|
APPLYING THE CONCEPTS OF MULTI-AGENT APPROACH ...
By: Vadim Golembo, Alexey Botchkaryov
(4349 reads)
Rating:

(1.00/10)
|
Abstract: The problem of development and application of the multiagent techniques for organizing mobile
exploring agents' cooperative behavior is examined. The main problems related to design and operating of
distributed decentralized homogeneous multi-agent systems with restricted local interaction between agents are
analyzed. A number of collective behavior models (algorithmic, interpolational, entropic), which discover the
problems of distributed decentralized exploration are proposed.
Keywords: multi-agent systems, distributed autonomous explorations, self-organization.
ACM Classification Keywords: I.2.11 Distributed Artificial Intelligence
Link:
APPLYING THE CONCEPTS OF MULTI-AGENT APPROACH
TO THE DISTRIBUTED AUTONOMOUS EXPLORATIONS
Vadim Golembo, Alexey Botchkaryov
http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p19.pdf
|
OPTIMAL DESIGN OF INTELLIGENT CONTROL SYSTEMS OF STEAM TURBINE ...
By: Fedyanyna et al.
(4673 reads)
Rating:

(1.00/10)
|
Abstract: One of the basic engineering problems of the automatic control systems synthesis for steam turbines is
systems quality indices optimization task. The features of such task are defined by plenty of control systems
structural parameters, complication of quality indices formalization and calculation, the systems models high
order. The greatest difficulty of the control system synthesis is optimization models and methods design. The
paper purpose is to develop models and methods for optimum design of the intelligent automatic control systems
of atomic power station steam turbine using genetic algorithms. The steam turbine automatic control system is
applied to stabilize turbine rotor frequency with high precision. The intelligent steam turbine control system
includes a steam turbine, frequency sensor, intelligent frequency regulator, electro-hydraulic automatic drive and
turbine adjusting valve. Input signals on an automatic drive can be given by the steam pressure regulator through
the turbine management mechanism or by the electric power regulator. Assumptions substantiated to model the
automatic control system and automatic drive as executive link of control system. The automatic drive diagram of
principle includes electro-hydraulic transformer, sleeve valve, servomotor, position sensors and electronic part. In
the paper were built the mathematical models of automatic drive and steam turbine, the models permanent
parameters values were calculated, the mathematical models of the automatic control system were developed in
state space with the intelligent frequency regulator, the regulator parameters were optimized with system quality
indices using genetic algorithms.
Keywords: automatic control system, automatic drive, steam turbine, intelligent regulator, genetic algorithms.
ACM Classification Keywords: G.1.6 Optimization - Nonlinear programming
Link:
OPTIMAL DESIGN OF INTELLIGENT CONTROL SYSTEMS OF STEAM TURBINE
USING GENETIC ALGORITHMS
Khrystyna Fedyanyna, Ievgeniia Kucher, Valery Severin
http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p15.pdf
|
NAVIGATION SOFTWARE OF AUTOMATED GUIDED VEHICLE
By: Magdalena Dobrzańska, Paweł Dobrzański
(4189 reads)
Rating:

(1.00/10)
|
Abstract: In the article it has been presented the structure of the control system and measurement data
processing of an automated guided vehicle. The basic navigation technique – odometry, which is applied in the
automated guided vehicle, has been described, as well as connected with it errors of position tracing. Next the
navigation software was shown which enables to design the trajectory of the vehicle movement as well as the
registration and reading of the measurement data from the measurement sensors.
Keywords :Automated Guided Vehicle, navigation, odometry, odometry errors, Visual C++
ACM Classification Keywords: I.2.9 Robotics: Autonomous vehicles, Sensors, J.7 Computers in other systems
Link:
NAVIGATION SOFTWARE OF AUTOMATED GUIDED VEHICLE
Magdalena Dobrzańska, Paweł Dobrzański
http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p29.pdf
|
THE CASCADE GROWING NEURAL NETWORK USING QUADRATIC NEURONS ...
By: Bodyanskiy et al.
(4754 reads)
Rating:

(1.00/10)
|
Abstract: New non-conventional system of the computational intelligence is proposed. It has growing structure
similar to the Cascade-Correlation? Learning Architecture designed by S. E. Fahlman and C. Lebiere but differs
from it in type of artificial neurons. Quadratic neurons are used as nodes in introduced architecture. These simple
elements can be quickly adjusted using high-speed learning procedures. Proposed approach allows to reduce
time required for weight coefficients adjustment and to decrease training dataset size in comparison with
conventional neural networks. Also on-board realization of quadratic neuron is quite simple and therefore
implementation of entire cascade architecture in hardware is very easy.
Keywords: artificial neural networks, constructive approach, quadratic neuron, real-time processing, online
learning.
ACM Classification Keywords: I.2.6 Learning – Connectionism and neural nets.
Link:
THE CASCADE GROWING NEURAL NETWORK USING QUADRATIC NEURONS
AND ITS LEARNING ALGORITHMS FOR ON-LINE INFORMATION PROCESSING
Yevgeniy Bodyanskiy, Yevgen Viktorov, Iryna Pliss
http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p03.pdf
|
ADAPTIVE GUSTAFSON-KESSEL FUZZY CLUSTERING ALGORITHM BASED ON ...
By: Bodyanskiy et al.
(8054 reads)
Rating:

(1.00/10)
|
Abstract: The Gustafson-Kessel? fuzzy clustering algorithm is capable of detecting hyperellipsoidal clusters of
different sizes and orientations by adjusting the covariance matrix of data, thus overcoming the drawbacks of
conventional fuzzy c-means algorithm. In this paper, an adaptive version of the Gustafson-Kessel? algorithm is
proposed. The way to adjust the covariance matrix iteratively is introduced by applying the Sherman-Morrison?
matrix inversion procedure. The adaptive fuzzy clustering algorithm is implemented on the base of self-learning
spiking neural network known as a realistic analog of biological neural systems that can perform fast data
processing. Therefore, the proposed fuzzy spiking neural network that belongs to a new type of hybrid intelligent
systems makes it possible both to perform fuzzy clustering tasks efficiently and to reduce data processing time
considerably.
Keywords: computational intelligence, hybrid intelligent system, fuzzy clustering, adaptive Gustafson-Kessel?
algorithm, self-learning spiking neural network, spiking neuron center, the temporal Hebbian learning.
ACM Classification Keywords: I.2.6 Artificial Intelligence: Learning – Connectionism and neural nets;
I.5.1 Pattern Recognition: Models – Fuzzy set, Neural nets; I.5.3 Pattern Recognition: Clustering – Algorithms.
Link:
ADAPTIVE GUSTAFSON-KESSEL FUZZY CLUSTERING ALGORITHM BASED ON
SELF-LEARNING SPIKING NEURAL NETWORK
Yevgeniy Bodyanskiy, Artem Dolotov, Iryna Pliss
http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p02.pdf
|
ORGANISATION OF DISABLED PERSONS’ TELEWORK AS PART OF PROCESS OF KNOWLEDGE ...
By: Tatjana Bilevičienė, Eglė Bilevičiūtė
(4285 reads)
Rating:

(1.00/10)
|
Abstract: Challenges of knowledge society, knowledge economics change models of management. Work trends,
organisational structures are changing. Most of knowledge management processes one way or another are
connected with main elements of information management: information technologies and information systems.
Knowledge management is new branch of management, the main purpose of that is bigger effectiveness of
business applying synergy of humans, processes and technologies. Knowledge management helps for
employees single-mindedly to create, share, collect, keep and practice the knowledge. Fundamentals of
knowledge management could be used for organisation of telework of disabled persons, solving economical
problems of state. Knowledge management could help to increase productiveness of employees, expanding
sources of reachable for them knowledge. Improving shapes of disabled persons’ education the very important is
to pay attention at how educational knowledge is implemented practically. Knowledge management should
encourage employees to integrate such educational processes together with their work methods and to apply
results of educational processes in their daily activities. For purposeful and beneficial education there should be
forecasted what knowledge is the most important. Authors of article analyses the application of knowledge
management methods in structure of professional rehabilitation of disabled persons, organising telework of
disabled persons. During such process new knowledge should be used not only by disabled persons, but both
represents of governmental institutions and consultants.
Keywords: knowledge society, disabled persons, telework.
ACM Classification Keywords: K.4.3. Computers and society - Computer-supported collaborative work
Link:
ORGANISATION OF DISABLED PERSONS’ TELEWORK AS PART OF PROCESS OF KNOWLEDGE MANAGEMENT
Tatjana Bilevičienė, Eglė Bilevičiūtė
http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p09.pdf
|
INDIRECT SPATIAL DATA EXTRACTION FROM WEB DOCUMENTS
By: Blagoev et al.
(4363 reads)
Rating:

(1.00/10)
|
Abstract: An approach for indirect spatial data extraction by learning restricted finite state automata from web
documents created using Bulgarian language are outlined in the paper. It uses heuristics to generalize initial
finite-state automata that recognizes only the positive examples and nothing else into automata that recognizes
as larger language as possible without extracting any non-positive examples from the training data set.
The learning method, program realization and experiments are presented. The investigation is carried out in
accordance and following the rules of EU INSPIRE Network.
Keywords: Automatic Data Extraction, Restricted Finite State Automata, Web Documents, Indirect Spatial Data,
INSPIRE network.
ACM Classification Keywords: H.2.8 Database Applications - Data mining; F.1.1 Models of Computation –
Finite State Automata
Link:
INDIRECT SPATIAL DATA EXTRACTION FROM WEB DOCUMENTS
Dimitar Blagoev, George Totkov, Milena Staneva,
Krassimira Ivanova, Krassimir Markov, Peter Stanchev
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p11.pdf
|
SIMULATION OF DNA CUTTING
By: Cisneros et al.
(4575 reads)
Rating:

(1.00/10)
|
Abstract: The simulation of the main molecular operations used in DNA Computing can lead the researchers to
develop complex algorithms and methods without the need of working with real DNA strands in-vitro. The
purpose of this paper is to present a computer program which simulates a cutting process over DNA molecules
which is an essential operation for the DNA computation. This simulation represents a useful tool for a virtual
laboratory which is oriented to DNA computations. The results given by the software can show the behavior of a
DNA cutting under certain set of restrictive enzymes to carry out the operation in-vitro efficiently.
Keywords: DNA Computing, DNA Simulation, Software Simulation, DNA operations, Bioinformatics.
ACM Classification Keywords: I.6. Simulation and Modelling, B.7.1 Advanced Technologies, J.3 Biology and
Genetics
Link:
SIMULATION OF DNA CUTTING
Francisco José Cisneros, Andrés de la Peña, Cristina Piqueras,
Paula Cordero, Juan Castellanos
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p01.pdf
|
MODELING LANGUAGE OF MULTI-AGENT SYSTEMS = PROGRAMMING TEMPLATE
By: Rubén Álvarez-González, Miguel Angel Díaz Martínez
(5237 reads)
Rating:

(1.00/10)
|
Abstract: The modeling languages are designed to make easier the software development. That is why so many
times they are included in the development methodology. In 2001 the OMG proposed model driver architecture
for the software development (MDA). In this architecture are transformations which are used between the models
to get others. The goal is to show a new way to develop applications using the Agents Oriented paradigm. To do
it the MDA is showed and the methodology agent’s models are studied. There is no methodology which uses the
transformations between the models, so the meta-models group and the transformations between them should be
researched.
Keywords: MDA, OMG, Modeling Languages, Meta-Models?, Models, MAS, Agents, MDD, MDE.
ACM Classification Keywords: C.2.4 Distributed Systems - Distributed applications, D.2.11 Software
Architectures – Languages.
Link:
MODELING LANGUAGE OF MULTI-AGENT SYSTEMS = PROGRAMMING TEMPLATE
Rubén Álvarez-González, Miguel Angel Díaz Martínez
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p03.pdf
|
PERFORMANCE ANALYSIS OF CALL ADMISSION CONTROL FOR STREAMING ...
By: Kassev et al.
(4904 reads)
Rating:

(1.00/10)
|
Abstract: Admission control is a key issue for quality of service (QoS) provisioning in both wired and wireless
communication networks. The call admission control (CAC) algorithm needs to know the source traffic
characteristics and the required performance in order to determine whether the connection can be accepted or
not and , if accepted, the amount of network resources to allocate. In this paper, we determine the CAC threshold
value in case streaming homogeneous ON-OFF traffic flow is considered. An analytical method for packet loss
probability evaluation is proposed and numerical examples are presented.
Keywords: streaming traffic, ON-OFF traffic model, call admission control, packet loss probability
ACM Classification Keywords: C.2.1 Network architecture and Design – Wireless communication, C.2.5 Local
and Wide-Area? Networks – Access schemes
Link:
PERFORMANCE ANALYSIS OF CALL ADMISSION CONTROL FOR STREAMING
TRAFFIC WITH ACTIVITY DETECTION FUNCTION
Kiril Kassev, Yakim Mihov, Boris Tsankov
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p06.pdf
|
ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ...
By: Dimitrina Polimirova, Eugene Nickolov
(4213 reads)
Rating:

(1.00/10)
|
Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to
and within it, is made. Main techniques for accomplishing an attack to virtual environment are pointed and real
virtual attacks and successful virtual attacks are examined. An analysis of accomplished attacks is made and
percent distribution of real virtual attacks and successful virtual attack is graphically illustrated. Respective
assessments and recommendations for future investigation are made.
Keywords: Virtual Machine Environment, Virtual Environment, Attack/Attack tools, Defense/Defense tools,
Malicious Code
ACM Classification Keywords: D.4.6 Security and Protection: Invasive software (e.g., viruses, worms, Trojan
horses)
Link:
ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT
Dimitrina Polimirova, Eugene Nickolov
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p07.pdf
|
PROGNOSTICATION OF EFFICIENCY OF MEDICAL AND PROPHYLACTIC ...
By: Samura et al.
(4772 reads)
Rating:

(1.00/10)
|
Abstract: This article is devoted to the questions of prognostication of efficiency medical and prophylactic
measures at renewal of the broken equilibrium of human organism by vegetable medications. The methods of
modeling of different processes are considered in the article from position of systems analysis. There was chosen
Markov processes theory for description of renewal of the broken homoeostasis process, which rotined high
correlation between clinical supervisions and forecast process.
Keywords: casual process, Markov chains, medical and prophylactic measures, MAIS, MFPS.
ACM Classification Keywords: I.6 Simulation and modeling, I.6.3 Applications; J.3 Life and medical sciences –
Medical information systems
Link:
PROGNOSTICATION OF EFFICIENCY OF MEDICAL AND PROPHYLACTIC
MEASURES AT DIFFERENT HOMOEOSTASIS VIOLATION OF HUMAN ORGANISM
BY MARKOV PROCESSES THEORY
Boris Samura, Anatoly Povoroznuk, Olga Kozina, Elena Visotskaja,
Elena Chernykh, Nikolay Shukin, Andrei Porvan
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p10.pdf
|
MULTI-MODAL EMOTION RECOGNITION – MORE "COGNITIVE" MACHINES
By: Slavova et al.
(5125 reads)
Rating:

(1.00/10)
|
Abstract: Based on several results related to studies on emotions, we suggest that the process of emotionrecognition
is assisted by some internal structure of the cognitive images of emotions, which are at different levels
of knowledge representation. We concede that the main proposed in psychology models are in correspondence
with these levels and in this sense - complementary. We summarize the state-of-the-art of machine emotion
recognition with regards of the used psychological models of emotions. In order to discover amelioration sources
of multimodal machine emotion recognition, we propose a scheme of the cognitive process, based on gradual
levels of representation. The proposed scheme shows several "strategic" differences with the architectures used
in machine emotion recognition. We discuss the questions related to recognition, assisted by two levels of
representation that we called "perceptual" and "conceptual".
ACM Classification Keywords: I.2 Artificial Intelligence, 1.2.0.Cognitive simulation
Link:
MULTI-MODAL EMOTION RECOGNITION – MORE "COGNITIVE" MACHINES
Velina Slavova, Hichem Sahli, Werner Verhelst
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p09.pdf
|
EULERPATHSOLVER: A NEW APPLICATION FOR FLEURY’S ALGORITHM SIMULATION
By: Torrubia et al.
(6248 reads)
Rating:

(1.00/10)
|
Abstract: EulerPathSolver? is a new application, that meets eMathTeacher specifications and simulates Fleury’s
algorithm execution. The application runs in a Java Web Start Window and features an animation of the algorithm
code, a framework working panel showing the algorithm structures and allowing their manipulation, Pop-up
questions, language selector and, save/load options together with the interactive simulation within automatic
correction of the user’s inputs. It has been designed with the main purpose of supporting active learning as well
as being a good aid for teachers when explaining the algorithm process. EulerPathSolver? enhances dramatically
the old Fleury’s Algorithm tutorial designed by the authors and will be a great partner when learning Fleury’s
Algorithm.
Keywords: eMathTeacher, eLearning, active learning, interactive Java applications, discrete mathematics
learning, algorithm visualization.
ACM Classification Keywords: K.3.1 Computers and Education: Computer Uses in Education – computerassisted
instruction (CAI), distance learning. K.3.2 Computers and Education: Computer and Information
Science Education – computer science education, self-assessment. G.2.2 Discrete Mathematics: Graph Theory
– graph algorithms, path and circuit problems.
Link:
EULERPATHSOLVER: A NEW APPLICATION FOR FLEURY’S ALGORITHM SIMULATION
Gloria Sánchez–Torrubia?, Carmen Torres–Blanc?, Leila Navascués-Galante?
http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p13.pdf
|
THE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS
By: Yuriy Zaychenko
(5831 reads)
Rating:

(1.00/10)
|
Abstract: The problem of forecasting models constructing using experimental data in terms of fuzziness, when
input variables are not known exactly and determined as intervals of uncertainty is considered in this paper. The
fuzzy group method of data handling is proposed to solve this problem. The mathematical model of the problem
mentioned above is built and fuzzy GMDH with fuzzy inputs is elaborated in the paper. The corresponding
program which uses the suggested algorithm was developed. The experimental investigations and comparison of
FGMDH with neural nets in problems of stock prices forecasting were carried out and presented in this paper.
Keywords Group Method of Data Handling, fuzzy, economic indexes, stock prices, forecasting
ACM Classification Keywords: H.4.2 Information Systems Applications Types of Systems - Decision support
Link:
THE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS
Yuriy Zaychenko
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p28.pdf
|
THEORETIC-EXPERIMENTAL MULTICRITERIA METHOD FOR NEURAL NETWORK ...
By: Voronin et al.
(4520 reads)
Rating:

(1.00/10)
|
Abstract: The problem state and multicriteria optimization procedure of neural network classifier’s architecture is
considered. The scalar convolution of criteria with nonlinear trade-off scheme is offered as a goal function. The
search methods of optimization with discrete arguments are used. The neural network classifier of texts as an
example is given.
Keywords: multicriteria optimization, neural nets, classifier.
ACM Classification Keywords: H.1 Models and Principles – H.1.1 – Systems and Information Theory; H.4.2 –
Types of Systems; C.1.3 Other Architecture Styles – Neural nets
Link:
THEORETIC-EXPERIMENTAL MULTICRITERIA METHOD FOR NEURAL NETWORK
CLASSIFIERS’ ARCHITECTURE
Albert Voronin, Yuriy Ziatdinov, Anna Antonyuk
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p06.pdf
|
COLLECTIVE PRODUCT COST SHARING IN CONDITIONS OF MANAGED ECONOMY
By: Olexij Voloshin, Vasyl Laver
(4625 reads)
Rating:

(1.00/10)
|
Abstract: The collective product cost-sharing problems in the conditions of the managed economy are being
observed. The fuzzy generalization and “dual” approach to the solution of this problem is offered.
Keywords: decision making, cost-sharing, regulated monopoly.
ACM Classification Keywords: H.4.2 Information Systems Applications: Types of Systems: Decision Support.
Link:
COLLECTIVE PRODUCT COST SHARING IN CONDITIONS OF MANAGED ECONOMY
Olexij Voloshin, Vasyl Laver
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p27.pdf
|
STATISTICAL MODELING OF SPREAD OF OPTICAL FIELDS IN FIRES
By: Visotskaja et al.
(4183 reads)
Rating:

(1.00/10)
|
Abstract: Application of Monte-Carlo? method for determination of optical radiation flow density of forest fires in a
cloudless atmosphere with dependence on optic-geometrical parameters of surface’s relief for the case of multi
and single scattering is offered in this work. The use of initial directions of photon trajectory, free path length of
the photon, coordinates of interact points between the photon and environment, also probabilities of photon’s
getting to a receiver into the statistical modeling of direction of distribution of optical radiation of fires is proposed.
Keywords: Monte-Carlo? method, photon trajectory, radiation transfer.
ACM Classification Keywords: I.6 Simulation and Modeling. I.6.8 Types of Simulation - Monte Carlo.
Link:
STATISTICAL MODELING OF SPREAD OF OPTICAL FIELDS IN FIRES
Elena Visotskaja, Olga Kozina, Veronika Lachenova,
Olga Remaeva, Tatiana Remaeva
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p20.pdf
|
AN INVESTIGATION OF PROBLEM OF ARTIFICIAL NEURON NETWORKS ...
By: Igor Shostak, Valentina Davidenko
(4505 reads)
Rating:

(1.00/10)
|
Abstract. The problems of artificial neuron networks (ANN) applicability for forecasting of hazardous pollutants
(HP) discharge into the atmosphere are considered in this article. It is spoken in detail about existing approaches’
and methods’ advantages and disadvantages. The fundamental scheme of ANN usage for modelling is offered.
The scope of its applicability is described.
Keywords: emergency, artificial neuron networks, air pollution, gas dispersion.
ACM Classification Keywords: H.3.4 Systems and Software
Link:
AN INVESTIGATION OF PROBLEM OF ARTIFICIAL NEURON NETWORKS
APPLICABILITY FOR SOLUTION OF PROBLEM OF FORECASTING OF GAS
DISPERSION IN ATMOSPHERE
Igor Shostak, Valentina Davidenko
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p07.pdf
|
MULTICRITERION PROBLEMS ON THE COMBINATORIAL SET OF POLYARRANGEMENTS
By: Natalia Semenova, Lyudmyla Kolechkina
(5122 reads)
Rating:

(1.00/10)
|
Abstract: The multicriterion problem of discrete optimization on the feasible combinatorial set of
polyarrangements is examined. Structural properties of feasible region and different types of efficient decisions
are explored. On the basis of development of ideas of Euclidean combinatorial optimization and method of
general criterion possible approaches for the solution of multicriterion combinatorial problem on the set of
polyrrangements is developed and substantiated.
Keywords: multicriterion optimization, discrete optimization, polyarrangements, Pareto-optimal solution, weakly
and strongly efficient solutions, combinatorial set of polyarrangements.
ACM Classification Keywords: G 2.1 Combinatorics (F2.2), G 1.6 Optimization
Link:
MULTICRITERION PROBLEMS ON THE COMBINATORIAL SET OF POLYARRANGEMENTS
Natalia Semenova, Lyudmyla Kolechkina
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p15.pdf
|
METHODS OF SYNTHESIZING REVERSIBLE SPATIAL MULTIVALUED ...
By: Chetverikov et al.
(4784 reads)
Rating:

(1.00/10)
|
Abstract: The basic construction concepts of multivalued intellectual systems (MIS), which are adequate to
primal problems of person activity and using hybrid tools with many-valued coding are considered. The concepts
are agreed with the dialectic laws opened by a man and their manifestations in problems connected with creation
of identification systems prediction and recognition of imagery in which the interactive operational mode is a main
part of the whole complex of intellectual properties. The law of unity and struggle of contrasts changes and
alternation of coding indications of messages about objects in neurons of a brain - from space to temporal and
from two-place to multivalued.
Keywords: multivalued intellectual system, language systems, parallelism (spatial), AFP (algebra of finite
predicates ), AFP-structures, knowledge base, multiplevalued logic, multistate reversible element.
ACM Classification Keywords: I.2.4. Knowledge Represetation Formalisms and Methods.
Conference: The paper is selected from XVth International Conference “Knowledge-Dialogue-Solution” KDS-2 2009, Kyiv, Ukraine, October, 2009.
Link:
METHODS OF SYNTHESIZING REVERSIBLE SPATIAL MULTIVALUED
STRUCTURES OF LANGUAGE SYSTEMS
Grigoriy Chetverikov, Irina Leshchinskaya, Irina Vechirskaya
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p04.pdf
|
SAT-BASED METHOD OF VERIFICATION USING LOGARITHMIC ENCODING
By: Liudmila Cheremisinova, Dmitry Novikov
(3886 reads)
Rating:

(1.00/10)
|
Abstract: The problem under discussion is to check whether a given combinational network realizes a system of
incompletely specified Boolean functions. SAT-based procedure is discussed that formulates the overall problem
as conventional conjunctive normal form (CNF) on the basis of encoding of multiple-output cubes the Boolean
functions are specified on and checking whether the combinational network realizes them using a SAT solver.
The novel method is proposed that speeds up the SAT-based procedure due to suggested efficient procedure of
logarithmic encoding multiple-output cubes that allows reducing the number of variables to be additionally
introduced into the CNF under construction.
Keywords: design automation, verification, simulation, CNF satisfiability.
ACM Classification Keywords: B.6.2 Logic Design: Reliability and Testing; G.4 Mathematical Software:
Verification; B.6.2 Reliability and Testing: Error-checking.
Link:
SAT-BASED METHOD OF VERIFICATION USING LOGARITHMIC ENCODING
Liudmila Cheremisinova, Dmitry Novikov
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p14.pdf
|
PROCEDURES OF SEQUENTIAL ANALYSIS AND SIFTING OF VARIANTS
By: Pavlo Antosiak, Oleksij Voloshyn
(4796 reads)
Rating:

(1.00/10)
|
Abstract: This paper investigates the procedures of sequential analysis and sifting of unpromising variants after
restrictions and after the restriction on the goal function. On the basis of the modified procedure W and the
general scheme of sequential analysis, the algorithm of solving the linear ordering problem is developed for the
problems of discrete optimization.
Keywords: the linear ordering problem, the sequential analysis of variants.
ACM Classification Keywords: H.4.2 Information Systems Applications: Types of Systems: Decision Support.
Link:
PROCEDURES OF SEQUENTIAL ANALYSIS AND SIFTING OF VARIANTS
FOR THE LINEAR ORDERING PROBLEM
Pavlo Antosiak, Oleksij Voloshyn
http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p19.pdf
|
AGENT-BASED ANOMALIES MONITORING IN DISTRIBUTED SYSTEMS
By: Andrii Shelestov
(4113 reads)
Rating:

(1.00/10)
|
Abstract. In this paper an agent-based approach for anomalies monitoring in distributed systems such as
computer networks, or Grid systems is proposed. This approach envisages on-line and off-line monitoring in order
to analyze users’ activity. On-line monitoring is carried in real time, and is used to predict user actions. Off-line
monitoring is done after the user has ended his work, and is based on the analysis of statistical information
obtained during user’s work. In both cases neural networks are used in order to predict user actions and to
distinguish normal and anomalous user behavior.
Keywords: security, distributed systems, agent approach, neural networks.
ACM Classification Keywords: K.6.5 Security and Protection – Authentication, I.2.6 Learning - Connectionism
and neural nets, I.2.11 Distributed Artificial Intelligence - Multiagent systems.
Link:
AGENT-BASED ANOMALIES MONITORING IN DISTRIBUTED SYSTEMS
Andrii Shelestov
http://www.foibg.com/ijita/vol15/ijita15-4-p11.pdf
|
FUZZY SET THEORY APPROACH AS THE BASIS OF ANALYSIS ...
By: Alexander Kuzemin, Vyacheslav Lyashenko
(3837 reads)
Rating:

(1.00/10)
|
Abstract: The problems of formalization of the process of matching different management subjects’ functioning
characteristics obtained on the financial flows analysis basis is considered. Formal generalizations for gaining
economical security system knowledge bases elements are presented. One of feedback directions establishment
between knowledge base of the system of economical security and financial flows database analysis is
substantiated.
Keywords: financial flows, economical security, knowledge database, fuzzy sets.
ACM Classification Keywords: K.4.4 Electronic Commerce - Security; I.5.1 Pattern recognition Models –
Fuzzy set
Link:
FUZZY SET THEORY APPROACH AS THE BASIS OF ANALYSIS
OF FINANCIAL FLOWS IN THE ECONOMICAL SECURITY SYSTEM
Alexander Kuzemin, Vyacheslav Lyashenko
http://www.foibg.com/ijita/vol13/ijita13-1-p06.pdf
|
|
|