نتایج جستجو برای: reversible process
تعداد نتایج: 1357544 فیلتر نتایج به سال:
Much research has studied foundations for correct and reliable communication-centric systems. A salient approach to correctness uses session types to enforce structured communications; a recent approach to reliability uses reversible actions as a way of reacting to unanticipated events or failures. This note describes recent work that develops a simple observation: the machinery required to def...
Methotrexate (MTX) is an antimetabolite of folic acid indicated in the treatment of a variety of cancers. The electrochemical behaviour of MTX on a glassy carbon electrode was investigated. The MTX oxidation is a complex, pH-dependent, diffusion-controlled irreversible process and proceeds with the transfer of two electrons and two protons and the formation of one electroactive product, 7-hydro...
Many watermark algorithms were proposed for protecting digital media from unauthorized use. Visible watermark scheme indicates the copyright of a digital media by embedding an inconspicuous but recognizable pattern into the media. However, the embedding process often results in serious distortion in the protected content, and the embedding process is not reversible. This paper proposes a revers...
Image encryption process is jointed with reversible data hiding in this paper, where the data to be hided are modulated by different secret keys selected for encryption. To extract the hided data from the cipher-text, the different tentative decrypted results are tested against typical random distribution in both spatial and frequency domain and the goodnessof-fit degrees are compared to extrac...
Readers of the Roman script must ‘‘unlearn’’ some forms of mirror generalization when processing printed stimuli (i.e., herb and herd are different words). Here we examine whether the suppression of mirror generalization is a process that affects all letters or whether it mostly affects reversible letters (i.e., b/d). Three masked priming lexical decision experiments were conducted to examine h...
Although tremendous progress has been made in the past years on watermarking for protecting information from incidental or accidental hacking, there still exists a number of problems. De-Identification is a process which can be used to ensure privacy by concealing the identity of individuals captured by video surveillance systems. One important challenge is to make the obfuscation process rever...
we present some new results on the existence and the approximationof common fixed point of expansive mappings and semigroups in probabilisticmetric spaces.
Reversible logic has extensive applications in quantum computing, it is a unconventional form of computing where the computational process is reversible, i.e., time-invertible. The main motivation behind the study of this technology is aimed at implementing reversible computing where they offer what is predicted to be the only potential way to improve the energy efficiency of computers beyond v...
There exists a set of reversible primitive modules that may be combined according to a set of simple rules to create larger systems, which are themselves reversible primitive modules. These modules may be combined to create a fully reversible, universal computer. I describe techniques for creating reversible primitive modules from simple switches, such as conventional CMOS transistors, and the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید