Menu
APPLYING THE CONCEPTS OF MULTI-AGENT APPROACH ...
By: Vadim Golembo, Alexey Botchkaryov  (4349 reads)
Rating: (1.00/10)

Abstract: The problem of development and application of the multiagent techniques for organizing mobile exploring agents' cooperative behavior is examined. The main problems related to design and operating of distributed decentralized homogeneous multi-agent systems with restricted local interaction between agents are analyzed. A number of collective behavior models (algorithmic, interpolational, entropic), which discover the problems of distributed decentralized exploration are proposed.

Keywords: multi-agent systems, distributed autonomous explorations, self-organization.

ACM Classification Keywords: I.2.11 Distributed Artificial Intelligence

Link:

APPLYING THE CONCEPTS OF MULTI-AGENT APPROACH TO THE DISTRIBUTED AUTONOMOUS EXPLORATIONS

Vadim Golembo, Alexey Botchkaryov

http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p19.pdf

OPTIMAL DESIGN OF INTELLIGENT CONTROL SYSTEMS OF STEAM TURBINE ...
By: Fedyanyna et al.  (4673 reads)
Rating: (1.00/10)

Abstract: One of the basic engineering problems of the automatic control systems synthesis for steam turbines is systems quality indices optimization task. The features of such task are defined by plenty of control systems structural parameters, complication of quality indices formalization and calculation, the systems models high order. The greatest difficulty of the control system synthesis is optimization models and methods design. The paper purpose is to develop models and methods for optimum design of the intelligent automatic control systems of atomic power station steam turbine using genetic algorithms. The steam turbine automatic control system is applied to stabilize turbine rotor frequency with high precision. The intelligent steam turbine control system includes a steam turbine, frequency sensor, intelligent frequency regulator, electro-hydraulic automatic drive and turbine adjusting valve. Input signals on an automatic drive can be given by the steam pressure regulator through the turbine management mechanism or by the electric power regulator. Assumptions substantiated to model the automatic control system and automatic drive as executive link of control system. The automatic drive diagram of principle includes electro-hydraulic transformer, sleeve valve, servomotor, position sensors and electronic part. In the paper were built the mathematical models of automatic drive and steam turbine, the models permanent parameters values were calculated, the mathematical models of the automatic control system were developed in state space with the intelligent frequency regulator, the regulator parameters were optimized with system quality indices using genetic algorithms.

Keywords: automatic control system, automatic drive, steam turbine, intelligent regulator, genetic algorithms.

ACM Classification Keywords: G.1.6 Optimization - Nonlinear programming

Link:

OPTIMAL DESIGN OF INTELLIGENT CONTROL SYSTEMS OF STEAM TURBINE USING GENETIC ALGORITHMS

Khrystyna Fedyanyna, Ievgeniia Kucher, Valery Severin

http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p15.pdf

NAVIGATION SOFTWARE OF AUTOMATED GUIDED VEHICLE
By: Magdalena Dobrzańska, Paweł Dobrzański  (4189 reads)
Rating: (1.00/10)

Abstract: In the article it has been presented the structure of the control system and measurement data processing of an automated guided vehicle. The basic navigation technique – odometry, which is applied in the automated guided vehicle, has been described, as well as connected with it errors of position tracing. Next the navigation software was shown which enables to design the trajectory of the vehicle movement as well as the registration and reading of the measurement data from the measurement sensors.

Keywords :Automated Guided Vehicle, navigation, odometry, odometry errors, Visual C++

ACM Classification Keywords: I.2.9 Robotics: Autonomous vehicles, Sensors, J.7 Computers in other systems

Link:

NAVIGATION SOFTWARE OF AUTOMATED GUIDED VEHICLE

Magdalena Dobrzańska, Paweł Dobrzański

http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p29.pdf

THE CASCADE GROWING NEURAL NETWORK USING QUADRATIC NEURONS ...
By: Bodyanskiy et al.  (4754 reads)
Rating: (1.00/10)

Abstract: New non-conventional system of the computational intelligence is proposed. It has growing structure similar to the Cascade-Correlation? Learning Architecture designed by S. E. Fahlman and C. Lebiere but differs from it in type of artificial neurons. Quadratic neurons are used as nodes in introduced architecture. These simple elements can be quickly adjusted using high-speed learning procedures. Proposed approach allows to reduce time required for weight coefficients adjustment and to decrease training dataset size in comparison with conventional neural networks. Also on-board realization of quadratic neuron is quite simple and therefore implementation of entire cascade architecture in hardware is very easy.

