Reversible computing is a new paradigm that has emerged recently and extends the traditional forwards-only computing mode withthe ability to execute in backwards, so that computation can run in reverse as easily as i...
详细信息
Reversible computing is a new paradigm that has emerged recently and extends the traditional forwards-only computing mode withthe ability to execute in backwards, so that computation can run in reverse as easily as in forward. Two approaches to developing transition system (automaton -like) semantics for event structure models are distinguished in the literature. In the first case, states are considered as configurations (sets of already executed events), and transitions between states are built by starting from the initial configuration and repeatedly adding executable events. In the second approach, states are understood as residuals (model fragments that have not yet been executed), and transitions are constructed by starting from the given event structure as the initial state and deleting already executed (and conflicting) parts thereof during execution. the present paper focuses on an investigation of how the two approaches are interrelated for the model of prime event structures extended with cause-respecting reversibility. the bisimilarity of the resulting transition systems is proved, taking into account step semantics of the model under consideration.
Cloud computing has revolutionized the way data is stored, processed, and accessed. However, it also introduces new security challenges, making the protection of sensitive data a top priority for cloud service provide...
Cloud computing has revolutionized the way data is stored, processed, and accessed. However, it also introduces new security challenges, making the protection of sensitive data a top priority for cloud service providers and users. Cryptographic techniques play a crucial role in ensuring data security in cloud computing environments. this abstract presents a study that investigates various cryptographic techniques employed to safeguard data in the cloud. this research aims to analyze different cryptographic techniques used in cloud computing, focusing on their effectiveness, performance, and suitability for different cloud deployment models. the study encompasses both symmetric and asymmetric encryption algorithms. the comparative analysis includes popular symmetric key algorithms such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), Triple DES, Twofish and Blowfish, as well as widely adopted asymmetric key algorithms such as RSA.
the proceedings contain 80 papers. the special focus in this conference is on e-Learning. the topics include: Readiness, challenges, and satisfaction in the new paradigm of teaching and learning: An E-learning evaluat...
ISBN:
(纸本)9781665415507
the proceedings contain 80 papers. the special focus in this conference is on e-Learning. the topics include: Readiness, challenges, and satisfaction in the new paradigm of teaching and learning: An E-learning evaluation;plagiarism among thai students: A study of attitudes and subjective norms;Learners’ perceptions of MOOCS: A case study from an international on-line learning forum;effect of group tutoring on promoting students independent learning in architecture studio;private and secure students’ data sharing in educational systems;a model for detecting sounds-alike phishing email contents for persons with visual impairments;enhancing memory for technical lists with computer-generated mnemonics;online teaching methodologies in higher education credit mobility courses: ErasmusX pilot project;the effect of group work on improving student’s motivation to learn chemistry: An action research;the impact of pre-reading strategies on reading performance: an action research;the reporting of technological readiness of higher education institutions in GCC countries: A situational analysis of COVID-19 crisis;Online teaching at Egyptian private universities during COVID 19: Lessons learned;the Arduino e-kit as applied in engineering, science and technology e-learning;using Edmodo online application as a supplement to enhance student level of performance and critical thinking in the learning process of thermodynamic course;Training STEAM educators in the COVID-19 emergency situation: Redesigning teaching;post-pandemic online teaching experience at king Faisal university: A case study;the future of the transition to e-learning and distance learning using artificial intelligence;the effects of emotional stress on learning and memory cognitive function: An EEG review study in education.
this work presences developing an advanced web-based decision support platform to enhance climate-smart agriculture practices. this platform developed within the STARGATE project, integrates various tools to aid farme...
详细信息
In recent years, there has been an increasing interest in developing in vitro models that predict the behavior of cells in living organisms. Mathematical models based on differential equations, and related numerical a...
详细信息
Nowadays, distributed systems consisting of a large number of simple devices are used to perform complex operations rather than advanced devices alone. Particularly, networked systems of nanoscale devices are called I...
详细信息
Fifth generation (5G) wireless networks were unable to meet certain performance standards;however, sixth generation (6G) wireless networks will set novel benchmarks. this is a result of the increasing demands on an in...
详细信息
Unmanned aerial vehicles (UAV, drones) are becoming one of the key machines/tools of the modern world, especially in military applications. Numerous research work is underway to explore the possibility of using these ...
详细信息
the objective of this study is to analyze and compare different neural network (NN) architectures as multi-class classifiers to estimate the direction of arrival (DOA) using a uniform linear array (ULA). the study spe...
详细信息
Convoluted high-order structures as modeled through mathematical principle including telecommunication systems, power plants for urbanized energy supply and aerospace systems are often accompanied by the apparent setb...
详细信息
暂无评论