Next Article in Journal
Towards Parameter Identification of a Behavioral Model from a Virtual Reality Experiment
Previous Article in Journal
Solving an Integral Equation via Fuzzy Triple Controlled Bipolar Metric Spaces
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Generalized Convexity Properties and Shape-Based Approximation in Networks Reliability

by
Gabriela Cristescu
1,†,
Vlad-Florin Drăgoi
1,2,*,† and
Sorin Horaţiu Hoară
1,3,†
1
Faculty of Exact Sciences, Aurel Vlaicu University of Arad, Bd. Revoluţiei, no. 77, 310130 Arad, Romania
2
LITIS, Rouen Normandie University, Avenue de l’Université, 76800 Saint-Étienne-du-Rouvray, France
3
Department of Computers and Information Technology, Polytechnic University of Timişoara, Piaţa Victoriei No. 2, 300006 Timişoara, Romania
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2021, 9(24), 3182; https://doi.org/10.3390/math9243182
Submission received: 17 November 2021 / Revised: 7 December 2021 / Accepted: 8 December 2021 / Published: 9 December 2021
(This article belongs to the Section Computational and Applied Mathematics)

Abstract

:
Some properties of generalized convexity for sets and functions are identified in case of the reliability polynomials of two dual minimal networks. A method of approximating the reliability polynomials of two dual minimal network is developed based on their mutual complementarity properties. The approximating objects are from the class of quadratic spline functions, constructed based on both interpolation conditions and shape knowledge. It is proved that the approximant objects preserve both the high-order convexity and some extremum properties of the exact reliability polynomials. It leads to pointing out the area of the network where the maximum number of paths is achieved. Numerical examples and simulations show the performance of the algorithm, both in terms of low complexity, small error and shape preserving. Possibilities of increasing the accuracy of approximation are discussed.

1. Introduction

From the earliest days of network reliability, researchers have tried to develop algorithms to efficiently compute the reliability of graphs/networks. In a recent survey paper [1], Brown et al. have rediscovered the way of this research domain, by shedding light on some of the theoretical advances made in the past as well as the new directions. This scientific adventure started with the work of Moore and Shannon [2,3] and von Neumann [4], when the first foundations of the field were settled. In the late seventies [5], Valiant demonstrated that the main computational problem, i.e., to compute the reliability polynomial of a two-terminal network, is #P-complete. Therefore, when the graph parameters are growing significantly, one has to find alternative methods for estimating reliability, such as (i) applying simplifications in order to reduce the computations as much as possible so that the algorithm becomes practically effective, (ii) bounding the reliability polynomial (using combinatorial methods and/or structural properties), and (iii) approximating the reliability polynomial such that the error of approximation is bounded by a relatively small quantity.
The less investigated topics related to network reliability are the analytical properties such as shape properties of the reliability polynomials, including convexity, the number of real roots and their density, etc. In order to compensate the complexity problems of computing the coefficients of the reliability polynomial of a two-terminal network, the authors of [6,7] proposed to approximate the polynomials using structural properties of the networks. In particular, duality is a characteristic that induces complementary properties on the coefficients, which are considered in the approximations. In [8], Hermite interpolation is used for hammock networks based on previous results on the shape [9]. Cubic splines are proposed in [6,7] and are suitable for any two-terminal networks. In [7], two methods of producing cubic splines are compared—Lagrange-type interpolation procedures and Bernstein approximation operator, emphasizing the accuracy of the methods. There are several advantages for taking duality into account in the context of approximations:
  • Computing the first non-trivial (different from zero) coefficient of the reliability polynomial of a network enables one to directly obtain the value of the last non-trivial (different from the binomial coefficient) coefficient of the reliability polynomial of the dual network.
  • Adjusting approximated coefficients of a network can be done more efficiently when duality is considered, as more information is taken into account.
  • The error of simultaneous approximation of two dual networks can be more accurately estimated when compared to a single network approximation.

1.1. Our Contribution

The mutual behaviour of two dual networks, described from the point of view of their reliability, provides us with additional information, which is used as input in the construction of the algorithms from [6,7]. In this paper, we refine the approximation technique by considering the shape properties of the reliability polynomials of two dual two-terminal networks. A profound research on the shape of the reliability polynomials of two dual two-terminal networks is presented, starting from their complementarity properties [6,7]. Their mutual behaviour referring to high-order convexity properties, tangents properties, inflection points, etc. are emphasized. We construct approximation operators that preserve as many as possible shape properties. The use of the quadratic spline functions allows us to keep control on the approximation process from the point of view of shape preserving. The notations and abbreviations used in this article are summarized in Table 1.

1.2. Outline of the Article

In Section 2, we describe the types of networks implied in our research and introduce the main definitions and properties regarding their reliability. Section 3 contains results referring to high-order convexity properties of the reliability polynomial of a MMN and the manner, in which these properties are transferred to the dual network. Some extremum properties of the coefficients function are discussed. An algorithm for simultaneous approximation of the reliability polynomials of two dual networks is described in Section 4 based on quadratic spline functions. The approximant functions are constructed to preserve, as much as possible, the shape properties of the reliability polynomials of MMNs. In Section 5, we simulate the approximation technique using the new algorithm. The shape properties of the approximant objects are emphasized, proving the performance of the algorithm from shape preserving point of view. We conclude the article in Section 6.

2. Preliminaries on Network Reliability

2.1. Matchstick Minimal Two-Terminal Networks

Any network G made of n identical devices that has two distinguished terminals—a source S and a terminus T—is called a two-terminal network (denoted by 2 TN in the sequel). G can be characterized at least by three parameters: width (w), length (l), and size ( n ) w is the size of a “minimal cut” separating S from T, l is the size of a “minimal path” from S to T . In general, we have n w l (see [2]). Any 2 TN G of width w and length l will be called a ( l , w ) 2 TN , or 2 TN of type ( l , w ) . All functions, as reliability polynomial, its coefficients function and various approximations, related to a ( l , w ) 2 TN will be denoted by a character having the index ( l , w ) . Any 2 TN satisfying n = w l is minimal (see [2]), the members of the family of minimal 2 TN s being denoted by MMN.

Matchstick Minimal Networks

Let l and w be two strictly positive integers. A 2 TN G is a MMN if and only if it can be designed in one of the following two ways: Either start by a parallel-of-series ( PoS ) of width w and length l and place vertical matchsticks arbitrarily, or start with a series-of-parallel ( SoP ) of width w and length l and remove vertical matchsticks arbitrarily.
Another way of defining a MMN, described in [10], is by using the bijection between the set of all MMNs of length l and width w and the set of all binary matrices M G M ( l 1 ) × ( w 1 ) { 0 , 1 } . At any ( l , w ) MMN G , we associate its matchstick incidence matrix M G M ( l 1 ) × ( w 1 ) { 0 , 1 } , as
  • M G ( i , j ) = 1 if there is a matchstick at position ( i , j ) ;
  • M G ( i , j ) = 0 if there is no matchstick at position ( i , j ) .

Hammock Networks

MMNs presenting a “brick-wall” pattern are known as hammocks [2,3,11,12]. Starting from a SoP , by alternately deleting matchsticks, one can construct a hammock. If w and l are both even, there are two hammocks ( H and H + ); otherwise, only one hammock exists H . Using the matchstick incidence matrix, we have M PoS = 0 ( w 1 ) × ( l 1 ) and M SoP = 1 ( w 1 ) × ( l 1 ) (see Figure 1).

Duality Properties

Let G be a MMN. The dual of G , denoted here by G , was introduced in [2]. Duality properties were proved in [6,9] in case of particular MMNs, such as hammocks. Some duality properties, that are needed in the context of approximations (as mentioned in [6]), are recalled in the next subsection. Let us denote by 1 l × w the all-ones matrix and the bit-wise complement of a binary matrix M G M ( l 1 ) × ( w 1 ) { 0 , 1 } as
M ¯ G = 1 ( l 1 ) × ( w 1 ) M G ,
where ⊕ denotes the XOR operation.
Theorem 1
([10]). Let G be a ( l , w ) MMN . Then, either l = 1 ( G being the all parallel network) and we have G is the all series network, or w , l 2 and we have M G = M ¯ G t .
Notice that by Theorem 1, the dual of a ( l , w ) MMN is a ( w , l ) MMN .

2.2. Reliability Polynomial

The reliability of a 2 TN is defined as the probability that the source S and the terminus T are connected, given that each device closes with probability p . The reliability polynomial is presented in the literature under several forms, depending on the basis of the linear space of polynomials that is taken into account. If the Bernstein basis
n k p k ( 1 p ) n k | k { 0 , 1 , . . . , n }
is used, then we have the so-called N-form (see in [2]):
Rel ( G ; p ) = k = 0 n N k p k ( 1 p ) n k .
The coefficient N k represents the number of ways one can select a subset of k devices in G such that if these k devices are closed and the remaining are open, then the two terminals S and T are connected, i.e., G is closed. Straightforward, well-known basic properties of N k can be immediately deduced from the definition.
Property 1
([2]). If G is a ( l , w ) 2 TN , then
  • k { 0 , , n } , 0 N k n k ;
  • k { 0 , , l 1 } , N k = 0 ;
  • k { n w + 1 , , n } , N k = n k .
Corollary 1
([6]). Denoting by a k the coefficient of Rel ( G ; p ) written in Bernstein basis, then the coefficients in (2) are N k = n k a k . As consequence, we deduce that 0 a k 1 for all k { 0 , 1 , . . . , n } .
In the sequel, we consider two dual MMNs, denoted by G and G . All over the paper, the coefficients of the reliability polynomial of G will be denoted as in (2) and the coefficients of the reliability polynomial of the dual network G will be denoted by N k . The following complementarity property is well known:
Property 2
([2]). If Rel ( G ; p ) and Rel ( G ; p ) are the reliability polynomials of two dual MMNs of type ( l , w ) respectively ( w , l ) , then
Rel ( G ; p ) + Rel ( G ; 1 p ) = 1 .
Equation (3) leads to the following complementarity identity, proved in [6] (Property 2 p.80) for hammock networks:
Property 3
([6,7]). If N k and N k are coefficients of the reliability polynomials of two dual MMNs, G and G , then
N k + N n k = n k ,
for all k { 0 , 1 , 2 , . . . , n } .
Identity (4) also holds for any dual 2TNs (the proof is identical).

Parallel-of-Series and Series-of-Parallel

For some type of MMNs there is a closed formula of the reliability polynomial.
Theorem 2
([13]). Let PoS be a ( l , w ) MMN . Then, we have
Rel PoS ; p = k = l n j = 1 k l ( 1 ) j + 1 w j n j l n k p k ( 1 p ) n k ,
where k l denotes the integer part of the fraction.
The proof relies of the fact that one can write the coefficients of a ( l , w ) PoS using the formula
N k = j = 1 k l ( 1 ) j + 1 w j n j l n k .
Combined with (4) one can deduce
N n k = j = 0 k l ( 1 ) j w j n j l n k .
Remark 1.
The coefficients of a PoS also have a combinatorial interpretation, fact that allows one to deduce basic properties such as those in Proposition 1. Indeed, N k represents the number of ways one can distribute k balls among w urns, where the urns have height l, such that at least one urn is completely filled with balls.
Using the complementary property induced by duality (4), we deduce the following result.
Proposition 1.
Let G be a ( l , w ) MMN . Then, we have
j = 1 k l ( 1 ) j + 1 w j n j l n k N k j = 0 n k w ( 1 ) j l j n k j w k
Proof. 
Any coefficient N k of an arbitrary ( l , w ) MMN is bigger that or equal to the same coefficient of an ( l , w ) PoS and smaller than or equal to the same coefficient of an ( l , w ) SoP . Using Formula (6), one obtains the first inequality. As for the second inequality, we the formula for the coefficients of a ( w , l ) PoS , i.e., j = 1 k w ( 1 ) j + 1 l j n j w n k , combined with the fact that its dual is a ( l , w ) SoP . This yields that the n k coefficient of an ( l , w ) SoP equals j = 0 k w ( 1 ) j + 1 l j n j w n k . Therefore, a simple variable change implies the wanted result. □

3. Mutual Shape Properties of the Reliability Polynomials of Two Dual Networks

3.1. Convexity of High Order

Let us consider [ a , b ] R an interval and a function f : [ a , b ] R . Suppose that n N .
Definition 1.
The divided difference of order n of function f on points a x 1 < x 2 < . . . < x n + 1 b is the number defined by
[ x 1 , x 2 , . . . , x n + 1 ; f ] = [ x 2 , x 3 , . . . , x n + 1 ; f ] [ x 1 , x 2 , . . . , x n ; f ] x n + 1 x 1 ,
[ x 1 ; f ] = f ( x 1 ) .
Remark 2.
It is known (see, for example, in [14]) that if a function f is n-th order differentiable on a point x ( a , b ) , then the derivative f ( n ) ( x ) equals to the limit of n ! [ x 1 , x 2 , , x n + 1 ; f ] when all points x i , i { 1 , 2 , , n + 1 } tend to x.
The concept of convex function of high order on an interval was introduced in 1926 by E. Hopf [15]. T. Popoviciu [16] extended this concept to functions defined on an arbitrary set in 1934. Furthermore, T. Popoviciu [14] extensively studied this concept in case of real functions of several real variables.
Definition 2
([14]). Function f is said to be n-th order convex (non-concave, polynomial, non-convex, concave) on [ a , b ] if
[ x 1 , x 2 , , n + 2 ; f ] > ( , = , , < ) 0 ,
respectively, for all systems of points a x 1 < x 2 < < x n + 2 b
The functions having one of the properties defined by means of (10) are generally called n-th order functions (see in [16,17]).
Remark 3.
The reliability polynomial of a network of type n is a n-th order polynomial function on [ 0 , 1 ] , as every n-th degree polynomial has this property [15].
Remark 4.
If function f is n + 1 -th order differentiable on [ a , b ] , then, in view of Remark 2, it follows that condition (10) is expressible in terms of derivatives as follows: function f is n-th order convex (non-concave, polynomial, non-convex, concave) on [ a , b ] if
f ( n + 1 ) ( x ) > ( , = , , < ) 0 ,
respectively, for all x [ a , b ] . The one side derivatives are considered on points a and b .