Keywords: artificial neural networks, constructive approach, quadratic neuron, real-time processing, online learning.

ACM Classification Keywords: I.2.6 Learning – Connectionism and neural nets.

Link:

THE CASCADE GROWING NEURAL NETWORK USING QUADRATIC NEURONS AND ITS LEARNING ALGORITHMS FOR ON-LINE INFORMATION PROCESSING

Yevgeniy Bodyanskiy, Yevgen Viktorov, Iryna Pliss

http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p03.pdf

ADAPTIVE GUSTAFSON-KESSEL FUZZY CLUSTERING ALGORITHM BASED ON ...
By: Bodyanskiy et al.  (8054 reads)
Rating: (1.00/10)

Abstract: The Gustafson-Kessel? fuzzy clustering algorithm is capable of detecting hyperellipsoidal clusters of different sizes and orientations by adjusting the covariance matrix of data, thus overcoming the drawbacks of conventional fuzzy c-means algorithm. In this paper, an adaptive version of the Gustafson-Kessel? algorithm is proposed. The way to adjust the covariance matrix iteratively is introduced by applying the Sherman-Morrison? matrix inversion procedure. The adaptive fuzzy clustering algorithm is implemented on the base of self-learning spiking neural network known as a realistic analog of biological neural systems that can perform fast data processing. Therefore, the proposed fuzzy spiking neural network that belongs to a new type of hybrid intelligent systems makes it possible both to perform fuzzy clustering tasks efficiently and to reduce data processing time considerably.

Keywords: computational intelligence, hybrid intelligent system, fuzzy clustering, adaptive Gustafson-Kessel? algorithm, self-learning spiking neural network, spiking neuron center, the temporal Hebbian learning.

ACM Classification Keywords: I.2.6 Artificial Intelligence: Learning – Connectionism and neural nets; I.5.1 Pattern Recognition: Models – Fuzzy set, Neural nets; I.5.3 Pattern Recognition: Clustering – Algorithms.

Link:

ADAPTIVE GUSTAFSON-KESSEL FUZZY CLUSTERING ALGORITHM BASED ON SELF-LEARNING SPIKING NEURAL NETWORK

Yevgeniy Bodyanskiy, Artem Dolotov, Iryna Pliss

http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p02.pdf

ORGANISATION OF DISABLED PERSONS’ TELEWORK AS PART OF PROCESS OF KNOWLEDGE ...
By: Tatjana Bilevičienė, Eglė Bilevičiūtė  (4285 reads)
Rating: (1.00/10)

Abstract: Challenges of knowledge society, knowledge economics change models of management. Work trends, organisational structures are changing. Most of knowledge management processes one way or another are connected with main elements of information management: information technologies and information systems. Knowledge management is new branch of management, the main purpose of that is bigger effectiveness of business applying synergy of humans, processes and technologies. Knowledge management helps for employees single-mindedly to create, share, collect, keep and practice the knowledge. Fundamentals of knowledge management could be used for organisation of telework of disabled persons, solving economical problems of state. Knowledge management could help to increase productiveness of employees, expanding sources of reachable for them knowledge. Improving shapes of disabled persons’ education the very important is to pay attention at how educational knowledge is implemented practically. Knowledge management should encourage employees to integrate such educational processes together with their work methods and to apply results of educational processes in their daily activities. For purposeful and beneficial education there should be forecasted what knowledge is the most important. Authors of article analyses the application of knowledge management methods in structure of professional rehabilitation of disabled persons, organising telework of disabled persons. During such process new knowledge should be used not only by disabled persons, but both represents of governmental institutions and consultants.

Keywords: knowledge society, disabled persons, telework.

ACM Classification Keywords: K.4.3. Computers and society - Computer-supported collaborative work

Link:

ORGANISATION OF DISABLED PERSONS’ TELEWORK AS PART OF PROCESS OF KNOWLEDGE MANAGEMENT

Tatjana Bilevičienė, Eglė Bilevičiūtė

http://www.foibg.com/ibs_isc/ibs-13/ibs-13-p09.pdf

INDIRECT SPATIAL DATA EXTRACTION FROM WEB DOCUMENTS
By: Blagoev et al.  (4363 reads)
Rating: (1.00/10)

Abstract: An approach for indirect spatial data extraction by learning restricted finite state automata from web documents created using Bulgarian language are outlined in the paper. It uses heuristics to generalize initial finite-state automata that recognizes only the positive examples and nothing else into automata that recognizes as larger language as possible without extracting any non-positive examples from the training data set. The learning method, program realization and experiments are presented. The investigation is carried out in accordance and following the rules of EU INSPIRE Network.

Keywords: Automatic Data Extraction, Restricted Finite State Automata, Web Documents, Indirect Spatial Data, INSPIRE network.

ACM Classification Keywords: H.2.8 Database Applications - Data mining; F.1.1 Models of Computation – Finite State Automata

Link:

INDIRECT SPATIAL DATA EXTRACTION FROM WEB DOCUMENTS

Dimitar Blagoev, George Totkov, Milena Staneva, Krassimira Ivanova, Krassimir Markov, Peter Stanchev

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p11.pdf

SIMULATION OF DNA CUTTING
By: Cisneros et al.  (4575 reads)
Rating: (1.00/10)

Abstract: The simulation of the main molecular operations used in DNA Computing can lead the researchers to develop complex algorithms and methods without the need of working with real DNA strands in-vitro. The purpose of this paper is to present a computer program which simulates a cutting process over DNA molecules which is an essential operation for the DNA computation. This simulation represents a useful tool for a virtual laboratory which is oriented to DNA computations. The results given by the software can show the behavior of a DNA cutting under certain set of restrictive enzymes to carry out the operation in-vitro efficiently.

Keywords: DNA Computing, DNA Simulation, Software Simulation, DNA operations, Bioinformatics.

ACM Classification Keywords: I.6. Simulation and Modelling, B.7.1 Advanced Technologies, J.3 Biology and Genetics

Link:

SIMULATION OF DNA CUTTING

Francisco José Cisneros, Andrés de la Peña, Cristina Piqueras, Paula Cordero, Juan Castellanos

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p01.pdf

MODELING LANGUAGE OF MULTI-AGENT SYSTEMS = PROGRAMMING TEMPLATE
By: Rubén Álvarez-González, Miguel Angel Díaz Martínez  (5237 reads)
Rating: (1.00/10)

Abstract: The modeling languages are designed to make easier the software development. That is why so many times they are included in the development methodology. In 2001 the OMG proposed model driver architecture for the software development (MDA). In this architecture are transformations which are used between the models to get others. The goal is to show a new way to develop applications using the Agents Oriented paradigm. To do it the MDA is showed and the methodology agent’s models are studied. There is no methodology which uses the transformations between the models, so the meta-models group and the transformations between them should be researched.

Keywords: MDA, OMG, Modeling Languages, Meta-Models?, Models, MAS, Agents, MDD, MDE.

ACM Classification Keywords: C.2.4 Distributed Systems - Distributed applications, D.2.11 Software Architectures – Languages.

Link:

MODELING LANGUAGE OF MULTI-AGENT SYSTEMS = PROGRAMMING TEMPLATE

Rubén Álvarez-González, Miguel Angel Díaz Martínez

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p03.pdf

PERFORMANCE ANALYSIS OF CALL ADMISSION CONTROL FOR STREAMING ...
By: Kassev et al.  (4904 reads)
Rating: (1.00/10)

Abstract: Admission control is a key issue for quality of service (QoS) provisioning in both wired and wireless communication networks. The call admission control (CAC) algorithm needs to know the source traffic characteristics and the required performance in order to determine whether the connection can be accepted or not and , if accepted, the amount of network resources to allocate. In this paper, we determine the CAC threshold value in case streaming homogeneous ON-OFF traffic flow is considered. An analytical method for packet loss probability evaluation is proposed and numerical examples are presented.

