544 research outputs found

    Octilinear Force-Directed Layout with Mental Map Preservation for Schematic Diagrams

    Get PDF
    We present an algorithm for automatically laying out metro map style schematics using a force-directed approach, where we use a localized version of the standard spring embedder forces combined with an octilinear magnetic force. The two types of forces used during layout are naturally conflicting, and the existing method of simply combining these to generate a resultant force does not give satisfactory results. Hence we vary the forces, emphasizing the standard forces in the beginning to produce a well distributed graph, with the octilinear forces becoming prevalent at the end of the layout, to ensure that the key requirement of line angles at intervals of 45? is obtained. Our method is considerably faster than the more commonly used search-based approaches, and we believe the results are superior to the previous force-directed approach. We have further developed this technique to address the issues of dynamic schematic layout. We use a Delaunay triangulation to construct a schematic “frame”, which is used to retain relative node positions and permits full control of the level of mental map preservation. This technique is the first to combine mental map preservation techniques with the additional layout criteria of schematic diagrams. To conclude, we present the results of a study to investigate the relationship between the level of mental map preservation and the user response time and accuracy

    Using Sifting for k-Layer Straightline Crossing Minimization

    Full text link
    We present a new algorithm for k-layer straightline crossing minimization which is based on sifting that is a heuristic for dynamic reordering of decision diagrams used during logic synthesis and formal verification of logic circuits. The experiments prove sifting to be very efficient. In particular it outperforms the traditional layer by layer sweep based heuristics known from literature by far when applied to k-layered graphs with k \ge 3

    Stress-Minimizing Orthogonal Layout of Data Flow Diagrams with Ports

    Full text link
    We present a fundamentally different approach to orthogonal layout of data flow diagrams with ports. This is based on extending constrained stress majorization to cater for ports and flow layout. Because we are minimizing stress we are able to better display global structure, as measured by several criteria such as stress, edge-length variance, and aspect ratio. Compared to the layered approach, our layouts tend to exhibit symmetries, and eliminate inter-layer whitespace, making the diagrams more compact

    A generic algorithm for layout of biological networks

    Get PDF
    BackgroundBiological networks are widely used to represent processes in biological systems and to capture interactions and dependencies between biological entities. Their size and complexity is steadily increasing due to the ongoing growth of knowledge in the life sciences. To aid understanding of biological networks several algorithms for laying out and graphically representing networks and network analysis results have been developed. However, current algorithms are specialized to particular layout styles and therefore different algorithms are required for each kind of network and/or style of layout. This increases implementation effort and means that new algorithms must be developed for new layout styles. Furthermore, additional effort is necessary to compose different layout conventions in the same diagram. Also the user cannot usually customize the placement of nodes to tailor the layout to their particular need or task and there is little support for interactive network exploration.ResultsWe present a novel algorithm to visualize different biological networks and network analysis results in meaningful ways depending on network types and analysis outcome. Our method is based on constrained graph layout and we demonstrate how it can handle the drawing conventions used in biological networks.ConclusionThe presented algorithm offers the ability to produce many of the fundamental popular drawing styles while allowing the exibility of constraints to further tailor these layouts.publishe

    A Book of Generations – Writing at the Frontier

    Get PDF
    We address the problem of finding viewpoints that preserve the relational structure of a three-dimensional graph drawing under orthographic parallel projection. Previously, algorithms for finding the best viewpoints under two natural models of viewpoint “goodness” were proposed. Unfortunately, the inherent combinatorial complexity of the problem makes finding exact solutions is impractical. In this paper, we propose two approximation algorithms for the problem, commenting on their design, and presenting results on their performance

    Maternal age and offspring developmental vulnerability at age five: A population-based cohort study of Australian children