3.2. Convexity Properties of the Reliability Polynomials of Two Dual Minimal Networks

With the properties of convexity being accidentally mentioned, both in case of the reliability polynomial of a MMN (see in [6,7]) and in case of its coefficients sequence (see in [18]), this subsection presents the research results on the presence of various types of high-order convexity to the reliability polynomials of two dual MMNs. The impact of networks duality on the shape of the polynomials is emphasized.
Theorem 3.
If Rel ( G ; p ) and Rel ( G ; p ) are the reliability polynomials of two dual MMNs of type ( l , w ) , respectively, ( w , l ) , n = l w 3 , and 0 k n , then the following holds.
1.
If k is odd, then Rel ( G ; p ) and Rel ( G ; 1 p ) are ( k 1 ) -th order functions of the same type on each sub-interval of [ 0 , 1 ] : either both are ( k 1 ) -th order convex or both are ( k 1 ) -th order concave.
2.
If k is even then Rel ( G ; p ) and Rel ( G ; 1 p ) are ( k 1 ) -th order functions of opposite types on each sub-interval of [ 0 , 1 ] : if one polynomial is ( k 1 ) -th order convex then the other one is ( k 1 ) -th order concave, and conversely.
Proof. 
The two polynomials are differentiable functions of all orders, verifying (3). By successively differentiating the Equation (3) k times one gets
d k d p k Rel ( G ; p ) = ( 1 ) k + 1 d k d p k Rel ( G ; 1 p ) ,
which gives the conclusion, based on Remark 4. □
Figure 2 shows the mutual behaviour of the derivatives of the reliability polynomials of two dual hammock networks. The corresponding impact on the shape of reliability polynomials is described by the following corollaries.
Corollary 2.
Suppose that n 3 and k = 2 . Relation (12) implies that if p 0 is an inflection point of the polynomial Rel ( G ; p ) then it is an inflection point of Rel ( G ; 1 p ) , which implies that 1 p 0 is an inflection point of Rel ( G ; p ) .
Corollary 3.
Suppose that n 3 , k is odd and take p = 1 2 in Equation (12). It follows that
d k d p k Rel ( G ; 1 2 ) = d k d p k Rel ( G ; 1 2 ) ,
which means that all derivatives of odd order of the reliability polynomials of two dual networks, Rel ( G ; p ) and Rel ( G ; p ) , have the same value. In particular, if k = 1 one gets that the two polynomials, Rel ( G ; p ) and Rel ( G ; 1 p ) , have parallel tangents at p = 1 2 .
Corollary 4.
Suppose that n 3 , k is even and take p = 1 2 in Equation (12). It follows that
d k d p k Rel ( G ; 1 2 ) = d k d p k Rel ( G ; 1 2 ) .
In particular, if k = 2 one gets that if p = 1 2 is an inflection point of a reliability polynomial of a network then it is an inflection point of the reliability polynomial of the dual network as well.
Corollary 5.
Suppose that G is a minimal network of length l 3 and width w, which means that n = l w 3 . Property 1 implies that all derivatives of order k < l of its reliability polynomial Rel ( G ; p ) equal to 0 at p = 0 . As consequence, the x-axis is tangent to the graph of this polynomial at p = 0 and the curvature radius of Rel ( G ; p ) tends to infinity when p 0 . All these, together with the non-negativity of a reliability polynomial over [ 0 , 1 ] , imply that the polynomial is first-order convex in the neighborhood of the origin. Theorem 3 implies that the reliability polynomial Rel ( G ; 1 p ) is concave in the neighborhood of the origin. The functions Rel ( G ; 1 p ) and Rel ( G ; p ) are symmetric with respect to the straight line p = 1 2 , which implies that it is also convex in the neighborhood of the origin.
Another convexity property of functions that is important in the context of the reliability theory in case of 2 TN s is the log-convexity, defined as follows:
Definition 3
([19]). A function f : E R , E R , is said to be log-convex (or log-concave) on E if f ( x ) > 0 for all x E and function log ( f ) is convex (or concave, respectively) on E.
Remark 5.
It is proved in [19], pp. 207, that the log-convex (log-concave) functions are also convex (concave) functions, but the converse is not true. Based on the results of Huh [18] and Lenz [20], the sequence of the coefficients of a the reliability polynomial is log-concave. This property will be used in the sequel, because it implies the concavity of the coefficients function of a reliability polynomial, which will be defined in the next section.
Consider G a ( l , w ) MMN . The reliability polynomial of this network, expressed in Bernstein basis, is Rel ( G ; p ) defined by (2). Knowing the reliability polynomial Rel ( G ; p ) is equivalent to knowing the corresponding function F ( l , w ) defined by (13). We consider the dual network G together with its reliability polynomial Rel ( G ; p ) . Let us define two functions, which we call coefficients functions in the sequel: F ( l , w ) : [ 0 , n ] R and F ( w , l ) : [ 0 , n ] R by
F ( l , w ) ( x ) = 0 , if x = 0 ( N k N k 1 ) x + k N k 1 ( k 1 ) N k , if x [ k 1 , k ] , k { 1 , 2 , , n } .
F ( w , l ) ( x ) = 0 , if x = 0 ( N k N k 1 ) x + k N k 1 ( k 1 ) N k , if x [ k 1 , k ] , k { 1 , 2 , , n } .
In fact, function F ( l , w ) (respectively, F ( w , l ) ) is the segmentary linear function obtained based on the coefficient functions of the reliability polynomials two dual hammock networks, as defined in [7,18,20]. Knowing the reliability polynomials of the two dual networks is equivalent to knowing the two coefficient functions defined by (13) and (14).
Remark 6.
The coefficient function F ( l , w ) is concave on [ l 1 , n w + 1 ] . The coefficients function F ( w , l ) is concave functions on [ w 1 , n l + 1 ] . This shape is a consequence of Property 1 and Remark 5.

3.3. Extremal Properties of the Coefficients Functions

The sequence of coefficients of the reliability polynomial have some monotony properties, that are consequences both of their complementarity property (4) and of Remark 5. The concavity of functions F ( l , w ) and F ( w , l ) on [ 0 , n ] , together with Property 1, imply that the index of the maximum coefficient of the two reliability polynomials is in [ l 1 , n w + 1 ] , and [ w 1 , n l + 1 ] , respectively. We construct, in the next section, a method to approximate the reliability polynomials of two dual networks, denoted here by G of ( l , w ) -type, and its dual G of ( w , l ) -type. We prove that the maximum coefficient of the approximate reliability polynomial of the G is reached in the same interval as the maximum coefficient of the exact polynomial. The most frequent interval that contains the index of the maximum point of F ( l , w ) , as identified by studying the completely known reliability polynomials of small size hammock networks and also small size compositions of series and parallel, is
I 1 = n w + l 2 , n w + l 2 + n w l + 2 4 .
Few networks have the index of the maximum coefficient of the reliability polynomial not belonging to I 1 but to a larger interval,
I 2 = n w + l 2 , n w + 1 2 .
Few examples are presented in Table 2. The maximum coefficient of the reliability polynomial is denoted by max ( N k ) , and the value of the index k of the maximum coefficient is denoted by argmax ( F ( l , w ) ( x ) ) in this table.
A special case is presented by Parallel-of-series and Series-of-parallel networks. In case of a PoS , we proved that index of the maximum value of the coefficients (6) is in n 2 , n w + 1 2 . We omit the proof of this property both because of its length and because it exceeds the purpose of this paper. However, we remark that the coefficients of the reliability polynomial of all types of network have the same extremal property, which we retrieve to its approximant.