Keywords: streaming traffic, ON-OFF traffic model, call admission control, packet loss probability

ACM Classification Keywords: C.2.1 Network architecture and Design – Wireless communication, C.2.5 Local and Wide-Area? Networks – Access schemes

Link:

PERFORMANCE ANALYSIS OF CALL ADMISSION CONTROL FOR STREAMING TRAFFIC WITH ACTIVITY DETECTION FUNCTION

Kiril Kassev, Yakim Mihov, Boris Tsankov

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p06.pdf

ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ...
By: Dimitrina Polimirova, Eugene Nickolov  (4213 reads)
Rating: (1.00/10)

Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to and within it, is made. Main techniques for accomplishing an attack to virtual environment are pointed and real virtual attacks and successful virtual attacks are examined. An analysis of accomplished attacks is made and percent distribution of real virtual attacks and successful virtual attack is graphically illustrated. Respective assessments and recommendations for future investigation are made.

Keywords: Virtual Machine Environment, Virtual Environment, Attack/Attack tools, Defense/Defense tools, Malicious Code

ACM Classification Keywords: D.4.6 Security and Protection: Invasive software (e.g., viruses, worms, Trojan horses)

Link:

ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT

Dimitrina Polimirova, Eugene Nickolov

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p07.pdf

PROGNOSTICATION OF EFFICIENCY OF MEDICAL AND PROPHYLACTIC ...
By: Samura et al.  (4772 reads)
Rating: (1.00/10)

Abstract: This article is devoted to the questions of prognostication of efficiency medical and prophylactic measures at renewal of the broken equilibrium of human organism by vegetable medications. The methods of modeling of different processes are considered in the article from position of systems analysis. There was chosen Markov processes theory for description of renewal of the broken homoeostasis process, which rotined high correlation between clinical supervisions and forecast process.

Keywords: casual process, Markov chains, medical and prophylactic measures, MAIS, MFPS.

ACM Classification Keywords: I.6 Simulation and modeling, I.6.3 Applications; J.3 Life and medical sciences – Medical information systems

Link:

PROGNOSTICATION OF EFFICIENCY OF MEDICAL AND PROPHYLACTIC MEASURES AT DIFFERENT HOMOEOSTASIS VIOLATION OF HUMAN ORGANISM BY MARKOV PROCESSES THEORY

Boris Samura, Anatoly Povoroznuk, Olga Kozina, Elena Visotskaja, Elena Chernykh, Nikolay Shukin, Andrei Porvan

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p10.pdf

MULTI-MODAL EMOTION RECOGNITION – MORE "COGNITIVE" MACHINES
By: Slavova et al.  (5125 reads)
Rating: (1.00/10)

Abstract: Based on several results related to studies on emotions, we suggest that the process of emotionrecognition is assisted by some internal structure of the cognitive images of emotions, which are at different levels of knowledge representation. We concede that the main proposed in psychology models are in correspondence with these levels and in this sense - complementary. We summarize the state-of-the-art of machine emotion recognition with regards of the used psychological models of emotions. In order to discover amelioration sources of multimodal machine emotion recognition, we propose a scheme of the cognitive process, based on gradual levels of representation. The proposed scheme shows several "strategic" differences with the architectures used in machine emotion recognition. We discuss the questions related to recognition, assisted by two levels of representation that we called "perceptual" and "conceptual".

ACM Classification Keywords: I.2 Artificial Intelligence, 1.2.0.Cognitive simulation

Link:

MULTI-MODAL EMOTION RECOGNITION – MORE "COGNITIVE" MACHINES

Velina Slavova, Hichem Sahli, Werner Verhelst

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p09.pdf

EULERPATHSOLVER: A NEW APPLICATION FOR FLEURY’S ALGORITHM SIMULATION
By: Torrubia et al.  (6248 reads)
Rating: (1.00/10)

Abstract: EulerPathSolver? is a new application, that meets eMathTeacher specifications and simulates Fleury’s algorithm execution. The application runs in a Java Web Start Window and features an animation of the algorithm code, a framework working panel showing the algorithm structures and allowing their manipulation, Pop-up questions, language selector and, save/load options together with the interactive simulation within automatic correction of the user’s inputs. It has been designed with the main purpose of supporting active learning as well as being a good aid for teachers when explaining the algorithm process. EulerPathSolver? enhances dramatically the old Fleury’s Algorithm tutorial designed by the authors and will be a great partner when learning Fleury’s Algorithm.

