY1
Normal Cell Metabolism:
Cellular respiration describes the series of steps that cells use to break down sugar and other chemicals to get the energy we need to function.
Energy is stored in the bonds of glucose and when glucose is broken down, much of that energy is released.
Cell utilize energy in the form of ATP.
The first step of respiration is called glycolysis. In a series of steps, glycolysis breaks glucose into two smaller molecules - a chemical called pyruvate. A small amount of ATP is formed during this process.
Most healthy cells continue the breakdown in a second process, called the Kreb's cycle. The Kreb's cycle allows cells to “burn” the pyruvates made in glycolysis to get more ATP.
The last step in the breakdown of glucose is called oxidative phosphorylation (Ox-Phos).
It takes place in specialized cell structures called mitochondria. This process produces a large amount of ATP. Importantly, cells need oxygen to complete oxidative phosphorylation.
If a cell completes only glycolysis, only 2 molecules of ATP are made per glucose. However, if the cell completes the entire respiration process (glycolysis - Kreb's - oxidative phosphorylation), about 36 molecules of ATP are created, giving it much more energy to use.
IN CANCER CELL:
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
introduction to WARBERG PHENOMENA:
WARBURG EFFECT Usually, cancer cells are highly glycolytic (glucose addiction) and take up more glucose than do normal cells from outside.
Otto Heinrich Warburg (; 8 October 1883 – 1 August 1970) In 1931 was awarded the Nobel Prize in Physiology for his "discovery of the nature and mode of action of the respiratory enzyme.
WARNBURG EFFECT : cancer cells under aerobic (well-oxygenated) conditions to metabolize glucose to lactate (aerobic glycolysis) is known as the Warburg effect. Warburg made the observation that tumor slices consume glucose and secrete lactate at a higher rate than normal tissues.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Sérgio Sacani
We characterize the earliest galaxy population in the JADES Origins Field (JOF), the deepest
imaging field observed with JWST. We make use of the ancillary Hubble optical images (5 filters
spanning 0.4−0.9µm) and novel JWST images with 14 filters spanning 0.8−5µm, including 7 mediumband filters, and reaching total exposure times of up to 46 hours per filter. We combine all our data
at > 2.3µm to construct an ultradeep image, reaching as deep as ≈ 31.4 AB mag in the stack and
30.3-31.0 AB mag (5σ, r = 0.1” circular aperture) in individual filters. We measure photometric
redshifts and use robust selection criteria to identify a sample of eight galaxy candidates at redshifts
z = 11.5 − 15. These objects show compact half-light radii of R1/2 ∼ 50 − 200pc, stellar masses of
M⋆ ∼ 107−108M⊙, and star-formation rates of SFR ∼ 0.1−1 M⊙ yr−1
. Our search finds no candidates
at 15 < z < 20, placing upper limits at these redshifts. We develop a forward modeling approach to
infer the properties of the evolving luminosity function without binning in redshift or luminosity that
marginalizes over the photometric redshift uncertainty of our candidate galaxies and incorporates the
impact of non-detections. We find a z = 12 luminosity function in good agreement with prior results,
and that the luminosity function normalization and UV luminosity density decline by a factor of ∼ 2.5
from z = 12 to z = 14. We discuss the possible implications of our results in the context of theoretical
models for evolution of the dark matter halo mass function.
7. Historique
Algebraic topology
Poisson homologies
Coverage
0 0.5 1 1.5 2 2.5 3 3.5 4
0
0.5
1
1.5
2
2.5
3
3.5
4
0 0.5 1 1.5 2 2.5 3 3.5 4
0
0.5
1
1.5
2
2.5
3
3.5
4
Figure 3: A sensors’ network and its associated ˘Cech complex.
Definition 9 (Vietoris-Rips complex) Given (X, d) a metric space, ! a fi-
nite set of points in X, and ✏ a real positive number. The Vietoris-Rips complex
of parameter ✏ of !, denoted R✏(!), is the abstract simplicial complex whose
k-simplices correspond to unordered (k + 1)-tuples of vertices in ! which are
pairwise within distance less than ✏ of each other.