4. Shape-Preserving Simultaneous Approximation of the Reliability Polynomials of Two Dual Two-Terminal Networks

4.1. An Efficient Constructive Method

In this section, we intend to build a method of approximation of functions F ( l , w ) and F ( w , l ) by means of a spline function, starting from the properties of the reliability polynomials described above and in [11,21]. Some generalized convexity properties as described in [22] will be used. We construct segmentary polynomial function meant to imitate the shape of functions F ( l , w ) and F ( w , l ) . As proved in [17], given a continuous function on a bounded closed interval, the Bernstein approximation polynomial of degree s of this function preserves the convexity of the approximated function (see also in [23,24]). This property gave us the idea of approximating functions F ( l , w ) and F ( w , l ) by means of polynomials imitating the Bernstein polynomial of third degree in [6]. The results of the cubic spline approximation algorithm presented in [6] constructed both by means of Lagrange interpolation and by a weakened Bernstein type approximation operator are compared in [7]. Furthermore, the algorithm from in [6] is refined in [7] in order to improve the accuracy of the approximation. In this paper, we describe a version of the approximation algorithm from in [7] obtained by replacing the cubic splines with quadratic splines. The initial information on the two coefficients functions F ( l , w ) and F ( w , l ) refers to their values on intervals [ 0 , l 1 ] [ n w + 1 , n ] and [ 0 , w 1 ] [ n l + 1 , n ] respectively. We also have shape information on these functions, i.e., the concavity of these functions is a consequence of the results from [18,20]. We complete the missing information from intervals [ l 1 , n w + 1 ] and respectively [ w 1 , n l + 1 ] by the known information on the shape of the coefficients functions F ( l , w ) and F ( w , l ) . This is the reason to carefully chose the initial knots in order to generate a function having the same shape as F ( l , w ) and F ( w , l ) . In order to approximate F ( l , w ) and F ( w , l ) we construct two continuous quadratic spline functions f ( l , w ) : [ 0 , n ] R and f ( w , l ) : [ 0 , n ] R that verify the following conditions:
f ( l , w ) ( 0 ) = f ( l , w ) ( 1 ) = = f ( l , w ) ( l 1 ) = 0 f ( l , w ) ( s ) = N s > n w 1 f ( l , w ) ( n w + k ) = n w k , k { 0 , 1 , w 1 } ,
f ( w , l ) ( 0 ) = f ( w , l ) ( 1 ) = . . . = f ( w , l ) ( w 1 ) = 0 f ( w , l ) ( t ) = N t > n l 1 f ( w , l ) ( n l + k ) = n l k , k { 0 , 1 , l 1 } .
for some points s [ l 1 , n w + 1 ] and t [ w 1 , n l + 1 ] .
Remark 7.
If l > 2 and w > 2 , it is always possible to find two numbers s [ l 1 , n w + 1 ] and t [ w 1 , n l + 1 ] such as the two conditions N s > n w 1 and N t > n l 1 are valid. Indeed, one can always compute N l and N w by means of the technique from [11]. Then, one can compute N n w and N n l using the coefficients complementarity relation (4). The relation(4) implies that at least two of the four coefficients verify the needed conditions.
In order to define the two functions f ( l , w ) and f ( w , l ) , we have previously taken into account the convexity properties of the second-degree polynomial that allows us to define approximation operators that preserve some shape properties of the approximated curve. In the sequel we define an approximation function by interpolating the coefficients functions using quadratic splines conveniently chosen in order to preserve the convexity and concavity shapes. Function f ( l , w ) is searched as
f ( l , w ) ( x ) = 0 , if 0 x l 1 A x 2 + B x + C , if l 1 < x n w + 1 d ( l , w ) ( k ) ( x ) , if x ( k 1 , k ] , k { n w + 2 , , n }
Here,
d ( l , w ) ( k ) ( x ) = n k n k 1 x + k n k 1 ( k 1 ) n k
are the straight line segments determined by points ( k 1 , n k 1 ) and ( k , n k ) , for all k { n w + 2 , , n } respectively. Furthermore, the coefficients A , B , C R are obtained using the interpolation conditions:
lim x l 1 x > l 1 f ( l , w ) ( x ) = 0 f ( l , w ) ( s ) = N s > n w 1 f ( l , w ) ( n w + 1 ) = n w 1
Function f ( w , l ) is searched as
f ( w , l ) ( x ) = 0 , if 0 x w 1 A x 2 + B x + C , if w 1 < x n l + 1 d ( w , l ) ( k ) ( x ) , if x ( k 1 , k ] , k { n l + 2 , , n }
Here,
d ( w , l ) ( k ) = n k n k 1 x + k n k 1 ( k 1 ) n k
are the straight line segments determined by points ( k 1 , n k 1 ) and ( k , n k ) , for all k { n l + 2 , , n } . As above, the coefficients A , B , C R are obtained using the interpolation conditions:
lim x w 1 x > w 1 f ( w , l ) ( x ) = 0 f ( w , l ) ( t ) = N t > n l 1 f ( w , l ) ( n l + 1 ) = n l 1
The interpolation conditions (18) and (20) lead to the following systems of linear equations in order to compute the functions f ( l , w ) and f ( w , l ) using (17) and (19):
A ( l 1 ) 2 + B ( l 1 ) + C = 0 A s 2 + B s + C = N s A ( n w + 1 ) 2 + B ( n w + 1 ) + C = n w 1 ,
A ( w 1 ) 2 + B ( w 1 ) + C = 0 A t 2 + B t + C = N t A ( n l + 1 ) 2 + B ( n l + 1 ) + C = n l 1 .
The approximation algorithm, based on determining the functions f ( l , w ) and f ( w , l ) using the solutions of the two systems of equations obtained by Cramer’s rule, is as follows.
The algorithm:
Step 1. 
Compute the values of two coefficients N s and N t using some technique from literature. If N l and N w are chosen then we use the method from [11] and then we compute the values N n w and N n l using (4).
Here, we put s = n w and t = n l .
Step 2. 
Compute the coefficients of the approximate functions f ( l , w ) and f ( w , l ) , by
A = n w 1 ( s l + 1 ) N s ( n w l + 2 ) ( s l + 1 ) ( n w l + 1 ) ( n w l + 2 ) B = N s ( n w l + 2 ) ( n w + l ) n w 1 ( s l + 1 ) ( s + l 1 ) ( s l + 1 ) ( n w l + 1 ) ( n w l + 2 ) C = ( l 1 ) n w 1 s ( s l + 1 ) N s ( n w + 1 ) ( n w l + 2 ) ( s l + 1 ) ( n w l + 1 ) ( n w l + 2 ) A = n l 1 ( t w + 1 ) N t ( n w l + 2 ) ( t w + 1 ) ( n w l + 1 ) ( n w l + 2 ) B = N t ( n w l + 2 ) ( n l + w ) n l 1 ( t w + 1 ) ( t + w 1 ) ( t w + 1 ) ( n w l + 1 ) ( n w l + 2 ) C = ( w 1 ) n l 1 t ( t w + 1 ) N t ( n l + 1 ) ( n w l + 2 ) ( t w + 1 ) ( n w l + 1 ) ( n w l + 2 ) .
Step 3. 
Write functions f ( l , w ) and f ( w , l ) using (17) and (19), respectively.
Step 4. 
Compute f ( l , w ) ( k ) , k { l , l + 1 , , n w } .
Step 5. 
Compute f ( w , l ) ( k ) , k { w , w + 1 , , n l } .
Step 6. 
Compute
Δ ( k ) = n k f ( l , w ) ( k ) f ( w , l ) ( n k ) ,
for each k { min { l 1 , w 1 } , max { n l + 1 , n w + 1 } } .
Step 7. 
Compute N ˜ ( F ( l , w ) ; k ) = f ( l , w ) ( k ) + Δ ( k ) 2 , and N ˜ ( F ( w , l ) ; n k ) = f ( w , l ) ( n k ) + Δ ( k ) 2 .
Step 8. 
If N ˜ ( F ( l , w ) ; k ) < 0 then replace N ˜ ( F ( l , w ) ; k ) = 0 , and put N ˜ ( F ( w , l ) ; n k ) = n k (or converse, if the dual coefficient is negative).
Step 9. 
Output the approximation polynomials
ApRel ( G ; p ) = k = 0 n N ˜ ( F ( l , w ) ; k ) p k ( 1 p ) n k ,
ApRel ( G ; p ) = k = 0 n N ˜ ( F ( w , l ) ; k ) p k ( 1 p ) n k .
Remark 8.
The overall time complexity of computing ApRel ( G ; p ) and ApRel ( G ; p ) is O ( n ) , when n . This fact can be easily deduce either by inspecting each step of our algorithm or by adapting the proof of Theorem 5 from in [7].