Keywords: eMathTeacher, eLearning, active learning, interactive Java applications, discrete mathematics learning, algorithm visualization.

ACM Classification Keywords: K.3.1 Computers and Education: Computer Uses in Education – computerassisted instruction (CAI), distance learning. K.3.2 Computers and Education: Computer and Information Science Education – computer science education, self-assessment. G.2.2 Discrete Mathematics: Graph Theory – graph algorithms, path and circuit problems.

Link:

EULERPATHSOLVER: A NEW APPLICATION FOR FLEURY’S ALGORITHM SIMULATION

Gloria Sánchez–Torrubia?, Carmen Torres–Blanc?, Leila Navascués-Galante?

http://www.foibg.com/ibs_isc/ibs-14/ibs-14-p13.pdf

THE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS
By: Yuriy Zaychenko  (5831 reads)
Rating: (1.00/10)

Abstract: The problem of forecasting models constructing using experimental data in terms of fuzziness, when input variables are not known exactly and determined as intervals of uncertainty is considered in this paper. The fuzzy group method of data handling is proposed to solve this problem. The mathematical model of the problem mentioned above is built and fuzzy GMDH with fuzzy inputs is elaborated in the paper. The corresponding program which uses the suggested algorithm was developed. The experimental investigations and comparison of FGMDH with neural nets in problems of stock prices forecasting were carried out and presented in this paper.

Keywords Group Method of Data Handling, fuzzy, economic indexes, stock prices, forecasting

ACM Classification Keywords: H.4.2 Information Systems Applications Types of Systems - Decision support

Link:

THE FUZZY GROUP METHOD OF DATA HANDLING WITH FUZZY INPUTS

Yuriy Zaychenko

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p28.pdf

THEORETIC-EXPERIMENTAL MULTICRITERIA METHOD FOR NEURAL NETWORK ...
By: Voronin et al.  (4520 reads)
Rating: (1.00/10)

Abstract: The problem state and multicriteria optimization procedure of neural network classifier’s architecture is considered. The scalar convolution of criteria with nonlinear trade-off scheme is offered as a goal function. The search methods of optimization with discrete arguments are used. The neural network classifier of texts as an example is given.

Keywords: multicriteria optimization, neural nets, classifier.

ACM Classification Keywords: H.1 Models and Principles – H.1.1 – Systems and Information Theory; H.4.2 – Types of Systems; C.1.3 Other Architecture Styles – Neural nets

Link:

THEORETIC-EXPERIMENTAL MULTICRITERIA METHOD FOR NEURAL NETWORK CLASSIFIERS’ ARCHITECTURE

Albert Voronin, Yuriy Ziatdinov, Anna Antonyuk

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p06.pdf

COLLECTIVE PRODUCT COST SHARING IN CONDITIONS OF MANAGED ECONOMY
By: Olexij Voloshin, Vasyl Laver  (4625 reads)
Rating: (1.00/10)

Abstract: The collective product cost-sharing problems in the conditions of the managed economy are being observed. The fuzzy generalization and “dual” approach to the solution of this problem is offered.

Keywords: decision making, cost-sharing, regulated monopoly.

ACM Classification Keywords: H.4.2 Information Systems Applications: Types of Systems: Decision Support.

Link:

COLLECTIVE PRODUCT COST SHARING IN CONDITIONS OF MANAGED ECONOMY

Olexij Voloshin, Vasyl Laver

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p27.pdf

STATISTICAL MODELING OF SPREAD OF OPTICAL FIELDS IN FIRES
By: Visotskaja et al.  (4183 reads)
Rating: (1.00/10)

Abstract: Application of Monte-Carlo? method for determination of optical radiation flow density of forest fires in a cloudless atmosphere with dependence on optic-geometrical parameters of surface’s relief for the case of multi and single scattering is offered in this work. The use of initial directions of photon trajectory, free path length of the photon, coordinates of interact points between the photon and environment, also probabilities of photon’s getting to a receiver into the statistical modeling of direction of distribution of optical radiation of fires is proposed.