7/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
8. Historique
Algebraic topology
Poisson homologies
Mathematical framework
Geometry leads to a combinatorial object
Combinatorial object is equipped with a Linear
algebra structure
Coverage and connectivity reduce to compute the
rank of a matrix
Localisation of hole: reduces to the computation of a
basis of a vector matrix, obtained by matrix reduction
(as in Gauss algorithm).
8/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
15. Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
16. Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
17. Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
18. Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
19. Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
20. Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : { a, b, c, d, e } = C0
Edges : {ab, bc, ca, be, ec, ed } = C1
Triangles : {bec} = C2
Tetrahedron : ∅ = C3
Comput. Rips
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
21. Historique
Algebraic topology
Poisson homologies
Cech complex
k-simplices
Ck = {[x0, · · · , xk−1], xi ∈ ω, ∩k
i=0B(xi , ) = ∅}
Nerve theorem
We can read some topological properties of x∈ω B(x, ) on
(Ck, k ≥ 0)
Same nb of connected components
Same nb of holes
Same Euler characteristic
11/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
35. Historique
Algebraic topology
Poisson homologies
Alternative complex
Cech complex
[v0, · · · , vk] ∈ Ck ⇐⇒ ∩k
j=0B(xj , ) = ∅
Rips-Vietoris complex
[v0, · · · , vk] ∈ Rk ⇐⇒ B(xj , ) ∩ B(xk, ) = ∅
k simplex = clique of k + 1 points
19/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
36. Historique
Algebraic topology
Poisson homologies
Difference RV vs Cech
For the l∞
distance
RV=Cech
Euclidean norm : false negative
Rips complex may miss some holes
20/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
37. Historique
Algebraic topology
Poisson homologies
Difference RV vs Cech
For the l∞
distance
RV=Cech
Euclidean norm : false negative
Rips complex may miss some holes
20/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
38. Historique
Algebraic topology
Poisson homologies
Cech vs Rips
R (V) ⊂ ˇC (V) ⊂ R2 (V) whenever ≥
d
2(d + 1)
Euclidean distance (D.-Feng-Martins)
Coverage radius RS
Communication radius RC = γRS
21/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
41. Historique
Algebraic topology
Poisson homologies
Goals and related works
Evaluate Betti nb and Euler charac. in some random settings
Penrose : Asymptotics of E[|Ck|m] for Euclidian-RG Rips
complex on the whole space (m = 1, 2)
Kähle : Asymptotics of E[βk] for Euclidian-RG Cech complex
(deterministic number of points) and ER
24/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
42. Historique
Algebraic topology
Poisson homologies
Goals and related works
Evaluate Betti nb and Euler charac. in some random settings
Penrose : Asymptotics of E[|Ck|m] for Euclidian-RG Rips
complex on the whole space (m = 1, 2)
Kähle : Asymptotics of E[βk] for Euclidian-RG Cech complex
(deterministic number of points) and ER
Our results
Exact expressions of all moments of |Ck| and χ in any dimension for
RG complex on a torus for the l∞ norm
24/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
46. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Euler characteristic (D.-Ferraz-Randriam-Vergne)
Euler characteristic
E [χ] = −
λe−θ ad
θ
Bd (−θ ad
) where θ = λ
2
a
d
.
where Bd is the d-th Bell polynomial
Bd (x) =
d
1
x +
d
2
x2
+ ... +
d
d
xd
28/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
47. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
k simplices
The key remark
|Ck| = h(x1, · · · , xk)dω(k)
(x1, · · · , xk)
where
h(x1, · · · , xk)
1
k!
i=j
1{ xi −xj < }
First moments
E[|Ck|] = λad (k + 1)d
(k + 1)!
(ad
θ)k
29/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
49. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Depoissonization
k simplices
E[|Ck| | |C0| = n] =
n
k + 1
(k + 1)d 2
a
dk
Euler characteristic
E[χ | |C0| = n] =
n
k=0
n
k + 1
(−1)k
(k + 1)d 2
a
dk
31/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
50. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Second order moments
Cov(|Ck|, |Cl |) =
1
2
d l−1
i=0
1
i!(k − l + i)!(l − i)!