4.2. Shape and Extremum Properties of the Approximation Operator

In this subsection we suppose that both l 2 and w 2 and at least one inequality is strict. It implies that n 6 .
Remark 9.
All the invariant properties proved in [7] (Property 14, Corollary 15 and Property 16) in case of the use of an approximation operator constructed by means of cubic spline functions stay valid. One can prove that the approximate reliability polynomial of two dual networks obtained by using quadratic splines keep invariant the complementarity relations (3), (4) and their consequences in a similar manner as in [7], which means that
N ˜ ( F ( l , w ) ; k ) + N ˜ ( F ( w , l ) ; n k ) = n k ,
k = 0 n N ˜ ( F ( l , w ) ; k ) + N ˜ ( F ( w , l ) ; n k ) = 2 n ,
ApRel ( G ; p ) + ApRel ( G ; 1 p ) = 1 .
Remark 10.
As a consequence of (28), it follows that all the properties of the derivatives of the reliability polynomials of two dual networks proved in the previous section, Theorem 3, stay valid in case of the approximation polynomials. The corollaries of Theorem 3 stay also valid, implying that the same type of high-order convexity are retrieved to the approximation polynomials. Simulations on small-sized MMNs, showing these shape properties are in Figure 3 and Figure 4.
It is proved in [18,20] that the coefficients sequence of the reliability polynomial of a MMN has the log-concavity property. It implies, as discussed above, that the coefficients functions F ( l , w ) and F ( w , l ) are concave on intervals [ l 1 , n ] and [ w 1 , n ] , respectively. The concavity is preserved by the spline approximation functions f ( l , w ) and f ( w , l ) . As consequence of the known information on the coefficients function (13) and (14), it follows that there are two numbers s { l , l + 1 , , n w } and t { w , w + 1 , , n l } such as N s > n w 1 and N t > n l 1 .
Property 4.
If l > 2 and w 2 and if s { l , l + 1 , , n w } such as N s > n w 1 , then function f ( l , w ) is concave and f ( l , w ) ( x ) 0 on interval [ l 1 , n w + 1 ] .
Proof. 
It is either obvious or elementary to prove that
( s l + 1 ) < ( n w l + 2 ) ,
( n w l + 2 ) ( n w + l ) > ( s l + 1 ) ( s + l 1 ) ,
s ( s l + 1 ) < ( n w + 1 ) ( n w l + 2 ) .
Using these inequalities, one gets that A 0 , B 0 and C 0 . The concavity of the parabola is a consequence of the negativity of A. The non-negativity of function f ( l , w ) is a consequence of its definition (17) and the hypothesis on s. □
Remark 11.
If l 2 and w > 2 and if t { w , w + 1 , , n l } is chosen such as N t > n l 1 then
A 0 , B 0 , C 0 .
As consequence, function f ( w , l ) is concave and f ( w , l ) ( x ) 0 on [ w 1 , n l + 1 ] .
If x , y R and x < y , then we denote the length of interval [ x , y ] by L ( x ; y ) = y x in the sequel.
Property 5.
Suppose that l > 2 and w 2 . Suppose that s is chosen such that N s > n w 1 . Let us denote by V ( x V , y V ) the maximum point of function f ( l , w ) on [ l 1 , n w + 1 ] . Then,
x V n w + l 2 .
Proof. 
Let us denote the length of intervals [ l 1 , n w + 1 ] , [ s , n w + 1 ] and [ l 1 , s ] by L ( l 1 ; n w + 1 ) , L ( s ; n w + 1 ) and L ( l 1 ; s ) , respectively. Because l s n w , it follows that L ( l 1 ; n w + 1 ) > L ( s ; n w + 1 ) and L ( l 1 ; n w + 1 ) > L ( l 1 ; s ) . The abscissa of the vertex of parabola f ( l , w ) is
x V = B 2 A = N s ( n w l + 2 ) ( n w + l ) 2 N s ( n w l + 2 ) n w 1 ( s l + 1 ) n w 1 ( s l + 1 ) ( s + l 1 ) 2 N s ( n w l + 2 ) n w 1 ( s l + 1 ) = n w + l 2 + n w 1 L ( l 1 ; s ) L ( s ; n w + 1 ) 2 N s L ( l 1 ; n w + 1 ) n w 1 L ( l 1 ; s ) .
From the hypothesis s [ l , n w ] N and also as in the proof of Property 4, one gets
n w 1 L ( l 1 ; s ) L ( s ; n w + 1 ) 2 N s L ( l 1 ; n w + 1 ) n w 1 L ( l 1 ; s ) > 0 ,
which means that the abscissa of the maximum point is greater than the middle of the interval [ l 1 , n w + 1 ] . The same procedure applies in case of the dual network. □
Property 6.
Suppose that l > 2 and w 2 . Suppose that N n w > n w 1 . Let us denote by V ( x V , y V ) the maximum point of function f ( l , w ) on [ l 1 , n w + 1 ] . Then,
n w + l 2 x V n w + 1 2 .
Proof. 
The lower bound is a particular case of Property 5. To prove the upper bound property, we search for a real number S such as
x V S + n w + l 2 .
This inequality is equivalent to
N n w ( n w l + 2 ) ( 2 S + 1 ) N n w ( n w l + 2 ) n n w ( n w l + 1 ) ,
0 2 S N n w ( n w l + 2 ) ( 2 S + 1 ) n n w ( n w l + 1 ) .
Because of the hypothesis N n w > n w 1 , one gets
2 S ( n w l + 2 ) ( 2 S + 1 ) ( n w l + 1 ) ,
which meas that 2 S n w l + 1 and
x V n w l + 1 2 + n w + l 2 = n w + 1 2 ,
as required. □
Property 7.
Suppose that l > 2 and w 2 . Suppose that s is chosen such that N s > n w 1 . Let us denote by V ( x V , y V ) the maximum point of function f ( l , w ) on [ l 1 , n w + 1 ] . Let E ( l , w ; s ) = N s [ L ( l 1 ; n w + 1 ) ] 2 n w 1 L ( l 1 ; s ) [ 3 L ( l 1 ; n w + 1 ) 2 L ( l 1 ; s ) ] . If
E ( l , w ; s ) 0
then
x V n w + l 2 + n w l + 2 4 .
Proof. 
One may write the abscissa x V , which was computed above, as
x V = n w + l 2 + n w l + 2 4 N s ( n w l + 2 ) 2 n w 1 ( s l + 1 ) ( 3 n 3 w l 2 s + 4 ) 4 N s ( n w l + 2 ) n w 1 ( s l + 1 ) ,
Taking into account that, N s n w 1 and s [ l , n w ] N , one gets
N s ( n w l + 2 ) 2 n w 1 ( s l + 1 ) ( 3 n 3 w l 2 s + 4 ) 4 N s ( n w l + 2 ) n w 1 ( s l + 1 ) = N s [ L ( l 1 ; n w + 1 ) ] 2 4 N s L ( l 1 ; n w + 1 ) n w 1 L ( l 1 ; s ) n w 1 L ( l 1 ; s ) [ 3 L ( l 1 ; n w + 1 ) 2 L ( l 1 ; s ) ] 4 N s L ( l 1 ; n w + 1 ) n w 1 L ( l 1 ; s ) > 0 .
Due to (31), it follows the required inequality,
x V < n w + l 2 + n w l + 2 4 ,
which ends the proof. □
Corollary 6.
Suppose that l 2 and w > 2 . Suppose that t is chosen such that N t > n l 1 and condition (31) holds, i.e., E ( w , l ; t ) 0 , where
E ( w , l ; t ) = N t [ L ( w 1 ; n l + 1 ) ] 2 n l 1 L ( w 1 ; t ) [ 3 L ( w 1 ; n l + 1 ) 2 L ( w 1 ; t ) ] .
Let us denote by V ( x V , y V ) the maximum point of function f ( w , l ) on [ w 1 , n l + 1 ] . Then the abscissa of the maximum point of the dual network has the same boundary property:
n l + w 2 x V n l + w 2 + n w l + 2 4 .
Proof. 
The boundary properties of the quadratic spline approximation of the coefficients function in case of the dual case are obtained following the same reasoning as in the proof of Properties 5 and 7, using the coefficients A and B . □
Remark 12.
Practical simulations show that the hypothesis on s of being chosen such that N s > n w 1 is a necessary condition for Properties 4, 5, and 7. The following examples show that the sufficiency does not hold. There are cases when N s < n w 1 but (31) holds, which is shown by the following examples. The necessary and sufficient condition for Property 7 consists in both hypotheses.
Example 1.
We consider few cases of small hammock networks as in [11]. After performing simulations taking l { 3 , 4 , 5 } and w { 3 , 4 , 5 } we have obtained that in cases ( l , w ) { ( 3 , 4 ) , ( 4 , 3 ) , ( 3 , 3 ) , ( 3 , 5 ) , ( 5 , 3 ) , ( 4 , 4 ) } inequality N s > n w 1 implies (31). This implication is not valid in cases ( l , w ) { ( 4 , 5 ) , ( 5 , 4 ) , ( 5 , 5 ) } . Table 3, Table 4 and Table 5 contain the numerical results obtained in each case. The exact coefficients N s included in Table 3, Table 4 and Table 5 are taken from [11].
Example 2.
A few interesting negative results, showing various behaviour of the approximant if N s < n w 1 , are found in the following cases:
  • If ( l , w ) = ( 3 , 3 ) and s = 3 then N 3 = 8 < 9 2 = 36 and A = 0.25 < 0 , which means that the approximant is concave. As one can see, Property 4 and Property 5 are valid. But x V = 22.5 > 5.75 , exceeding the upper bound from Property 7.
  • If ( l , w ) = ( 4 , 4 ) and s = 4 , then N 4 = 18 < 16 3 = 560 and A = 38 9 > 0 , which means that the approximant is convex. As x V = 26 19 < 8 neither Property 4, nor Property 5, nor Property 7 is valid.
  • If ( l , w ) = ( 4 , 4 ) and s = 5 then N 5 = 204 < 16 3 = 560 and A = 41 9 < 0 , which means that the approximant is concave, validating Property 4. But x V = 592 41 > 8 and also x V > 10.5 . It means that Property 5 is true, but Property 7 is not valid.
  • If ( l , w ) = ( 4 , 4 ) -dual and s = 4 then N 4 = 24 < 16 3 = 560 and A = 32 9 > 0 , which means that the approximant is convex. As x V = 1 8 < 8 neither Property 4, nor Property 5, nor Property 7 is valid.
  • If ( l , w ) = ( 4 , 4 ) -dual and s = 5 then N 5 = 264 < 16 3 = 560 and A = 76 9 < 0 , which means that the approximant is concave, validating Property 4. However, x V = 208 19 > 8 and also x V > 10.5 . It means that Property 5 is true, but Property 7 is not valid.