Keywords: Monte-Carlo? method, photon trajectory, radiation transfer.

ACM Classification Keywords: I.6 Simulation and Modeling. I.6.8 Types of Simulation - Monte Carlo.

Link:

STATISTICAL MODELING OF SPREAD OF OPTICAL FIELDS IN FIRES

Elena Visotskaja, Olga Kozina, Veronika Lachenova, Olga Remaeva, Tatiana Remaeva

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p20.pdf

AN INVESTIGATION OF PROBLEM OF ARTIFICIAL NEURON NETWORKS ...
By: Igor Shostak, Valentina Davidenko  (4505 reads)
Rating: (1.00/10)

Abstract. The problems of artificial neuron networks (ANN) applicability for forecasting of hazardous pollutants (HP) discharge into the atmosphere are considered in this article. It is spoken in detail about existing approaches’ and methods’ advantages and disadvantages. The fundamental scheme of ANN usage for modelling is offered. The scope of its applicability is described.

Keywords: emergency, artificial neuron networks, air pollution, gas dispersion.

ACM Classification Keywords: H.3.4 Systems and Software

Link:

AN INVESTIGATION OF PROBLEM OF ARTIFICIAL NEURON NETWORKS APPLICABILITY FOR SOLUTION OF PROBLEM OF FORECASTING OF GAS DISPERSION IN ATMOSPHERE

Igor Shostak, Valentina Davidenko

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p07.pdf

MULTICRITERION PROBLEMS ON THE COMBINATORIAL SET OF POLYARRANGEMENTS
By: Natalia Semenova, Lyudmyla Kolechkina  (5122 reads)
Rating: (1.00/10)

Abstract: The multicriterion problem of discrete optimization on the feasible combinatorial set of polyarrangements is examined. Structural properties of feasible region and different types of efficient decisions are explored. On the basis of development of ideas of Euclidean combinatorial optimization and method of general criterion possible approaches for the solution of multicriterion combinatorial problem on the set of polyrrangements is developed and substantiated.

Keywords: multicriterion optimization, discrete optimization, polyarrangements, Pareto-optimal solution, weakly and strongly efficient solutions, combinatorial set of polyarrangements.

ACM Classification Keywords: G 2.1 Combinatorics (F2.2), G 1.6 Optimization

Link:

MULTICRITERION PROBLEMS ON THE COMBINATORIAL SET OF POLYARRANGEMENTS

Natalia Semenova, Lyudmyla Kolechkina

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p15.pdf

METHODS OF SYNTHESIZING REVERSIBLE SPATIAL MULTIVALUED ...
By: Chetverikov et al.  (4784 reads)
Rating: (1.00/10)

Abstract: The basic construction concepts of multivalued intellectual systems (MIS), which are adequate to primal problems of person activity and using hybrid tools with many-valued coding are considered. The concepts are agreed with the dialectic laws opened by a man and their manifestations in problems connected with creation of identification systems prediction and recognition of imagery in which the interactive operational mode is a main part of the whole complex of intellectual properties. The law of unity and struggle of contrasts changes and alternation of coding indications of messages about objects in neurons of a brain - from space to temporal and from two-place to multivalued.

Keywords: multivalued intellectual system, language systems, parallelism (spatial), AFP (algebra of finite predicates ), AFP-structures, knowledge base, multiplevalued logic, multistate reversible element.

ACM Classification Keywords: I.2.4. Knowledge Represetation Formalisms and Methods. Conference: The paper is selected from XVth International Conference “Knowledge-Dialogue-Solution” KDS-2 2009, Kyiv, Ukraine, October, 2009.

Link:

METHODS OF SYNTHESIZING REVERSIBLE SPATIAL MULTIVALUED STRUCTURES OF LANGUAGE SYSTEMS

Grigoriy Chetverikov, Irina Leshchinskaya, Irina Vechirskaya

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p04.pdf

SAT-BASED METHOD OF VERIFICATION USING LOGARITHMIC ENCODING
By: Liudmila Cheremisinova, Dmitry Novikov  (3886 reads)
Rating: (1.00/10)

Abstract: The problem under discussion is to check whether a given combinational network realizes a system of incompletely specified Boolean functions. SAT-based procedure is discussed that formulates the overall problem as conventional conjunctive normal form (CNF) on the basis of encoding of multiple-output cubes the Boolean functions are specified on and checking whether the combinational network realizes them using a SAT solver. The novel method is proposed that speeds up the SAT-based procedure due to suggested efficient procedure of logarithmic encoding multiple-output cubes that allows reducing the number of variables to be additionally introduced into the CNF under construction.

Keywords: design automation, verification, simulation, CNF satisfiability.

ACM Classification Keywords: B.6.2 Logic Design: Reliability and Testing; G.4 Mathematical Software: Verification; B.6.2 Reliability and Testing: Error-checking.

Link:

SAT-BASED METHOD OF VERIFICATION USING LOGARITHMIC ENCODING

Liudmila Cheremisinova, Dmitry Novikov

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p14.pdf

PROCEDURES OF SEQUENTIAL ANALYSIS AND SIFTING OF VARIANTS
By: Pavlo Antosiak, Oleksij Voloshyn  (4796 reads)
Rating: (1.00/10)

Abstract: This paper investigates the procedures of sequential analysis and sifting of unpromising variants after restrictions and after the restriction on the goal function. On the basis of the modified procedure W and the general scheme of sequential analysis, the algorithm of solving the linear ordering problem is developed for the problems of discrete optimization.

Keywords: the linear ordering problem, the sequential analysis of variants.

ACM Classification Keywords: H.4.2 Information Systems Applications: Types of Systems: Decision Support.

Link:

PROCEDURES OF SEQUENTIAL ANALYSIS AND SIFTING OF VARIANTS FOR THE LINEAR ORDERING PROBLEM

Pavlo Antosiak, Oleksij Voloshyn

http://www.foibg.com/ibs_isc/ibs-15/ibs-15-p19.pdf

AGENT-BASED ANOMALIES MONITORING IN DISTRIBUTED SYSTEMS
By: Andrii Shelestov  (4113 reads)
Rating: (1.00/10)

Abstract. In this paper an agent-based approach for anomalies monitoring in distributed systems such as computer networks, or Grid systems is proposed. This approach envisages on-line and off-line monitoring in order to analyze users’ activity. On-line monitoring is carried in real time, and is used to predict user actions. Off-line monitoring is done after the user has ended his work, and is based on the analysis of statistical information obtained during user’s work. In both cases neural networks are used in order to predict user actions and to distinguish normal and anomalous user behavior.

Keywords: security, distributed systems, agent approach, neural networks.

ACM Classification Keywords: K.6.5 Security and Protection – Authentication, I.2.6 Learning - Connectionism and neural nets, I.2.11 Distributed Artificial Intelligence - Multiagent systems.

Link:

AGENT-BASED ANOMALIES MONITORING IN DISTRIBUTED SYSTEMS

Andrii Shelestov

http://www.foibg.com/ijita/vol15/ijita15-4-p11.pdf

FUZZY SET THEORY APPROACH AS THE BASIS OF ANALYSIS ...
By: Alexander Kuzemin, Vyacheslav Lyashenko  (3837 reads)
Rating: (1.00/10)

Abstract: The problems of formalization of the process of matching different management subjects’ functioning characteristics obtained on the financial flows analysis basis is considered. Formal generalizations for gaining economical security system knowledge bases elements are presented. One of feedback directions establishment between knowledge base of the system of economical security and financial flows database analysis is substantiated.

Keywords: financial flows, economical security, knowledge database, fuzzy sets.

ACM Classification Keywords: K.4.4 Electronic Commerce - Security; I.5.1 Pattern recognition Models – Fuzzy set

Link:

FUZZY SET THEORY APPROACH AS THE BASIS OF ANALYSIS OF FINANCIAL FLOWS IN THE ECONOMICAL SECURITY SYSTEM

Alexander Kuzemin, Vyacheslav Lyashenko

http://www.foibg.com/ijita/vol13/ijita13-1-p06.pdf

[prev]  Page: 53.6/66  [next]
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66 
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.16 secs ]   [ Memory usage: 7.55MB ]   [ GZIP Disabled ]   [ Server load: 0.35 ]