9,480 research outputs found
VLSI layouts and DNA physical mappings
We show that an important problem (-ICG) in computational biology is
equivalent to a colored version of a well-known graph layout problem (-CVS).Comment: 7 page
Parameterized lower bound and NP-completeness of some -free Edge Deletion problems
For a graph , the -free Edge Deletion problem asks whether there exist
at most edges whose deletion from the input graph results in a graph
without any induced copy of . We prove that -free Edge Deletion is
NP-complete if is a graph with at least two edges and has a component
with maximum number of vertices which is a tree or a regular graph.
Furthermore, we obtain that these NP-complete problems cannot be solved in
parameterized subexponential time, i.e., in time ,
unless Exponential Time Hypothesis fails.Comment: 15 pages, COCOA 15 accepted pape
The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare
During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge for which Cold War era doctrinal methods were largely unsuited. This monograph examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era targeting process to one optimized for combating networks and conducting identity-based targeting. It analyzes the policy decisions and strategic choices that were the catalysts of this change and concludes with an in depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future.https://press.armywarcollege.edu/monographs/1436/thumbnail.jp
Geometry-based customization of bending modalities for 3D-printed soft pneumatic actuators
In this work, we propose a novel type of 3D-printed soft pneumatic actuator that allows geometry-based customization of bending modalities. While motion in the 3D-space has been achieved for several types of soft actuators, only 2D-bending has been previously modelled and characterized within the scope of 3D-printed soft pneumatic actuators. We developed the first type of 3D-printed soft pneumatic actuator which, by means of the unique feature of customizable cubes at an angle with the longitudinal axis of the structure, is capable of helical motion. Thus, we characterize its mechanical behavior and formulate mathematical and FEA models to validate the experimental results. Variation to the pattern of the inclination angle along the actuator is then demonstrated to allow for complex 3D-bending modalities and the main applications in the fields of object manipulation and wearable robotics are finally discussed
Biometric ID Cybersurveillance
The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking technology, would facilitate exponentially a convergence of cybersurveillance-body tracking and data surveillance, or dataveillance-biographical tracking. Yet, the existing Fourth Amendment jurisprudence is tethered to a “reasonable expectation of privacy” test that does not appear to restrain the comprehensive, suspicionless amassing of databases that concern the biometric data, movements, activities, and other personally identifiable information of individuals.
In this Article, I initiate a project to explore the constitutional and other legal consequences of big data cybersurveillance generally and mass biometric dataveillance in particular. This Article focuses on how biometric data is increasingly incorporated into identity management systems through bureaucratized cybersurveillance or the normalization of cybersurveillance through the daily course of business and integrated forms of governance
- …