4.3. Error Estimation

In this subsection, we also suppose that both l 2 and w 2 and at least one of the inequalities is strict. The small amount of initial data and of theoretic information on the reliability polynomial of a MMN arise difficulties in assessing the error of the approximation. The error of the corresponding approximated reliability polynomial is determined using the Chebychev distance between functions, because it gives information on the number of exact decimals obtained by approximation. As consequence, one can prove that the same upper bound of the error of this approximation as obtained in [7]. All the same, a more refined upper bound than the result from [7] is proved in this subsection in case of approximation using quadratic spline functions.
Proposition 2.
Let G be a ( l , w ) -type MMN, and let us denote
M = max { | N k N n k | , 0 k n }
D = ( B B 2 n A ) 2 4 ( A A ) ( C C B n A n 2 ) .
Then we have
max { Rel ( G ; p ) ApRel ( G ; p ) , 0 p 1 }
( n l w ) 2 n + 1 M + max n l 1 , n w 1 , D 4 ( A A ) .
Proof. 
Using the definition of Rel and ApRel we obtain
Rel ( G ; p ) ApRel ( G ; p ) k = 0 n N k N ˜ ( F ( l , w ) ; k ) ) p k ( 1 p ) n k .
However, according to the algorithm,
N ˜ ( F ( l , w ) ; k ) = f ( l , w ) ( k ) + Δ ( k ) 2 = f ( l , w ) ( k ) + 1 2 n k f ( l , w ) ( k ) f ( w , l ) ( n k ) = n k + f ( l , w ) ( k ) f ( w , l ) ( n k ) 2 ,
and, using (4), one can compute
N k N ˜ ( F ( l , w ) ; k ) ) = 2 N k n k f ( l , w ) ( k ) + f ( w , l ) ( n k ) 2 = N k N n k f ( l , w ) ( k ) + f ( w , l ) ( n k ) 2 ,
for each k { l 1 , , n w + 1 } . Taking into account (17), we evaluate as follows:
Rel ( G ; p ) ApRel ( G ; p ) k = l n w N k N n k f ( l , w ) ( k ) + f ( w , l ) ( n k ) 2 p k ( 1 p ) n k 1 2 n k = l n w N k N n k 2 + k = l n w f ( l , w ) ( k ) + f ( w , l ) ( n k ) 2 ( n w l ) M 2 n + 1 + 1 2 n + 1 k = l n w f ( l , w ) ( k ) f ( w , l ) ( n k ) .
However, according to (17) and (19), we obtain
f ( l , w ) ( k ) f ( w , l ) ( n k ) = ( A A ) x 2 + ( B B 2 n A ) x + C C B n A n 2 .
According to (17) and (19), the absolute maximum value of this second degree polynomial is the absolute value of the ordinate of its vertex. The maximum value of this function on [ l 1 , n w + 1 ] is either in the maximum point of this polynomial or a value in the extremities of this interval. An elementary computation gives
max f ( l , w ) ( k ) f ( w , l ) ( n k ) = max n l 1 , n w 1 , D 4 ( A A ) ,
for all k { l , l + 1 , . . . , n w } . Replacing this value in the previous evaluation of the approximation error one gets the required upper bound. □
Remark 13.
The error of approximation can be improved by conveniently choosing the initial coefficients, N s and N t , if possible.

5. Simulation Results

We have conducted simulations for hammock networks of size w = 3 , l = 5 . The exact coefficients are extracted from [11]. First, we have implemented our algorithm and with input data N l 1 = 0 , N n w , N n w + 1 and the corresponding N w 1 = 0 , N n l , N n l + 1 .
The results are illustrated in Table 6. The first row in each sub-table represents the exact coefficients. The second rows represent the results obtained by means of our algorithm. We notice that the first four non-zero approximations are rather big compared with the exact values, while the last approximated coefficients are much closer to the exact values.
Second, we have implemented the algorithm with input data N l , N n w , N n w + 1 and the corresponding N w , N n l , N n l + 1 . In this scenario we had to change the systems of Equations (21) and (22). More exactly, the new equations we had to solve are
A l 2 + B l + C = N l A ( n w ) 2 + B ( n w ) + C = N n w A ( n w + 1 ) 2 + B ( n w + 1 ) + C = n w 1 ,
A w 2 + B w + C = N w A ( n l ) 2 + B ( n l ) + C = N n l A ( n l + 1 ) 2 + B ( n l + 1 ) + C = n l 1 .
We notice from the third row in each sub-table of Table 6 that using more information (extra coefficients) our algorithm outputs a much finer approximation. Indeed, when computing the error of approximation for the two versions, we have obtained 0.22 for the version using N l 1 and 0.18 for the version using N l , clearly pointing out the advantage of the second version. This implies that our algorithm can be adapted using more information (extra coefficients) in order to produce better results.

Properties of the Approximated Polynomials

The approximated polynomials were also computed and some of the theoretical results were verified. Indeed, when we investigate the shape properties of the approximated polynomials we notice that they preserve the complementary properties. Of the properties we choose to illustrate here is the behavior of the derivatives. In Figure 3 we plot the derivatives of the approximated polynomials using the variant of the algorithm with input data N l 1 , N n w , N n w + 1 , N w 1 , N n l , N n l + 1 , and in Figure 4 those obtained with input data N l , N n w , N n w + 1 , N w , N n l , N n l + 1 . We plot the first two derivatives, and observe the following:
  • d d p ApRel ( G ; p ) = d d p ApRel ( G ; 1 p ) ;
  • d 2 d p 2 ApRel ( G ; p ) = d 2 d p 2 ApRel ( G ; 1 p ) .

The Case of Self-Dual Networks

As our method is using some extra information provided by means of duality, we have simulated the case of self-dual networks. We have considered the 5-by-5 hammock network, a case for which we have N k + N n k = n k . In Figure 5, we have plot the first derivatives of the networks and of the approximations.
Both the reliability polynomial as well as its approximant satisfy d 2 k d p 2 k Rel ( G ; 0.5 ) = d 2 k d p 2 k ApRel ( G ; 0.5 ) = 0 . This mainly comes from the fact that ApRel ( G ; 0.5 ) = Rel ( G ; 0.5 ) = 0.5 . In this case, the error of approximation is lower than 0.21 . Notice than, even if less information is used for the particular case of self-dual networks, the error of approximation is comparable with the case of smaller networks such as the 3-by-5 hammock. This fact points out that our method could eventually be used in the case of some larger networks.

