Search results for "General Computer Science"

showing 10 items of 895 documents

Toward Quaternary QCA : Novel Majority and XOR Fuzzy Gates

2022

As an emerging nanotechnology, quantum-dot cellular automata (QCA) has been considered an alternative to CMOS technology that suffers from problems such as leakage current. Moreover, QCA is suitable for multi-valued logic due to the simplicity of implementing fuzzy logic in a way much easier than CMOS technology. In this paper, a quaternary cell is proposed with two isolated layers because of requiring three particles to design this quaternary cell. Moreover, due to the instability of the basic gates, the three particles cannot be placed in one layer. The first layer of the proposed two-layer cell includes a ternary cell and the second one includes a binary cell. It is assumed that the over…

polarizationquaternaryGeneral Computer SciencekvanttitietokoneetGeneral Engineeringquantum dotsnanotekniikkapotential wellkvanttilaskentaCMOS technologyquantum computinglitografia (mikrovalmistus)XOR fuzzy gatelogic gatesintegrated circuit modelinglithographyGeneral Materials Sciencemulti-valued QCAsumea logiikkamajority fuzzy gateQQCA
researchProduct

Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity

2023

Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on t…

post-breach managementtop management teamGeneral Computer Sciencecybersecurity governancerisk assessmentriskinarviointitietotekniikkayrityksetcybersecurity breachattention-based viewtietoturvakyberturvallisuustietomurtojohtoryhmätLawriskittietojärjestelmätComputers & Security
researchProduct

Linear Types for Higher Order Processes with First Class Directed Channels

1995

Abstract We present a small programming language for distributed systems based on message passing processes. In contrast to similar languages, channels are one-to-one connections between a unique sender and a unique receiver process. Process definitions and channels are first class values and the topology of process systems can change dynamically. The operational semantics of the language is defined by means of graph rewriting rules. A static type system based on the notion of linear types ensures that channels are always used as one-to-one connections.

process algebrasGraph rewritinggraph rewritingTheoretical computer scienceGeneral Computer ScienceProcess (engineering)Computer scienceMessage passinglinear typesTopology (electrical circuits)Communicating sequential processesType (model theory)Operational semanticsTheoretical Computer Scienceoperational semanticsComputer Science::Programming Languagesdistributed programmingcomputerComputer Science(all)Computer Science::Information Theorycomputer.programming_languageElectronic Notes in Theoretical Computer Science
researchProduct

Scheduling under the network of temporo-spatial proximity relationships

2017

We discuss and introduce to the schedulingeld a novel, qualitative optimization model - scheduling under the network of temporo-spatial proximity relationships.We introduce a half perimeter proximity measure as an objective of scheduling.We present and evaluate an incremental Sequence Pair neighborhood evaluation algorithm, applicable to both scheduling and rectangle packing problems in VLSI industry. In this paper, we discuss and introduce to the scheduling field a novel optimization objective - half perimeter proximity measure in scheduling under the network of temporo-spatial proximity relationships. The presented approach enables to qualitatively express various reasons of scheduling ce…

proximity relationshipsMathematical optimizationGeneral Computer Sciencerectangle packing problemEvaluation algorithm0102 computer and information sciences02 engineering and technologyIntegrated circuitManagement Science and Operations Research01 natural scienceslaw.inventionScheduling (computing)lawApproximation error0202 electrical engineering electronic engineering information engineeringschedulingComputer Science::Operating SystemsMathematicsVery-large-scale integrationProximity measureneighborhood evaluation010201 computation theory & mathematicsModeling and Simulation020201 artificial intelligence & image processingsequence pairRectangle packingComputers & Operations Research
researchProduct

Modeling and designing a robotic swarm: A quantum computing approach

2023

Nature is a neverending source of inspiration for technology. Quantum physics suggests applications to- ward quantum computing. Swarms’ self-organization leads to robotic swarm developments. Here, quantum computing is applied to swarm robotics. We model local interactions with a quantum circuit, testing it on simulators and quantum computers. To relate local with global behavior, we develop a block matrix-based model. Diagonal sub-matrices contain information on single robots; off-diagonal sub-matrices are the pairwise interaction terms. Comparing different swarms means comparing different block matrices. Choosing initial values and computation rules for off-diagonal blocks (with a particul…

quantum computing swarm robotics search &ampGeneral Computer ScienceSettore INF/01 - InformaticaGeneral Mathematicsrescue logic gates
researchProduct

Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience

2022

To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…

resilienssishipcybersecurityGeneral Computer ScienceAISGeneral EngineeringresiliencyGeneralLiterature_MISCELLANEOUSattacksmaritimelaivatmerenkulkuidentifiointiGeneral Materials ScienceDoSkyberturvallisuusverkkohyökkäyksetIEEE Access
researchProduct

A Channel-Aware Adaptive Modem for Underwater Acoustic Communications

2021

Acoustic underwater channels are very challenging, because of limited bandwidth, long propagation delays, extended multipath, severe attenuation, rapid time variation and large Doppler shifts. A plethora of underwater communication techniques have been developed for dealing with such a complexity, mostly tailoring specific applications scenarios which can not be considered as one-size-fits-all solutions. Indeed, the design of environment-specific solutions is especially critical for modulations with high spectral efficiency, which are very sensitive to channel characteristics. In this paper, we design and implement a software-defined modem able to dynamically estimate the acoustic channel c…

software radioGeneral Computer ScienceSettore ING-INF/03 - TelecomunicazioniOrthogonal frequency-division multiplexingComputer scienceBandwidth (signal processing)General EngineeringChannel estimationData_CODINGANDINFORMATIONTHEORYChannel estimation JANUS modems OFDM software radio underwater communication watermarkTK1-9971Delay spreadmodemsJANUSInterference (communication)underwater communicationModulationElectronic engineeringGeneral Materials ScienceElectrical engineering. Electronics. Nuclear engineeringUnderwater acoustic communicationMultipath propagationOFDMCommunication channelIEEE Access
researchProduct

Soundscape design through evolutionary engines

2008

Abstract Two implementations of an Evolutionary Sound Synthesis method using the Interaural Time Difference (ITD) and psychoacoustic descriptors are presented here as a way to develop criteria for fitness evaluation. We also explore a relationship between adaptive sound evolution and three soundscape characteristics: keysounds, key-signals and sound-marks. Sonic Localization Field is defined using a sound attenuation factor and ITD azimuth angle, respectively (Ii, Li). These pairs are used to build Spatial Sound Genotypes (SSG) and they are extracted from a waveform population set. An explanation on how our model was initially written in MATLAB is followed by a recent Pure Data (Pd) impleme…

sonic spatializationeducation.field_of_studySoundscapesound synthesisGeneral Computer Scienceartificial evolutionComputer scienceSpeech recognitionacoustic descriptorsPopulationEvolutionary algorithmInteraural time differencegenetic algorithmsPure DataPsychoacousticseducationcomputerAcoustic attenuationParametric statisticscomputer.programming_languageComputer Science(all)
researchProduct

Moving beyond the Turing test

2012

Computers interacting with, not imitating, humans is the way forward.

symbols.namesakeTheoretical computer scienceGeneral Computer ScienceComputer scienceTuring testsymbolsMultitape Turing machineCommunications of the ACM
researchProduct

The Impact of Financial Development and Macroeconomic Fundamentals on Nonperforming Loans among Emerging Countries: An Assessment Using the NARDL App…

2022

The relationship between financial development indicators and non-performing loans (NPLs) has garnered significant attention, especially in emerging countries. The puzzle of whether financial sector development increases or decreases Non-performing Loans (NPL)s has not been resolved to the satisfaction of the curious mind. This research attempts to answer the above question by studying the asymmetric and symmetric association between financial sector development and NPLs, by utilizing the novel non-linear autoregressive distribution lag (NARDL) and the linear autoregressive distribution lag (ARDL) approach. Moreover, to make the study inclusive, we have added a series of proxies to measure …

symmetric; asymmetric; NARDL; non-performing loans; emerging countries; developing countriesGeneral Computer ScienceApplied MathematicsModeling and SimulationTheoretical Computer ScienceComputation; Volume 10; Issue 10; Pages: 182
researchProduct