We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Modular State Spaces - A New Perspective

    A modular Petri net is built from individual Petri nets, the instances, which have disjoint sets of internal transitions and interface transitions....
    Julian Gaede, Sophie Wallner, Karsten Wolf in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  2. Relational Structures for Interval Order Semantics of Concurrent Systems

    Relational structures like partial orders that are based on acyclic relations capturing a ‘before’ relationship, can provide versatile frameworks for...
    Ryszard Janicki, Jetty Kleijn, ... Łukasz Mikulski in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  3. Concurrent Context-Free Grammar for Parsing Business Processes with Iterated Shuffles

    Trace parsing, a technique for obtaining the correspondence between a trace, which is a string of activities, and a process model, forms the basis of...
    Akio Watanabe, Ayumi Araragi, ... Yousuke Takahashi in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  4. Verifying Temporal Logic Properties in the Modular State Space

    A modular Petri net is composed of multiple individual Petri nets, the modules, by fusing their interface transitions. Internal transitions are not...
    Conference paper 2024
  5. On the Expressive Power of Transfinite Sequences for Continuous Petri Nets

    Continuous Petri nets (CPNs) form a model of (uncountably infinite) dynamic systems that has been successfully explored for modelling and theoretical...
    Conference paper 2024
  6. Using Petri Nets for Digital Twins Modeling and Deployment: A Power Wheelchair System Case Study

    Ideally, safety-critical systems should be designed to avoid or be resilient in handling failures that may occur during their lifetime. For...
    Carolina Lagartinho-Oliveira, Filipe Moutinho, Luís Gomes in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  7. On the Application of Model-Driven Optimization to Business Processes

    The optimization of business processes is an important task to increase the efficiency of the described workflows. Metaheuristic optimization, such...
    Gabriele Taentzer, Jens Kosiol, Leen Lambers in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  8. Identifying Duplicates in Large Collections of Petri Nets and Nested-Unit Petri Nets

    We propose efficient techniques for detecting isomorphism between nets, i.e., for identifying, in large collections of (safe) Petri nets or...
    Pierre Bouvier, Hubert Garavel in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  9. Sequential Value Passing Yields a Kleene Theorem for Processes

    Communication with value passing has received ample attention in process theory. Value passing through a sequential composition has received much...
    Jos C. M. Baeten, Bas Luttik in Logics and Type Systems in Theory and Practice
    Chapter 2024
  10. Nanoscale Communication Redefined: Exploring Bio-Inspired Molecular Systems

    This paper explores a novel communication model employing a channel with multiple interconnected nodes between the sender and recipient nanomachines....
    Conference paper 2024
  11. YOLOv8-AS: Masked Face Detection and Tracking Based on YOLOv8 with Attention Mechanism Model

    The development of intelligent surveillance systems relies significantly on the effectiveness of face detection. To identify suspicious individuals,...
    Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  12. IOT-Based Water Quality Monitoring for the Tigris River: Addressing Pollution Challenges

    The Tigris River is a second-largest river in southwestern Asia, flowing through Turkey, Syria, Iraq, and Iran. The river is facing lack of water...
    Mariam Abdul Jabbar Ali, Mahdi Nsaif Jasim, Saad Najm Al-Saad in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  13. Crimes Tweet Detection Based on CNN Hyperparameter Optimization Using Snake Optimizer

    The increased use of social media has transformed how people share information. In the voluminous social media content, tweets involving criminal...
    Zainab Khyioon Abdalrdha, Abbas Mohsin Al-Bakry, Alaa K. Farhan in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  14. A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT

    The research introduces a hybrid encryption system for parallel computing environments, focusing on safeguarding IoT image data for fire incident...
    Conference paper 2024
  15. A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System

    The presented study suggests a novel image encryption method depending on a modified Cramer-Shoup encryption algorithm and a 5D hyper chaotic system....
    Zainab Khalid Ibrahim, Ekhlas Abbas Albahrani in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  16. Adaptive Evolutionary Algorithm for Maximizing Social Influence

    Influence Maximization (IM) is an issue that is represented by a predetermined group of users, sometimes referred to as the seed. The latter can have...
    Conference paper 2024
  17. Enhancing Data Security with a New Color Image Encryption Algorithm Based on 5D Chaotic System and Delta Feature for Dynamic Initialization

    This research introduces an innovative color image encryption algorithm that uses a 5D chaotic system and delta feature to modify the initial...
    Conference paper 2024
  18. Hybrid Edge Detection and Singular Value Decomposition for Image Background Removal

    Image background removal is a crucial technique for enhancing the visual impact of images or altering their composition, finding applications in...
    Zahraa Faisal, Esraa H. Abdul Ameer, Nidhal K. El Abbadi in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  19. Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema

    Passwords play a significant role in the authentication process for web applications. These applications are widely employed to deliver a diverse...
    Sajjad Mohammed Shlaka, Hala Bahjat Abdul Wahab in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  20. Focal-Based Deep Learning Model for Automatic Arrhythmia Diagnosis

    This paper approaches a new model for arrhythmia diagnosis based on short-duration electrocardiogram (ECG) heartbeats. To detect 8 arrhythmia classes...
    Abir Boulif, Bouchra Ananou, ... Stéphane Delliaux in Computational Science – ICCS 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.