    Get PDF
    Published: April 24, 2018Background: In recent decades, there has been a shift to later childbearing in high-income countries. There is limited large-scale evidence of the relationship between maternal age and child outcomes beyond the perinatal period. The objective of this study is to quantify a child’s risk of developmental vulnerability at age five, according to their mother’s age at childbirth. Methods and findings: Linkage of population-level perinatal, hospital, and birth registration datasets to data from the Australian Early Development Census (AEDC) and school enrolments in Australia’s most populous state, New South Wales (NSW), enabled us to follow a cohort of 99,530 children from birth to their first year of school in 2009 or 2012. The study outcome was teacher-reported child development on five domains measured by the AEDC, including physical health and well-being, emotional maturity, social competence, language and cognitive skills, and communication skills and general knowledge. Developmental vulnerability was defined as domain scores below the 2009 AEDC 10th percentile cut point. The mean maternal age at childbirth was 29.6 years (standard deviation [SD], 5.7), with 4,382 children (4.4%) born to mothers aged <20 years and 20,026 children (20.1%) born to mothers aged ≥35 years. The proportion vulnerable on ≥1 domains was 21% overall and followed a reverse J-shaped distribution according to maternal age: it was highest in children born to mothers aged ≤15 years, at 40% (95% CI, 32–49), and was lowest in children born to mothers aged between 30 years and ≤35 years, at 17%–18%. For maternal ages 36 years to ≥45 years, the proportion vulnerable on ≥1 domains increased to 17%–24%. Adjustment for sociodemographic characteristics significantly attenuated vulnerability risk in children born to younger mothers, while adjustment for potentially modifiable factors, such as antenatal visits, had little additional impact across all ages. Although the multi-agency linkage yielded a broad range of sociodemographic, perinatal, health, and developmental variables at the child’s birth and school entry, the study was necessarily limited to variables available in the source data, which were mostly recorded for administrative purposes. Conclusions: Increasing maternal age was associated with a lesser risk of developmental vulnerability for children born to mothers aged 15 years to about 30 years. In contrast, increasing maternal age beyond 35 years was generally associated with increasing vulnerability, broadly equivalent to the risk for children born to mothers in their early twenties, which is highly relevant in the international context of later childbearing. That socioeconomic disadvantage explained approximately half of the increased risk of developmental vulnerability associated with younger motherhood suggests there may be scope to improve population-level child development through policies and programs that support disadvantaged mothers and children.Kathleen Falster, Mark Hanly, Emily Banks, John Lynch, Georgina Chambers, Marni Brownell, Sandra Eades, Louisa Jor

    Small grid embeddings of 3-polytopes

    Full text link
    We introduce an algorithm that embeds a given 3-connected planar graph as a convex 3-polytope with integer coordinates. The size of the coordinates is bounded by O(27.55n)=O(188n)O(2^{7.55n})=O(188^{n}). If the graph contains a triangle we can bound the integer coordinates by O(24.82n)O(2^{4.82n}). If the graph contains a quadrilateral we can bound the integer coordinates by O(25.46n)O(2^{5.46n}). The crucial part of the algorithm is to find a convex plane embedding whose edges can be weighted such that the sum of the weighted edges, seen as vectors, cancel at every point. It is well known that this can be guaranteed for the interior vertices by applying a technique of Tutte. We show how to extend Tutte's ideas to construct a plane embedding where the weighted vector sums cancel also on the vertices of the boundary face

    Masculinity, Injury and Death – Exploring Anti-Knife-carrying Messages

    Get PDF
    Although knives are the most common homicide instrument in Britain, factors that influence knife-carrying tolerance (i.e., the extent to which it is seen as acceptable and justified) and perceptions of anti-knife messages (i.e., slogans and posters aimed at reducing knife crime) have not been examined, which the current paper will cover by featuring progressively related studies. In Study 1, 227 men took part in a study on factors associated with knife-carrying. In Study 2, 200 participants took part in an experimental study on anti-knife slogans. In Study 3, 169 men took part in a study on existing anti-knife injury posters. In Study 4, 151 men took part in a study on anti-knife CGI posters. Study 1 proposes a structural equation model that shows the inter-correlations between physical defence ability, limited trust in authority, limited control over one’s status and the need for respect, and how they predict aggressive masculinity (i.e. macho culture), which, in turn, predicts knife-carrying tolerance. The model also reveals two significant latent factors: saving face inter-male competition (i.e., honor) and perceived social ecological constraints (i.e., socio-economic limitations). Study 2 shows that the injury slogan was rated as most persuasive. Study 3 shows that the fresh injury poster was rated as most persuasive, emotional and believable. Study 4 shows that it was the eye injury that was rated as most persuasive, emotional and believable. The paper supports protection motivation theory and offers practical insights into tackling knife crime

    Galactic vs. Extragalactic Origin of the Peculiar Transient SCP 06F6

    Full text link
    We study four scenarios for the SCP 06F6 transient event that was announced recently. Some of these were previously briefly discussed as plausible models for SCP 06F6, in particular with the claimed detection of a z=0.143 cosmological redshift of a Swan spectrum of a carbon rich envelope. We adopt this value of z for extragalactic scenarios. We cannot rule out any of these models, but can rank them from most to least preferred. Our favorite model is a tidal disruption of a CO white dwarf (WD) by an intermediate-mass black hole (IMBH). To account for the properties of the SCP 06F6 event, we have to assume the presence of a strong disk wind that was not included in previous numerical simulations. If the IMBH is the central BH of a galaxy, this explains the non detection of a bright galaxy in the direction of SCP 06F6. Our second favorite scenario is a type Ia-like SN that exploded inside the dense wind of a carbon star. The carbon star is the donor star of the exploded WD. Our third favorite model is a Galactic source of an asteroid that collided with a WD. Such a scenario was discussed in the past as the source of dusty disks around WDs, but no predictions exist regarding the appearance of such an event. Our least favorite model is of a core collapse SN. The only way we can account for the properties of SCP 06F6 with a core collapse SN is if we assume the occurrence of a rare type of binary interaction.Comment: Accepted by New Astronom
    • …
    corecore