9,480 research outputs found

    VLSI layouts and DNA physical mappings

    Full text link
    We show that an important problem (kk-ICG) in computational biology is equivalent to a colored version of a well-known graph layout problem (kk-CVS).Comment: 7 page

    Parameterized lower bound and NP-completeness of some HH-free Edge Deletion problems

    Get PDF
    For a graph HH, the HH-free Edge Deletion problem asks whether there exist at most kk edges whose deletion from the input graph GG results in a graph without any induced copy of HH. We prove that HH-free Edge Deletion is NP-complete if HH is a graph with at least two edges and HH has a component with maximum number of vertices which is a tree or a regular graph. Furthermore, we obtain that these NP-complete problems cannot be solved in parameterized subexponential time, i.e., in time 2o(k)GO(1)2^{o(k)}\cdot |G|^{O(1)}, unless Exponential Time Hypothesis fails.Comment: 15 pages, COCOA 15 accepted pape

    The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    Get PDF
    During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge for which Cold War era doctrinal methods were largely unsuited. This monograph examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era targeting process to one optimized for combating networks and conducting identity-based targeting. It analyzes the policy decisions and strategic choices that were the catalysts of this change and concludes with an in depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future.https://press.armywarcollege.edu/monographs/1436/thumbnail.jp

    Geometry-based customization of bending modalities for 3D-printed soft pneumatic actuators

    Get PDF
    In this work, we propose a novel type of 3D-printed soft pneumatic actuator that allows geometry-based customization of bending modalities. While motion in the 3D-space has been achieved for several types of soft actuators, only 2D-bending has been previously modelled and characterized within the scope of 3D-printed soft pneumatic actuators. We developed the first type of 3D-printed soft pneumatic actuator which, by means of the unique feature of customizable cubes at an angle with the longitudinal axis of the structure, is capable of helical motion. Thus, we characterize its mechanical behavior and formulate mathematical and FEA models to validate the experimental results. Variation to the pattern of the inclination angle along the actuator is then demonstrated to allow for complex 3D-bending modalities and the main applications in the fields of object manipulation and wearable robotics are finally discussed

    Biometric ID Cybersurveillance

    Get PDF
    The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking technology, would facilitate exponentially a convergence of cybersurveillance-body tracking and data surveillance, or dataveillance-biographical tracking. Yet, the existing Fourth Amendment jurisprudence is tethered to a “reasonable expectation of privacy” test that does not appear to restrain the comprehensive, suspicionless amassing of databases that concern the biometric data, movements, activities, and other personally identifiable information of individuals. In this Article, I initiate a project to explore the constitutional and other legal consequences of big data cybersurveillance generally and mass biometric dataveillance in particular. This Article focuses on how biometric data is increasingly incorporated into identity management systems through bureaucratized cybersurveillance or the normalization of cybersurveillance through the daily course of business and integrated forms of governance
    corecore