- Editorial
Graph Theory
- Jose M. Rodriguez
This book contains the successful invited submissions [1–10] to a special issue of Symmetry on the subject area of ‘graph theory’ [...]
January 2018 - 32 articles
This book contains the successful invited submissions [1–10] to a special issue of Symmetry on the subject area of ‘graph theory’ [...]
We provide a completely new perspective for the analysis of Casimir forces in very general piston configurations. To this end, in order to be self-contained, we prove a “gluing formula” well known in mathematics and relate it with Casimir forces in p...
Many artificial intelligence applications often require a huge amount of computing resources. As a result, cloud computing adoption rates are increasing in the artificial intelligence field. To support the demand for artificial intelligence applicati...
The analysis of symmetry is a main principle in natural sciences, especially physics. For network sciences, for example, in social sciences, computer science and data science, only a few small-scale studies of the symmetry of complex real-world graph...
Symmetry is an important cue for the aesthetic judgment of beauty. Using a binary forced-choice format in a cued mixed design, Jacobsen and Höfel (2003) compared aesthetic judgments of beauty and symmetry judgments of novel graphic patterns. A late p...
Peer review is an essential part in the publication process, ensuring that Symmetry maintains high quality standards for its published papers. In 2017, a total of 328 papers were published in the journal.[...]
It is much easier to determine a protein’s sequence than to determine its three dimensional structure and consequently homology modeling will be an essential aspect of most studies that require 3D protein structure data. Homology modeling templates t...
In this note, we consider degenerations between complex 2-step nilpotent Lie algebras of dimension 7 within the variety N 7 2 . This allows us to obtain the rigid algebras in N 7 2 , whose closures give the irreducible components of the...
We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds...
This paper designs a bidding and supplier evaluation model focused on strategic product procurement, and develops their respective evaluation knowledge bases. The model is built using the most relevant variables cited in the reviewed procurement lite...
of 4