54 research outputs found

    An extensive English language bibliography on graph theory and its applications, supplement 1

    Get PDF
    Graph theory and its applications - bibliography, supplement

    An extensive English language bibliography on graph theory and its applications

    Get PDF
    Bibliography on graph theory and its application

    Cognitive impairments in developmental dyslexia

    Get PDF
    The nature of cognitive impairments in developmental dyslexia was investigated in two studies. The issue of heterogeneity was addressed and an attempt was made to identify cognitive processes which might feature in a dimensional model of reading ability. The first study examined the hypothesis that developmental dyslexics are delayed in their general perceptual development. Phonological, visual and tactile segmentation skills were assessed together with nonword naming ability. As a group, the dyslexics were only impaired for reading age at phoneme deletion and nonword naming. However, individual variation was present within the dyslexic group. Individuals exhibiting severe impairments were identified in tests of rhyme judgement, auditory organisation and visual segmentation. The perceptual delay hypothesis received only limited confirmation. The dyslexic group was impaired at the most analytical level of phonological segmentation, but not at more holistic levels. Visual and phonological segmentation skills showed some association, but were dissociated from performance in the tactile modality. The second study further explored these findings using a new sample. This dyslexic group also suffered nonword naming impairments for reading age. However, like their reading age controls, they showed a processing advantage for onset and rime units in a phonological deletion task but not in an orthographic lexical decision task. The efficacy of long-term memory representations was assessed. Individuals within the dyslexic group displayed a very deviant performance in a repetition memory task, and the group as a whole was impaired at recognising words to which they had been repeatedly exposed. It was concluded that the difficulties experienced by individual dyslexic children were varied, and that less frequent problems were likely to be overlooked by assessing impairment in developmental dyslexia in terms of group performance. Further investigation of how visual and memory processes relate to reading development would be a worthwhile addition to the extensive work linking phonological processing with reading achievement

    A Survey on Approximation in Parameterized Complexity: Hardness and Algorithms

    Get PDF
    Parameterization and approximation are two popular ways of coping with NP-hard problems. More recently, the two have also been combined to derive many interesting results. We survey developments in the area both from the algorithmic and hardness perspectives, with emphasis on new techniques and potential future research directions

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Hop Hill: Culture and Climactic Change in Central Texas

    Get PDF
    In the following discussions the paleoecology of Central Texas will be elucidated given the present state of knowledge. Global climatic variables and modern Fredericksburg weather data are used to obtain a better understanding of climatic change. At a more specific level, the environmental characteristics of Gillespie County are studied; and, finally, the environment and culture of the Hop Hill locality are conjoined to the whole

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Critical Services continuity, Resilience and Security: Proceedings of the 56th ESReDA Seminar

    Get PDF
    Critical Infrastructures (CIs) remain among the most important and vital service providers to modern societies. Severe CIs’ disruptions may endanger security of the citizen, availability of strategic assets and even the governance stability. Not surprisingly, CIs are often targets of intentional attacks, either of physical or cyber nature. Newly emerging hybrid threats primarily target CIs as part of the warfare. ESReDA as one of the most active EU networks in the field has initiated a project group (CI-PR/MS&A-Data) on the “Critical Infrastructure/Modelling, Simulation and Analysis – Data”. The main focus of the project group is to report on the state of progress in MS&A of the CIs preparedness & resilience with a specific focus on the corresponding data availability and relevance. In order to report on the most recent developments in the field of the CIs preparedness & resilience MS&A and the availability of the relevant data, ESReDA held its 48th, 52nd and 56th Seminars. The 56th ESReDA Seminar on “Critical Services continuity, Resilience and Security” attracted about 30 participants from industry, authorities, operators, research centres and academia. The seminar programme consisted of 18 technical papers, two plenary speeches and an interactive session on Climate & CI protection.JRC.G.10-Knowledge for Nuclear Security and Safet

    Power network and smart grids analysis from a graph theoretic perspective

    Get PDF
    The growing size and complexity of power systems has given raise to the use of complex network theory in their modelling, analysis, and synthesis. Though most of the previous studies in this area have focused on distributed control through well established protocols like synchronization and consensus, recently, a few fundamental concepts from graph theory have also been applied, for example in symmetry-based cluster synchronization. Among the existing notions of graph theory, graph symmetry is the focus of this proposal. However, there are other development around some concepts from complex network theory such as graph clustering in the study. In spite of the widespread applications of symmetry concepts in many real world complex networks, one can rarely find an article exploiting the symmetry in power systems. In addition, no study has been conducted in analysing controllability and robustness for a power network employing graph symmetry. It has been verified that graph symmetry promotes robustness but impedes controllability. A largely absent work, even in other fields outside power systems, is the simultaneous investigation of the symmetry effect on controllability and robustness. The thesis can be divided into two section. The first section, including Chapters 2-3, establishes the major theoretical development around the applications of graph symmetry in power networks. A few important topics in power systems and smart grids such as controllability and robustness are addressed using the symmetry concept. These topics are directed toward solving specific problems in complex power networks. The controllability analysis will lead to new algorithms elaborating current controllability benchmarks such as the maximum matching and the minimum dominant set. The resulting algorithms will optimize the number of required driver nodes indicated as FACTS devices in power networks. The second topic, robustness, will be tackled by the symmetry analysis of the network to investigate three aspects of network robustness: robustness of controllability, disturbance decoupling, and fault tolerance against failure in a network element. In the second section, including Chapters 4-8, in addition to theoretical development, a few novel applications are proposed for the theoretical development proposed in both sections one and two. In Chapter 4, an application for the proposed approaches is introduced and developed. The placement of flexible AC transmission systems (FACTS) is investigated where the cybersecurity of the associated data exchange under the wide area power networks is also considered. A new notion of security, i.e. moderated-k-symmetry, is introduced to leverage on the symmetry characteristics of the network to obscure the network data from the adversary perspective. In chapters 5-8, the use of graph theory, and in particular, graph symmetry and centrality, are adapted for the complex network of charging stations. In Chapter 5, the placement and sizing of charging stations (CSs) of the network of electric vehicles are addressed by proposing a novel complex network model of the charging stations. The problems of placement and sizing are then reformulated in a control framework and the impact of symmetry on the number and locations of charging stations is also investigated. These results are developed in Chapters 6-7 to robust placement and sizing of charging stations for the Tesla network of Sydney where the problem of extending the capacity having a set of pre-existing CSs are addressed. The role of centrality in placement of CSs is investigated in Chapter 8. Finally, concluding remarks and future works are presented in Chapter 9

    Representing information flow in building design process using the parameter-based design structure matrix

    Get PDF
    Cataloged from PDF version of article.The Architecture/Engineering/Construction (AEC) industry is one of the multidisciplinary domains in which collaboration among related parties is of utmost importance. Despite the intense flow of information between design professionals, there is a lack of research to better understand and manipulate these flows. Most of the current process modeling tools in the AEC industry do not enable analyses of iterative information cycles. Moreover, these tools represent the process at high levels, thus, they are inappropriate for multi-parameter problems like building design. With a view to alleviate these problems, this thesis introduces the use of parameter-based design structure matrix as a process modeling and system analysis tool for building design. The method reveals insights into the process structure, optimum sequence of parameter decisions, iterative cycles and concurrency in the process. A framework for parameter-based DSM applications in building design is proposed and the application of the framework is demonstrated through two case studies on real life building design problems. Keywords: Collaborative Building Design, Design Integration, Design Management, Design Process Modeling, Information Flow, and Parameter-based Design Structure Matrix.Pektaş, Şule TaşlıPh.D
    corecore