You are currently viewing a new version of our website. To view the old version click .

Symmetry, Volume 10, Issue 1

January 2018 - 32 articles

Cover Story: The application of helicenes as chiral auxiliaries and as chirogenic systems for separation technology, asymmetric synthesis, and enantioselective sensors, has been reviewed. Helicenes, as well as their classification and tunable electronic and steric factors, suitable for designing the desired/stereo-specific chromophores, are introduced. The recent updates and future directions in this scientific field are highlighted along with the corresponding scope and limitations. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (32)

  • Article
  • Open Access
4 Citations
3,977 Views
20 Pages

Efficient Location of Resources in Cylindrical Networks

  • José Juan Carreño,
  • José Antonio Martínez and
  • María Luz Puertas

10 January 2018

The location of resources in a network satisfying some optimization property is a classical combinatorial problem that can be modeled and solved by using graphs. Key tools in this problem are the domination-type properties, which have been defined an...

  • Feature Paper
  • Article
  • Open Access
38 Citations
6,275 Views
17 Pages

The Asymmetry is Derived from Mechanical Interlocking of Achiral Axle and Achiral Ring Components –Syntheses and Properties of Optically Pure [2]Rotaxanes–

  • Keiji Hirose,
  • Masaya Ukimi,
  • Shota Ueda,
  • Chie Onoda,
  • Ryohei Kano,
  • Kyosuke Tsuda,
  • Yuko Hinohara and
  • Yoshito Tobe

9 January 2018

Rotaxanes consisting of achiral axle and achiral ring components can possess supramolecular chirality due to their unique geometrical architectures. To synthesize such chiral rotaxanes, we adapted a prerotaxane method based on aminolysis of a metacyc...

  • Article
  • Open Access
14 Citations
4,590 Views
12 Pages

9 January 2018

In modern electronic warfare, multiple input multiple output (MIMO) radar has become an important tool for electronic reconnaissance and intelligence transmission because of its anti-stealth, high resolution, low intercept and anti-destruction charac...

  • Article
  • Open Access
14 Citations
5,109 Views
17 Pages

Efficient Information Hiding Based on Theory of Numbers

  • Yanjun Liu,
  • Chin-Chen Chang,
  • Peng-Cheng Huang and
  • Cheng-Yi Hsu

8 January 2018

Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in the field of data hiding. In r...

  • Article
  • Open Access
3 Citations
4,530 Views
18 Pages

8 January 2018

For the past few years, flash memory has been widely used because of its prominent advantages such as fast access speed, nonvolatility, high reliability, and low power consumption. However, flash memory still has several drawbacks that need to be ove...

  • Article
  • Open Access
9 Citations
6,095 Views
14 Pages

4 January 2018

Important information about the state dynamics of the brain during anesthesia is unraveled by Electroencephalogram (EEG) approaches. Patterns that are observed through EEG related to neural circuit mechanism under different molecular targets dependen...

  • Article
  • Open Access
19 Citations
6,747 Views
15 Pages

4 January 2018

This paper deals with a method for removing a ghost target that is not a real object from the output of a multiple object-tracking algorithm. This method uses an artificial neural network (multilayer perceptron) and introduces a structure, learning,...

  • Feature Paper
  • Article
  • Open Access
5 Citations
5,105 Views
16 Pages

An Effective Authentication Scheme Using DCT for Mobile Devices

  • Chin-Chen Chang,
  • Tzu-Chuen Lu,
  • Zhao-Hua Zhu and
  • Hui Tian

2 January 2018

This paper proposes an image authentication scheme for mobile devices. The proposed scheme generates an image watermark by using discrete cosine transform (DCT) and hides the watermark in the spatial pixels for image authentication and tamper detecti...

  • Article
  • Open Access
19 Citations
8,720 Views
16 Pages

2 January 2018

We propose a novel dynamic host mutation (DHM) architecture based on moving target defense (MTD) that can actively cope with cyberattacks. The goal of the DHM is to break the cyber kill chain, expand the attack surface to increase the attacker’s targ...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Symmetry - ISSN 2073-8994Creative Common CC BY license