θk+i
× k + i + 2
i(k − l + i)
l − i + 1
d
.
32/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
51. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Second order moments
Cov(|Ck|, |Cl |) =
1
2
d l−1
i=0
1
i!(k − l + i)!(l − i)!
θk+i
× k + i + 2
i(k − l + i)
l − i + 1
d
.
Tools
Chaos decomposition of |Ck|
Chaos multiplication formula
32/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
52. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Poisson chaos
Theorem
In(f ⊗n
) = f (x1) (dω(x1) − λ dx1)
n
= . . .
k
j=1
f (xj ) ⊗n
j=1 ( dω(xj ) − λdxj )
=
n
k=0
n
k
(−1)n−k
×
k
j=1
f (xj ) dω(k)
(x1, · · · , xk) ( f (x)λ dx)n−k
33/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
53. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Chaos
Extension
Any symmetric f (x1, · · · , xk) is the limit of
gn =
i
αn,i
k
j=1
fn,i (xj )
Ik(f ) is defined by linearity
For f non symmetric, let
f s
(x1, · · · , xk) =
1
k!
σ∈Sk
f (xσ(1), · · · , xσ(k))
and
In(f ) := In(f s
)
34/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
54. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Chaos multiplication formula
Theorem
Ii (fi )Ij (fj )
=
2(i∧j)
s=0
Ii+j−s
s≤2t≤2(s∧i∧j)
t!
i
t
j
t
t
s − t
fi ◦s−t
t fj
35/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
55. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Euler characteristic
Euler characteristic
var[χ] =
a
2
d
∞
n=1
cd
n θn
,
where
cd
n = n
j= (n+1)/2
2
j
i=n−j+1
(−1)i+j
(n−j)!(n−i)!(i+j−n)!
n+
2(n−i)(n−j)
1+i+j−n
d
− 1
(n−j)!2(2j−n)!
n+
2(n−j)2
1+2j−n
d
.
36/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
56. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Euler characteristic
Euler characteristic
var[χ] =
a
2
d
∞
n=1
cd
n θn
,
where
cd
n = n
j= (n+1)/2
2
j
i=n−j+1
(−1)i+j
(n−j)!(n−i)!(i+j−n)!
n+
2(n−i)(n−j)
1+i+j−n
d
− 1
(n−j)!2(2j−n)!
n+
2(n−j)2
1+2j−n
d
.
In dimension 1,
Var(χ) = θe−θ
− 2θ2
e−2θ
36/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
57. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Asymptotic results
If λ → ∞, βi (ω)
p.s.
−→ βi (Td ) = d
i .
37/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
63. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Complexity
An important remark
Construction of the complex is exponential (worst case)
40/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
64. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Complexity
An important remark
Construction of the complex is exponential (worst case)
Computations of Betti numbers is polynomial
40/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
65. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Further application (D.-Martins-Vergne)
Green networking
Switch off some sensors keeping the coverage
Height of an edge
Rank of the highest simplex it belongs to
Index of a vertex
Infimum of the height of its adjacent edges
41/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
67. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Example
We can see in Figure 5 the realisation of the coverage algorithm on a Vietoris-
Rips complex of parameter ✏ = 1 based on a Poisson point process of intensity
= 4.2 on a square of side length 2, with a fixed boundary of vertices on the
square perimeter. The boundary vertices are circled in red.
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
Figure 5: A Vietoris-Rips complex before and after the coverage reduction al-
gorithm.
For this configuration, on average on 200 runs, the algorithm removed 69.22%
of the non-boundary vertices, and computed in 206.01 seconds.
We can see in Figure 6 the realisation of the connectivity algorithm on a
Erdös-Rényi complex of parameter n = 15 and p = 0.3, with random active
vertices. We chose a small number of vertices for the figure to be readable.
A vertex is active with probability pa = 0.5 independantly from every other
vertices. The graph key is the same as before.
Complexity C bounded by 2H
43/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
68. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Complexity
θn = (rn/a)d
θk =
k
1+η−d
k−1
n
k
k−1
, θk =
k−1+η+d
k−1
n
k
k−1
θn ∈ [θk, θk] =⇒ C
n→∞
−−−→ k
44/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
71. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Improvement
Energy saving
Path loss
Received Power = K
Emitted power
distance(E, R)γ
46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
72. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Improvement
Energy saving
Path loss
Received Power = K
Emitted power
distance(E, R)γ
Covering radius such that
Received Power ≥ Threshold
46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
73. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Improvement
Energy saving
Path loss
Received Power = K
Emitted power
distance(E, R)γ
Covering radius such that
Received Power ≥ Threshold
Covering radius proportional to (Emitted power)1/γ
46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
74. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Power saving algorithm I
get collection of cells C and corresponding vertice V;
build Čech complex for C;
compute Betti number β∗
0, β∗
1 and index ˆiv for each v ∈ V;
flag fence, critical cells as not reducible;
flag cells whose index ≤ 2 as not reducible;
ˆimax = max{ˆiv |v ∈ V};
while exist a reducible cell do
C∗ ← collection of cells whose index = ˆimax
c is a cell ∈ C∗ whose biggest radius;
Rold ← Rc;
if Rc − ∆Rc ≥ Rc,min then
Rc ← Rc − ∆Rc;
else
turn off cell c;
47/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
75. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Power saving algorithm II
end if
build Čech complex for C and compute β0, β1;
compute index for cell c;
if β0 = β∗
0 or β0 = β∗
0 or ˆic < 2 then
Rc = Rc + ∆Rc;
set cell c is not reducible and set index of c to −1;
end if
compute index for every cell ∈ C;
ˆimax = max{ˆiv |v ∈ V};
end while
48/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
77. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Quality of Service
Coverage
50/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
78. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Quality of Service
Coverage
Disaster
Damaged nodes
Coverage holes
Several connected
components
51/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
79. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Quality of Service
Coverage
Disaster
Damaged nodes
Coverage holes
Several connected
components
52/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
80. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Recovery
Addition of temporary nodes
Not in the same positions as the previous ones
Just enough to repair the network
Questions
How do we know that the network is repaired?
Where do we put the new nodes?
53/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
81. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Addition of virtual
boundary nodes
To define the area to
cover
54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
82. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Addition of virtual
boundary nodes
To define the area to
cover
54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
83. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Addition of virtual
boundary nodes
To define the area to
cover
Computation of the
coverage complex
β0 = 2
β1 = 1
54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
84. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Where do we put the new nodes?
Constraints
Add enough nodes to repair the network
Not too much
Last step
Remove superfluous nodes
55/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
85. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Where do we put the new nodes?
Virtual nodes addition methods
Grid
Uniform
Determinantal
56/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
89. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Uniform method
Add nodes until the
square is covered
Random positions
following a uniform
law on the square
58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
90. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Uniform method
Add nodes until the
square is covered
Random positions
following a uniform
law on the square
58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
91. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Uniform method
Add nodes until the
square is covered
Random positions
following a uniform
law on the square
58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
92. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Ginibre point process
Ginibre point process
Let K(x, y) = ∞
k=1 Bkφk(x)φk(y), where Bk, k = 1, 2, . . . ,
are k independent Bernoulli variables and
φk(x) = 1√
πk!
e
−|x|2
2 xk for x ∈ C and k ∈ N
The Ginibre point process is the point process with correlation
function given by
ρn(x1, . . . , xn) = det(K(xi , xj )1≤i,j≤n)
E[ξ(K)(ξ(K) − 1) . . . (ξ(K) − n + 1)]
=
Kn
ρn(x1, . . . , xn)dx1 . . . dxn
59/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
93. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Ginibre point process
Ginibre point process
Let K(x, y) = ∞
k=1 Bkφk(x)φk(y), where Bk, k = 1, 2, . . . ,
are k independent Bernoulli variables and
φk(x) = 1√
πk!
e
−|x|2
2 xk for x ∈ C and k ∈ N
The Ginibre point process is the point process with correlation
function given by
ρn(x1, . . . , xn) = det(K(xi , xj )1≤i,j≤n)
E[ξ(K)(ξ(K) − 1) . . . (ξ(K) − n + 1)]
=
Kn
ρn(x1, . . . , xn)dx1 . . . dxn
Relatively easy to simulate on a compact set [2]59/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
106. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Ginibre determinantal point process
Figure : Poisson point process vs Ginibre determinantal point process
62/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
107. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Determinantal addition method
Determinantal method
Add nodes until the
square is covered
Random positions
using a Ginibre point
process
63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
108. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Determinantal addition method
Determinantal method
Add nodes until the
square is covered
Random positions
using a Ginibre point
process
63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
109. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Determinantal addition method
Determinantal method
Add nodes until the
square is covered
Random positions
using a Ginibre point
process
63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
110. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Final configuration (with determinantal addition
method)
Reduction algorithm
Removal of
superfluous added
nodes
Optimized number of
added nodes
64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
111. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Final configuration (with determinantal addition
method)
Reduction algorithm
Removal of
superfluous added
nodes
Optimized number of
added nodes
64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
112. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Final configuration (with determinantal addition
method)
Reduction algorithm
Removal of
superfluous added
nodes
Optimized number of
added nodes
64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
113. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Comparison between addition methods
Different scenarios depending on the percentage of area still
covered after the disaster
Square side of 1
Coverage radius of 0.25
Mean number of added vertices:
% of area initially covered 20% 40% 60% 80%
Grid method 9.00 9.00 9.00 9.00
Uniform method 32.51 29.34 24.64 15.63
Determinantal method 16.00 14.62 12.36 7.79
65/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
114. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Comparison with a greedy algorithm
Greedy algorithm
Lays nodes along a grid
Adds nodes from the furthest to the nearest
Until the furthest is already covered
Similar to our algorithm with the grid addition method
Mean final number of added vertices:
% of area initially covered 20% 40% 60% 80%
Greedy algorithm 3.69 3.30 2.84 1.83
Homology algorithm 4.42 3.87 2.97 1.78
66/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
115. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Robustness
% of area initially covered 20% 40% 60% 80%
Greedy algorithm 0.68 0.67 0.48 0.35
Homology algorithm 0.58 0.52 0.36 0.26
Table : Mean number of holes after a Gaussian perturbation
% of area initially covered 20% 40% 60% 80%
Greedy algorithm 40.7% 45.2% 58.8% 68.9%
Homology algorithm 54.0% 58.0% 68.8% 76.1%
Table : Probability that there is no hole after a Gaussian perturbation
67/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
116. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Conclusion
Disaster recovery algorithm
patches damaged wireless network
adds enough virtual nodes to repair the network
runs a reduction algorithm on the virtual added nodes
Simplicial homology representation
to compute the connectivity and the coverage of a wireless
network
Ginibre determinantal point process
to place nodes where they are needed
68/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
117. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Bibliography I
[1] L. Decreusefond, E. Ferraz, H. Randriam and A. Vergne.
Simplicial Homology of Random Configurations. In Advances in
Applied Probability, 46(2), 2014. hal-00578955
[2] L. Decreusefond, I. Flint, and A. Vergne. Efficient simulation of
the Ginibre process. hal-00869259, to appear in Adv. in Applied
Prob.
[3] A. Vergne, L. Decreusefond, and P. Martins. Reduction
algorithm for simplicial complexes. In INFOCOM, 2013
Proceedings IEEE, pages 475–479, 2013. hal-00864303
69/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
118. Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Bibliography II
[4] A. Vergne, I. Flint, L. Decreusefond, and P. Martins. Disaster
Recovery in Wireless Networks: A Homology-Based Algorithm.
In International Conference on Telecommunications 2014
(ICT2014), May 2014. Best paper award. hal-00800520
[5] A. Vergne. Topologie algébrique appliquée aux réseaux de
capteurs, PhD (2013) Prix de thèse Futur et Ruptures, 2014
70/66 June, 2014 Institut Mines-Telecom Topology of wireless networks