Search results for "General Computer Science"
showing 10 items of 895 documents
Toward Quaternary QCA : Novel Majority and XOR Fuzzy Gates
2022
As an emerging nanotechnology, quantum-dot cellular automata (QCA) has been considered an alternative to CMOS technology that suffers from problems such as leakage current. Moreover, QCA is suitable for multi-valued logic due to the simplicity of implementing fuzzy logic in a way much easier than CMOS technology. In this paper, a quaternary cell is proposed with two isolated layers because of requiring three particles to design this quaternary cell. Moreover, due to the instability of the basic gates, the three particles cannot be placed in one layer. The first layer of the proposed two-layer cell includes a ternary cell and the second one includes a binary cell. It is assumed that the over…
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
2023
Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on t…
Linear Types for Higher Order Processes with First Class Directed Channels
1995
Abstract We present a small programming language for distributed systems based on message passing processes. In contrast to similar languages, channels are one-to-one connections between a unique sender and a unique receiver process. Process definitions and channels are first class values and the topology of process systems can change dynamically. The operational semantics of the language is defined by means of graph rewriting rules. A static type system based on the notion of linear types ensures that channels are always used as one-to-one connections.
Scheduling under the network of temporo-spatial proximity relationships
2017
We discuss and introduce to the schedulingeld a novel, qualitative optimization model - scheduling under the network of temporo-spatial proximity relationships.We introduce a half perimeter proximity measure as an objective of scheduling.We present and evaluate an incremental Sequence Pair neighborhood evaluation algorithm, applicable to both scheduling and rectangle packing problems in VLSI industry. In this paper, we discuss and introduce to the scheduling field a novel optimization objective - half perimeter proximity measure in scheduling under the network of temporo-spatial proximity relationships. The presented approach enables to qualitatively express various reasons of scheduling ce…
Modeling and designing a robotic swarm: A quantum computing approach
2023
Nature is a neverending source of inspiration for technology. Quantum physics suggests applications to- ward quantum computing. Swarms’ self-organization leads to robotic swarm developments. Here, quantum computing is applied to swarm robotics. We model local interactions with a quantum circuit, testing it on simulators and quantum computers. To relate local with global behavior, we develop a block matrix-based model. Diagonal sub-matrices contain information on single robots; off-diagonal sub-matrices are the pairwise interaction terms. Comparing different swarms means comparing different block matrices. Choosing initial values and computation rules for off-diagonal blocks (with a particul…
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
2022
To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…
A Channel-Aware Adaptive Modem for Underwater Acoustic Communications
2021
Acoustic underwater channels are very challenging, because of limited bandwidth, long propagation delays, extended multipath, severe attenuation, rapid time variation and large Doppler shifts. A plethora of underwater communication techniques have been developed for dealing with such a complexity, mostly tailoring specific applications scenarios which can not be considered as one-size-fits-all solutions. Indeed, the design of environment-specific solutions is especially critical for modulations with high spectral efficiency, which are very sensitive to channel characteristics. In this paper, we design and implement a software-defined modem able to dynamically estimate the acoustic channel c…
Soundscape design through evolutionary engines
2008
Abstract Two implementations of an Evolutionary Sound Synthesis method using the Interaural Time Difference (ITD) and psychoacoustic descriptors are presented here as a way to develop criteria for fitness evaluation. We also explore a relationship between adaptive sound evolution and three soundscape characteristics: keysounds, key-signals and sound-marks. Sonic Localization Field is defined using a sound attenuation factor and ITD azimuth angle, respectively (Ii, Li). These pairs are used to build Spatial Sound Genotypes (SSG) and they are extracted from a waveform population set. An explanation on how our model was initially written in MATLAB is followed by a recent Pure Data (Pd) impleme…
Moving beyond the Turing test
2012
Computers interacting with, not imitating, humans is the way forward.
The Impact of Financial Development and Macroeconomic Fundamentals on Nonperforming Loans among Emerging Countries: An Assessment Using the NARDL App…
2022
The relationship between financial development indicators and non-performing loans (NPLs) has garnered significant attention, especially in emerging countries. The puzzle of whether financial sector development increases or decreases Non-performing Loans (NPL)s has not been resolved to the satisfaction of the curious mind. This research attempts to answer the above question by studying the asymmetric and symmetric association between financial sector development and NPLs, by utilizing the novel non-linear autoregressive distribution lag (NARDL) and the linear autoregressive distribution lag (ARDL) approach. Moreover, to make the study inclusive, we have added a series of proxies to measure …