6. Conclusions

In this paper, we have studied the shape properties of the reliability polynomials of two dual networks. Mutual behaviour of these polynomials, referring to high level convexity, inflection points, and extremal properties of coefficients functions, are studied. The research from in [6,7] is developed on new bases, taking into account some requirements of shape preserving. We have proposed a technique for simultaneously approximating the reliability polynomials of two dual MMNs, choosing the input data based on their shape properties, in order to obtain results preserving some shapes. Our simulations point out that the quadratic splines approach gives much better results than other types of approximation operators if shape criteria are taken into account together with the size of the error and the complexity of computation. Some possibilities of improving the output are discussed.
Our technique uses complementary properties induced by the notion of duality, which is considered for planar two-terminal networks only. It would be of interest to extend these methods to non-planar networks, in general. Here, we refer to all-terminal, k-terminal, and two-terminal networks.
On another hand, our approach is taking into account, for the first time, some extremal properties both at the level of the original object and its approximate one. For example, identifying the maximum coefficient of the reliability polynomial has a significant meaning, as it points out the length/index where the maximum number of paths is achieved. There are no techniques, to our knowledge, for locating the maximum of the coefficients of the reliability polynomial of a network in the scientific literature. Therefore, by proposing a method for solving this problem, our article opens the road in developing approximation techniques for this matter.
Based on the significance of the shape and extremal properties in improving the results obtained by means of an approximation procedure, it is of interest to approach other approximation problems using this kind of input conditions.

Author Contributions

Conceptualization, G.C. and V.-F.D. and S.H.H.; formal analysis, G.C. and V.-F.D.; investigation, G.C. and V.-F.D. and S.H.H.; resources, G.C. and V.-F.D. and S.H.H.; writing—original draft preparation, G.C. and V.-F.D. and S.H.H.; writing—review and editing, G.C. and V.-F.D.; supervision, G.C.; funding acquisition, G.C. and V.-F.D. and S.H.H. All authors have read and agreed to the published version of the manuscript.

Funding

“V.-F. Drăgoi was supported by a grant of the Romanian Ministry of Education and Research, CNCS-UEFISCDI, project number PN-III-P4-ID-PCE-2020-2495, within PNCDI III – ThUNDER2 = Techniques for Unconventional Nano-Designing in the Energy-Reliability Realm.” “S.-H. Hoară was supported by the Polytechnic University of Timişoara, according to HCA 14/2.02.2021 (updated HCA 78/8.06.2021) regarding Creşterea calităţii cercetării ştiinţifice avansate în UPT.”

