Search
Search Results
-
Modular State Spaces - A New Perspective
A modular Petri net is built from individual Petri nets, the instances, which have disjoint sets of internal transitions and interface transitions.... -
Relational Structures for Interval Order Semantics of Concurrent Systems
Relational structures like partial orders that are based on acyclic relations capturing a ‘before’ relationship, can provide versatile frameworks for... -
Concurrent Context-Free Grammar for Parsing Business Processes with Iterated Shuffles
Trace parsing, a technique for obtaining the correspondence between a trace, which is a string of activities, and a process model, forms the basis of... -
Verifying Temporal Logic Properties in the Modular State Space
A modular Petri net is composed of multiple individual Petri nets, the modules, by fusing their interface transitions. Internal transitions are not... -
On the Expressive Power of Transfinite Sequences for Continuous Petri Nets
Continuous Petri nets (CPNs) form a model of (uncountably infinite) dynamic systems that has been successfully explored for modelling and theoretical... -
Using Petri Nets for Digital Twins Modeling and Deployment: A Power Wheelchair System Case Study
Ideally, safety-critical systems should be designed to avoid or be resilient in handling failures that may occur during their lifetime. For... -
On the Application of Model-Driven Optimization to Business Processes
The optimization of business processes is an important task to increase the efficiency of the described workflows. Metaheuristic optimization, such... -
Identifying Duplicates in Large Collections of Petri Nets and Nested-Unit Petri Nets
We propose efficient techniques for detecting isomorphism between nets, i.e., for identifying, in large collections of (safe) Petri nets or... -
Sequential Value Passing Yields a Kleene Theorem for Processes
Communication with value passing has received ample attention in process theory. Value passing through a sequential composition has received much... -
Nanoscale Communication Redefined: Exploring Bio-Inspired Molecular Systems
This paper explores a novel communication model employing a channel with multiple interconnected nodes between the sender and recipient nanomachines.... -
YOLOv8-AS: Masked Face Detection and Tracking Based on YOLOv8 with Attention Mechanism Model
The development of intelligent surveillance systems relies significantly on the effectiveness of face detection. To identify suspicious individuals,... -
IOT-Based Water Quality Monitoring for the Tigris River: Addressing Pollution Challenges
The Tigris River is a second-largest river in southwestern Asia, flowing through Turkey, Syria, Iraq, and Iran. The river is facing lack of water... -
Crimes Tweet Detection Based on CNN Hyperparameter Optimization Using Snake Optimizer
The increased use of social media has transformed how people share information. In the voluminous social media content, tweets involving criminal... -
A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT
The research introduces a hybrid encryption system for parallel computing environments, focusing on safeguarding IoT image data for fire incident... -
A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System
The presented study suggests a novel image encryption method depending on a modified Cramer-Shoup encryption algorithm and a 5D hyper chaotic system.... -
Adaptive Evolutionary Algorithm for Maximizing Social Influence
Influence Maximization (IM) is an issue that is represented by a predetermined group of users, sometimes referred to as the seed. The latter can have... -
Enhancing Data Security with a New Color Image Encryption Algorithm Based on 5D Chaotic System and Delta Feature for Dynamic Initialization
This research introduces an innovative color image encryption algorithm that uses a 5D chaotic system and delta feature to modify the initial... -
Hybrid Edge Detection and Singular Value Decomposition for Image Background Removal
Image background removal is a crucial technique for enhancing the visual impact of images or altering their composition, finding applications in... -
Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema
Passwords play a significant role in the authentication process for web applications. These applications are widely employed to deliver a diverse... -
Focal-Based Deep Learning Model for Automatic Arrhythmia Diagnosis
This paper approaches a new model for arrhythmia diagnosis based on short-duration electrocardiogram (ECG) heartbeats. To detect 8 arrhythmia classes...