- Editorial
Graph Theory
- Jose M. Rodriguez
This book contains the successful invited submissions [1–10] to a special issue of Symmetry on the subject area of ‘graph theory’ [...]
2018 January - 32 articles
This book contains the successful invited submissions [1–10] to a special issue of Symmetry on the subject area of ‘graph theory’ [...]
We provide a completely new perspective for the analysis of Casimir forces in very general piston configurations. To this end, in order to be self-contained, we prove a “gluing formula” well known in mathematics and relate it with Casimir forces in p...
Many artificial intelligence applications often require a huge amount of computing resources. As a result, cloud computing adoption rates are increasing in the artificial intelligence field. To support the demand for artificial intelligence applicati...
The analysis of symmetry is a main principle in natural sciences, especially physics. For network sciences, for example, in social sciences, computer science and data science, only a few small-scale studies of the symmetry of complex real-world graph...
Symmetry is an important cue for the aesthetic judgment of beauty. Using a binary forced-choice format in a cued mixed design, Jacobsen and Höfel (2003) compared aesthetic judgments of beauty and symmetry judgments of novel graphic patterns. A late p...
Peer review is an essential part in the publication process, ensuring that Symmetry maintains high quality standards for its published papers. In 2017, a total of 328 papers were published in the journal.[...]
It is much easier to determine a protein’s sequence than to determine its three dimensional structure and consequently homology modeling will be an essential aspect of most studies that require 3D protein structure data. Homology modeling templates t...
In this note, we consider degenerations between complex 2-step nilpotent Lie algebras of dimension 7 within the variety
We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds...
This paper designs a bidding and supplier evaluation model focused on strategic product procurement, and develops their respective evaluation knowledge bases. The model is built using the most relevant variables cited in the reviewed procurement lite...
The location of resources in a network satisfying some optimization property is a classical combinatorial problem that can be modeled and solved by using graphs. Key tools in this problem are the domination-type properties, which have been defined an...
Rotaxanes consisting of achiral axle and achiral ring components can possess supramolecular chirality due to their unique geometrical architectures. To synthesize such chiral rotaxanes, we adapted a prerotaxane method based on aminolysis of a metacyc...
In modern electronic warfare, multiple input multiple output (MIMO) radar has become an important tool for electronic reconnaissance and intelligence transmission because of its anti-stealth, high resolution, low intercept and anti-destruction charac...
Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in the field of data hiding. In r...
For the past few years, flash memory has been widely used because of its prominent advantages such as fast access speed, nonvolatility, high reliability, and low power consumption. However, flash memory still has several drawbacks that need to be ove...
Simulation of cutting is essential for many applications such as virtual surgical training. Most existing methods use the same triangle mesh for both visualization and collision handling, although the requirements for them in the interactive simulati...
Important information about the state dynamics of the brain during anesthesia is unraveled by Electroencephalogram (EEG) approaches. Patterns that are observed through EEG related to neural circuit mechanism under different molecular targets dependen...
This paper deals with a method for removing a ghost target that is not a real object from the output of a multiple object-tracking algorithm. This method uses an artificial neural network (multilayer perceptron) and introduces a structure, learning,...
This paper proposes an image authentication scheme for mobile devices. The proposed scheme generates an image watermark by using discrete cosine transform (DCT) and hides the watermark in the spatial pixels for image authentication and tamper detecti...
We propose a novel dynamic host mutation (DHM) architecture based on moving target defense (MTD) that can actively cope with cyberattacks. The goal of the DHM is to break the cyber kill chain, expand the attack surface to increase the attacker’s targ...
Modern 5G networks offer a large space for innovation and a completely new approach to addressing network functioning. A fixed spectrum assignment policy is a significant limitation of today’s wireless communication network practice and is to be repl...
Mosaic, Rust, Brown spot, and Alternaria leaf spot are the four common types of apple leaf diseases. Early diagnosis and accurate identification of apple leaf diseases can control the spread of infection and ensure the healthy development of the appl...
Helicenes are unique helical chromophores possessing advanced and well-controlled spectral and chemical properties owing to their diverse functionalization and defined structures. Specific modification of these molecules by introducing aromatic rings...
We review the component Lagrangian construction of the supersymmetric higher spin models in three-dimensional (3D) Minkowski and anti de Sitter (
The solvability of a k-dimensional system of difference equations of interest, which extends several recently studied ones, is investigated. A general sufficient condition for the solvability of the system is given, considerably extending some recent...
This book contains the successful invited submissions [1–21] to a Special Issue of Symmetry on the subject area of “Fuzzy Techniques for Decision Making”.[...]
We employ the DEMATEL-based analytic network process (D-ANP) to evaluate the weight of various factors on S&P 500 index futures. The general regression method is employed to prove the result. We then employed grey relational analysis (GRA) to exa...
In this paper, the stability of translation-invariant spaces of distributions over locally compact groups is stated as boundedness of synthesis and projection operators. At first, a characterization of the stability of spline-type spaces is given, in...
Passive video forensics has drawn much attention in recent years. However, research on detection of object-based forgery, especially for forged video encoded with advanced codec frameworks, is still a great challenge. In this paper, we propose a deep...
We propose a novel real-time video stitching method using camera path estimation and homography refinement. The method can stably stitch multiple frames acquired from moving cameras in real time. In the proposed method, one initial between-camera (BC...
We revisit the classical theory of a relativistic massless charged point particle with spin and interacting with an external electromagnetic field. In particular, we give a proper definition of its kinetic energy and its total energy, the latter bein...
This paper clarifies the hierarchical structure of the sharp constants for the discrete Sobolev inequality on a weighted complete graph. To this end, we introduce a generalized-graph Laplacian