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All the data supporting our simulation results can be found within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Brown, J.I.; Colbourn, C.J.; Cox, D.; Graves, C.; Mol, L. Network reliability: Heading out on the highway. Networks 2020, 77, 146–160. [Google Scholar] [CrossRef]
  2. Moore, E.F.; Shannon, C.E. Reliable circuits using less reliable relays—Part I. J. Frankl. Inst. 1956, 262, 191–208. [Google Scholar] [CrossRef]
  3. Moore, E.F.; Shannon, C.E. Reliable circuits using less reliable relays—Part II. J. Frankl. Inst. 1956, 262, 281–297. [Google Scholar] [CrossRef]
  4. von Neumann, J. Probabilistic Logics and the Synthesis of Reliable Organisms from Unreliable Components. In Automata Studies; Shannon, C.E., Ed.; Princeton University Press: Princeton, NJ, USA, 1956; pp. 43–98. [Google Scholar]
  5. Valiant, L. The Complexity of Enumeration and Reliability Problems. SIAM J. Comput. 1979, 8, 410–421. [Google Scholar] [CrossRef]
  6. Cristescu, G.; Drăgoi, V.F. Cubic Spline Approximation of the Reliability Polynomials of Two Dual Hammock Networks. Transylv. J. Math. Mech. 2019, 11, 77–90. [Google Scholar]
  7. Cristescu, G.; Drăgoi, V.F. Efficient Approximation of Two-Terminal Networks Reliability Polynomials Using Cubic Splines. IEEE Trans. Reliab. 2021, 70, 1193–1203. [Google Scholar] [CrossRef]
  8. Dăuş, L.; Jianu, M. Full Hermite interpolation of the reliability of a hammock network. Appl. Anal. Discret. Math. 2020, 14, 198–220. [Google Scholar] [CrossRef] [Green Version]
  9. Dăuş, L.; Jianu, M. The Shape of the Reliability Polynomial of a Hammock Network. In Intelligent Methods in Computing, Communications and Control; Dzitac, I., Dzitac, S., Filip, F.G., Kacprzyk, J., Manolescu, M.J., Oros, H., Eds.; Springer International Publishing: Cham, Swizerland, 2021; pp. 93–105. [Google Scholar]
  10. Drăgoi, V.F.; Beiu, V. Fast reliability ranking of matchstick minimal networks. Networks 2021, 1–22. [Google Scholar] [CrossRef]
  11. Cowell, S.R.; Beiu, V.; Dăuş, L.; Poulin, P. On the Exact Reliability Enhancements of Small Hammock Networks. IEEE Access 2018, 6, 25411–25426. [Google Scholar] [CrossRef]
  12. Drăgoi, V.F.; Beiu, V. Studying the Binary Erasure Polarization Subchannels Using Network Reliability. IEEE Commun. Lett. 2020, 24, 62–66. [Google Scholar] [CrossRef]
  13. Drăgoi, V.F.; Cristescu, G. Bhattacharyya Parameter of Monomial Codes for the Binary Erasure Channel: From Pointwise to Average Reliability. Sensors 2021, 21, 2976. [Google Scholar] [CrossRef] [PubMed]
  14. Popoviciu, T. Les fonctions convexes; Actualités Scientifiques et Industrielles: Paris, France, 1945. [Google Scholar]
  15. Hopf, E. Ueber die zusammenhänge zwischen gewissen höheren Differenzenquotienten reeller Funktionen eines Variablen und deren differenzierbarkeitseigenschaften. Ph.D. Thesis, Friedrich-Wilhelms Universitat zu Berlin, Berlin, Germany, 1926. [Google Scholar]
  16. Popoviciu, T. Sur le prolongement des fonctions convexes d’ordre supérieur. Bull. Math. Soc. Roum. Des Sc. 1934, 36, 75–108. [Google Scholar]
  17. Popoviciu, T. Sur l’approximation des fonctions convexes d’ordre supérieur. Mathematica (Cluj) 1935, 10, 49–54. [Google Scholar]
  18. Huh, J. h-Vectors of matroids and logarithmic concavity. Adv. Math. 2015, 270, 49–59. [Google Scholar] [CrossRef]
  19. Webster, R. Convexity; Oxford University Press: Oxford, UK, 1994. [Google Scholar]
  20. Lenz, M. The f-vector of a representable-matroid complex is log-concave. Adv. Appl. Math. 2013, 51, 543–545. [Google Scholar] [CrossRef]
  21. Cowell, S.R.; Dăuş, L.; Beiu, V.; Poulin, P. On hammock networks - sixty years after. In Proceedings of the 2017 12th International Conference on Design Technology of Integrated Systems In Nanoscale Era (DTIS), Palma de Mallorca, Spain, 4–6 April 2017; pp. 1–6. [Google Scholar] [CrossRef]
  22. Cristescu, G.; Lupşa, L. Non-Connected Convexities and Applications; Springer: Berlin/Heidelberg, Germany, 2002; Volume 68. [Google Scholar]
  23. Lorentz, G.G. Bernstein Polynomials; University of Toronto Press: Totonto, ON, Canada, 1953. [Google Scholar]
  24. Natanson, I.P. Constructive Function Theory: Volume I: Uniform Approximation; Frederick Ungar Publishing Company: New York, NY, USA, 1964. [Google Scholar]
Figure 1. Square 4-by-4 parallel-of-series, hammocks, and series-of-parallel.
Figure 1. Square 4-by-4 parallel-of-series, hammocks, and series-of-parallel.
Mathematics 09 03182 g001
Figure 2. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; p ) (solid black line), and d k d p k Rel ( G ; 1 p ) (solid pink line) for the 3-by-5 hammock network.
Figure 2. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; p ) (solid black line), and d k d p k Rel ( G ; 1 p ) (solid pink line) for the 3-by-5 hammock network.
Mathematics 09 03182 g002
Figure 3. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; 1 p ) (solid pink line), and d k d p k ApRel ( G ; p ) (dash green line) and d k d p k ApRel ( G ; 1 p ) (solid yellow line) for the 3-by-5 hammock network with input data N l 1 , N n w , N n w + 1 .
Figure 3. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; 1 p ) (solid pink line), and d k d p k ApRel ( G ; p ) (dash green line) and d k d p k ApRel ( G ; 1 p ) (solid yellow line) for the 3-by-5 hammock network with input data N l 1 , N n w , N n w + 1 .
Mathematics 09 03182 g003
Figure 4. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; 1 p ) (solid pink line), and d k d p k ApRel ( G ; p ) (dash green line) and d k d p k ApRel ( G ; 1 p ) (solid yellow line) for the 3-by-5 hammock network with input data N l , N n w , N n w + 1 .
Figure 4. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; 1 p ) (solid pink line), and d k d p k ApRel ( G ; p ) (dash green line) and d k d p k ApRel ( G ; 1 p ) (solid yellow line) for the 3-by-5 hammock network with input data N l , N n w , N n w + 1 .
Mathematics 09 03182 g004
Figure 5. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; 1 p ) (solid pink line), and d k d p k ApRel ( G ; p ) (dash green line) and d k d p k ApRel ( G ; 1 p ) (solid yellow line) for the 5-by-5 hammock network.
Figure 5. d k d p k Rel ( G ; p ) (dash black line), d k d p k Rel ( G ; 1 p ) (solid pink line), and d k d p k ApRel ( G ; p ) (dash green line) and d k d p k ApRel ( G ; 1 p ) (solid yellow line) for the 5-by-5 hammock network.
Mathematics 09 03182 g005
Table 1. Abbreviations and notations.
Table 1. Abbreviations and notations.
Networks and Reliability
2 TN two-terminal networknnumber of devices of a network
MMNmatchstick minimal networkwwidth of a network (length of the dual network)
SoP series-of-parallelllength of a network (width of the dual network)
PoS parallel-of-seriespprobability that a device works
G MMN Rel ( G ; p ) reliability polynomial of G
G dual of G Rel ( G ; p ) reliability polynomial of G
H , H + Hammock network N k , N k k t h coefficient of Rel ( G ; p ) / Rel ( G ; p )
Integers, Reals, and Incidence Matrices
N set of natural numbers R set of real numbers
n k binomial coefficientXOR (addition mod 2) operation
M w , l { 0 , 1 } set of w × l binary matrices 1 l × w , 0 l × w all-ones/all-zeros matrix
M G matchstick incidence matrix of G M ¯ G bitwise complement of M G
Approximations
F ( l , w ) segmentary linear function of a ( l , w ) -type MMN f ( l , w ) ( x ) quadratic spline functions that approximate F ( l , w )
F ( w , l ) segmentary linear function of a ( w , l ) -type MMN f ( w , l ) ( x ) quadratic spline functions that approximate F ( w , l )
A , B , C coefficients of f ( l , w ) A , B , C coefficients of f ( w , l )
N ˜ ( F ( l , w ) ; k ) adjusted approximation of N k N ˜ ( F ( w , l ) ; k ) adjusted approximation of N k
ApRel ( G ; p ) approximation of Rel ( G ; p ) ApRel ( G ; p ) approximation of Rel ( G ; p )
V ( x V , y V ) maximum point of function f ( l , w ) V ( x V , y V ) maximum point of function f ( w , l )
Δ ( k ) correction factor for the approximation
Table 2. Extremal values of the coefficients functions for small hammocks.
Table 2. Extremal values of the coefficients functions for small hammocks.
wl max ( N k ) argmax ( F ( l , w ) ( x ) ) I 1 I 2
23104 [ 3.5 , 4 ] [ 3.5 , 4.5 ]
4206 [ 5 , 6 ] [ 5 , 6.5 ]
4245 [ 5 , 6 ] [ 5 , 6.5 ]
5567 [ 6.5 , 8 ] [ 6.5 , 8.5 ]
32163 [ 2.5 , 3.25 ] [ 2.5 , 3.5 ]
3845 [ 4.5 , 5.75 ] [ 4.5 , 6.5 ]
44507 [ 6.5 , 8.25 ] [ 6.5 , 9.5 ]
524439 [ 8.5 , 10.75 ] [ 8.5 , 12.5 ]
42624 [ 3 , 4 ] [ 3 , 4.5 ]
2664 [ 3 , 4 ] [ 3 , 4.5 ]
36987 [ 5.5 , 7.25 ] [ 5.5 , 8.5 ]
477009 [ 8 , 10.5 ] [ 8 , 12.5 ]
483129 [ 8 , 10.5 ] [ 8 , 12.5 ]
588,94811 [ 10.5 , 13.75 ] [ 10.5 , 16.5 ]
522445 [ 3.5 , 4.75 ] [ 3.5 , 5.5 ]
356538 [ 6.5 , 8.75 ] [ 6.5 , 10.5 ]
4132,75011 [ 9.5 , 12.75 ] [ 9.5 , 15.5 ]
53,162,65014 [ 12.5 , 16.75 ] [ 12.5 , 20.5 ]
Table 3. The case of H with ( l , w ) = ( 4 , 5 ) : if s = 6 we have (31) valid but the coefficient N 6 is less than 20 6 .
Table 3. The case of H with ( l , w ) = ( 4 , 5 ) : if s = 6 we have (31) valid but the coefficient N 6 is less than 20 6 .
s s = 5 s = 6 s = 7 s { 8 , . . . , 14 } s = 15 s = 16
N s 438307213,178 N s > 20 4 15,468 20 4 = 4845
E ( 4 , 5 ; s ) −265128395231626302 E ( 4 , 5 ; s ) > 0 17419920
Table 4. The case of H of ( l , w ) = ( 5 , 4 ) : if s = 6 we have (31) valid but the coefficient N 6 is less than the binomial.
Table 4. The case of H of ( l , w ) = ( 5 , 4 ) : if s = 6 we have (31) valid but the coefficient N 6 is less than the binomial.
s s = 5 s = 6 s = 7 s { 8 , . . . , 15 } s = 16 s = 17
N s 365103334 N s > 20 3 4816 20 3 = 1140
E ( 5 , 4 ; s ) −360956390450586 E ( 5 , 4 ; s ) > 0 6087040
Table 5. The case of H of ( l , w ) = ( 5 , 5 ) : if s = 7 we have (31) valid but the coefficient N 7 is less than the binomial.
Table 5. The case of H of ( l , w ) = ( 5 , 5 ) : if s = 7 we have (31) valid but the coefficient N 7 is less than the binomial.
s s = 6 s = 7 s = 8 s { 9 , . . . , 19 } s = 20 s = 21
N s 994898350796 N s > 25 4 53078 25 4 = 12650
E ( 5 , 5 ; s ) −90183488833712504244 E ( 5 , 5 ; s ) > 0 114939420
Table 6. Exact coefficients of the 3-by-5 hammock and its dual, and approximations using our algorithm with input points N l 1 , N n w , N n w + 1 , as well with input point N l , N n w , N n w + 1 .
Table 6. Exact coefficients of the 3-by-5 hammock and its dual, and approximations using our algorithm with input points N l 1 , N n w , N n w + 1 , as well with input point N l , N n w , N n w + 1 .
N i 00016178889256246635653481129821365455105151
Alg(l-1,n-w,n-w+1) N ˜ 00045513653003455553525256426628141365455105151
Alg(l,n-w,n-w+1) N ˜ 0001613302803425152085244435829821365455105151
N i 00000211947821772244321141187439105151
Alg(w-1,n-l,n-l+1) N ˜ 0000018973811791082449000105151
Alg(w,n-l,n-l+1) N ˜ 00000216461191122775320034439105151
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cristescu, G.; Drăgoi, V.-F.; Hoară, S.H. Generalized Convexity Properties and Shape-Based Approximation in Networks Reliability. Mathematics 2021, 9, 3182. https://doi.org/10.3390/math9243182

AMA Style

Cristescu G, Drăgoi V-F, Hoară SH. Generalized Convexity Properties and Shape-Based Approximation in Networks Reliability. Mathematics. 2021; 9(24):3182. https://doi.org/10.3390/math9243182

Chicago/Turabian Style

Cristescu, Gabriela, Vlad-Florin Drăgoi, and Sorin Horaţiu Hoară. 2021. "Generalized Convexity Properties and Shape-Based Approximation in Networks Reliability" Mathematics 9, no. 24: 3182. https://doi.org/10.3390/math9243182

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop