Calculating effective resistances on underlying networks of association schemes
نویسندگان
چکیده
Recently, in Refs. [1] and [2], calculation of effective resistances on distance-regular networks was investigated, where in the first paper, the calculation was based on stratification and Stieltjes function associated with the network, whereas in the latter one a recursive formula for effective resistances was given based on the Christoffel-Darboux identity. In this paper, evaluation of effective resistances on more general networks which are underlying networks of association schemes is considered, where by using the algebraic combinatoric structures of association schemes such as stratification and Bose-Mesner algebras, an explicit formula for effective resistances on these networks is given in terms of the parameters of corresponding association schemes. Moreover, we show that for particular underlying networks of association schemes with diameter d such that the adjacency matrix A possesses d + 1 distinct eigenvalues, all of the other adjacency matrices Ai, i 6= 0, 1 can be written as polynomials of A, i.e., Ai = Pi(A), where Pi is not necessarily of degree i. Then, we use this property for these particular networks and assume that all of the conductances except for one of them, say c ≡ c1 = 1, are zero to give a procedure for evaluating effective resistances on these networks. The preference of this procedure is that one can evaluate effective resistances by using the structure of their Bose-Mesner algebra without any need to know the spectrum of the adjacency matrices.
منابع مشابه
Congestion Control Approaches Applied to Wireless Sensor Networks: A Survey
Wireless Sensor Networks (WSNs) are a specific category of wireless ad-hoc networks where their performance is highly affected by application, life time, storage capacity, processing power, topology changes, the communication medium and bandwidth. These limitations necessitate an effective data transport control in WSNs considering quality of service, energy efficiency, and congestion control. ...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملLearning Networks from Random Walk-Based Node Similarities
Digital presence in the world of online social media entails significant privacy risks [6, 10, 33, 58, 34]. In this work we consider a privacy threat to a social network in which an attacker has access to a subset of random walk-based node similarities, such as effective resistances (i.e., commute times) or personalized PageRank scores. Using these similarities, the attacker’s goal is to infer ...
متن کاملPerfect state transfer of a qudit over underlying networks of group association schemes
As generalizations of results of Christandl et al.[1, 2] and Facer et al.[3], Bernasconi et al.[4, 5] studied perfect state transfer (PST) between two particles in quantum networks modeled by a large class of cubelike graphs (e.g., the hypercube) which are the Cayley graphs of the elementary abelian group Zn 2 . In Refs. [6, 7], respectively, PST of a qubit over distance regular spin networks a...
متن کاملComparative Study of Artificial Neural Networks (ANN) and Statistical Methods for Predicting the Performance of Ultrafiltration Process in the Milk Industry
Milk ultrafiltration is a membrane process, which is highly complex innature. The cost effectiveness of the process depends heavily on the flux permeate and the total hydraulic resistance of the membrane. In this work, a comparative study for the prediction of the performance of milk ultrafiltration with ANN and statistical method has been carried out. The result reveals that both methods c...
متن کامل