5,072 research outputs found

    Playing with Derivation Modes and Halting Conditions

    Get PDF
    In the area of P systems, besides the standard maximally parallel derivation mode, many other derivation modes have been investigated, too. In this paper, many variants of hierarchical P systems and tissue P systems using different derivation modes are considered and the effects of using di erent derivation modes, especially the maximally parallel derivation modes and the maximally parallel set derivation modes, on the generative and accepting power are illustrated. Moreover, an overview on some control mechanisms used for (tissue) P systems is given. Furthermore, besides the standard total halting mode, we also consider different halting conditions such as unconditional halting and partial halting and explain how the use of different halting modes may considerably change the computing power of P systems and tissue P systems

    The DBSCAN Clustering Algorithm on P Systems

    Get PDF
    We show how to implement the DBSCAN clustering algorithm (Density Based Spatial Clustering of Applications with Noise) on membrane systems using evolution rules with promoters and priorities

    Tree-formed Verification Data for Trusted Platforms

    Full text link
    The establishment of trust relationships to a computing platform relies on validation processes. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform's configuration. In a process like remote attestation, the 'trusted' platform submits verification data created during a start up process. These data consist of hardware-protected values of platform configuration registers, containing nested measurement values, e.g., hash values, of loaded or started components. Commonly, the register values are created in linear order by a hardware-secured operation. Fine-grained diagnosis of components, based on the linear order of verification data and associated measurement logs, is not optimal. We propose a method to use tree-formed verification data to validate a platform. Component measurement values represent leaves, and protected registers represent roots of a hash tree. We describe the basic mechanism of validating a platform using tree-formed measurement logs and root registers and show an logarithmic speed-up for the search of faults. Secure creation of a tree is possible using a limited number of hardware-protected registers and a single protected operation. In this way, the security of tree-formed verification data is maintained.Comment: 15 pages, 11 figures, v3: Reference added, v4: Revised, accepted for publication in Computers and Securit

    A hybrid keyboard-guitar interface using capacitive touch sensing and physical modeling

    Get PDF
    This paper was presented at the 9th Sound and Music Computing Conference, Copenhagen, Denmark.This paper presents a hybrid interface based on a touch- sensing keyboard which gives detailed expressive control over a physically-modeled guitar. Physical modeling al- lows realistic guitar synthesis incorporating many expres- sive dimensions commonly employed by guitarists, includ- ing pluck strength and location, plectrum type, hand damp- ing and string bending. Often, when a physical model is used in performance, most control dimensions go unused when the interface fails to provide a way to intuitively con- trol them. Techniques as foundational as strumming lack a natural analog on the MIDI keyboard, and few digital controllers provide the independent control of pitch, vol- ume and timbre that even novice guitarists achieve. Our interface combines gestural aspects of keyboard and guitar playing. Most dimensions of guitar technique are control- lable polyphonically, some of them continuously within each note. Mappings are evaluated in a user study of key- boardists and guitarists, and the results demonstrate its playa- bility by performers of both instruments

    Membrane Systems with Priority, Dissolution, Promoters and Inhibitors and Time Petri Nets

    Get PDF
    We continue the investigations on exploring the connection between membrane systems and time Petri nets already commenced in [4] by extending membrane systems with promoters/inhibitors, membrane dissolution and priority for rules compared to the simple symbol-object membrane system. By constructing the simulating Petri net, we retain one of the main characteristics of the Petri net model, namely, the firings of the transitions can take place in any order: we do not impose any additional stipulation on the transition sequences in order to obtain a Petri net model equivalent to the general Turing machine. Instead, we substantially exploit the gain in computational strength obtained by the introduction of the timing feature for Petri nets

    (Tissue) P Systems with Anti-Membranes

    Get PDF
    The concept of a matter object being annihilated when meeting its corresponding anti-matter object is taken over for membranes as objects and anti-membranes as the corresponding annihilation counterpart in P systems. Natural numbers can be represented by the corresponding number of membranes with a speci c label. Computational completeness in this setting then can be obtained with using only elementary membrane division rules, without using objects. A similar result can be obtained for tissue P systems with cell division rules and cell / anti-cell annihilation rules. In both cases, as derivation modes we may take the standard maximally parallel derivation modes as well as any of the maximally parallel set derivation modes (non-extendable (multi)sets of rules, (multi)sets with maximal number of rules, (multi)sets of rules a ecting the maximal number of objects)

    Search Based Software Engineering in Membrane Computing

    Get PDF
    This paper presents a testing approach for kernel P Systems (kP systems), based on test data generation for a given scenario. This method uses Genetic Algorithms to generate the input sets needed to trigger the given computation steps

    APLIKASI PENGELOLAAN KAMAR INDEKOS BERBASIS WEB DI KAMAR INDEKOS AL-NAJAH CIPARAY

    Get PDF
    Boarding Room Is a home-based business that provides a place or room for rent to people who need it. Al-Najah Ciparay Boarding Room is one of the boarding houses located in the city of Bandung, to be precise at Kp. Babakan Caringin RT 01 / RW 10 Ciparay Village, Ciparay District. Having been around for more than 20 years, Al-Najah's boarding room still uses manual methods in managing its data.In managing boarding rooms, of course, a good management process is needed to get convenience for both the admin or boarding room manager, as well as service satisfaction for customers or boarding room tenants. With management that is still done manually, of course the boarding house management becomes inefficient and encounters many obstacles, both in terms of promotion, management of admin records, financial management and others.With the discovery of problems and constraints in the boarding room Al-Najah, the author will design a web-based boarding room application using the Waterfall system development method. Broadly speaking, the Waterfall method has steps, namely Requerment Analysis & Specification, Design, Coding and Testing, Integration, Maintenance.The result is a web-based boarding room management application, which can make it easy for prospective tenants to get information about boarding rooms, then the application can also help the admin or boarding room manager in carrying out promotions, data collection, and providing financial reports and others. easily

    PENGEMBANGAN APLIKASI MANAJEMEN SURAT BERBASIS WEB DI SMK KP 3 MAJALAYA

    Get PDF
    Management and archiving, especially the management of incoming and outgoing letters at SMK KP 3 Majalaya, has so far run well although it is still done simply. Both by way of writing manuals in the mail book and with the help of a simple mail management application. In this way it is certainly inefficient because it requires very thick books and large archive storage cabinets especially if to record in a long period of time and officers will have difficulty in finding certain mail documents that have been stored because the search process is done by checking one by one in the filing storage cabinet. Mail Management application is a system to facilitate the management process, especially correspondence in SMK KP 3 Majalaya. The conclusion of this research is to help develop the existing mail management system in SMK KP 3 Majalaya from a conventional system and simple application into a web-based computerized system using PHP and MySQL

    Beyond Generalized Multiplicities: Register Machines over Groups

    Get PDF
    Register machines are a classic model of computing, often seen as a canonical example of a device manipulating natural numbers. In this paper, we de ne register machines operating on general groups instead. This generalization follows the research direction started in multiple previous works. We study the expressive power of register machines as a function of the underlying groups, as well as of allowed ingredients (zero test, partial blindness, forbidden regions). We put forward a fundamental connection between register machines and vector addition systems. Finally, we show how registers over free groups can be used to store and manipulate strings
    corecore