Results 31 to 40 of about 733,243 (331)
Design of n-Bit Adder without Applying Binary to Quaternary Conversion [PDF]
Microprocessor has been considered as most important part in ICs manufacturing and making progress since more than 50 years, so increasing microprocessor speed is paid attention in all technologies.
Walaa Khalaf +2 more
doaj +1 more source
Bounds of non-monotone complexity for the multi-valued logic functions
The non-monotone complexity of realization of k-valued logic functions by circuits in a special basis was investigated. The basis consists of elements of two types: the first type comprises all monotone functions (with respect to the order 0 < 1 < 2
V.V. Kochergin, A.V. Mikhailovich
doaj +1 more source
Interval-Valued General Residuated Lattice-Ordered Groupoids and Expanded Triangle Algebras
As an extension of interval-valued pseudo t-norms, interval-valued pseudo-overlap functions (IPOFs) play a vital role in solving interval-valued multi-attribute decision making problems.
Xiaohong Zhang, Rong Liang
doaj +1 more source
Optimization theory has advanced considerably during the last three decades, as illustrated by a vast number of published books, surveys, and papers concerning this subject. However, for optimization of complex systems that may not be modeled exactly by
Chi Tran
doaj
Learning relational dynamics of stochastic domains for planning [PDF]
Probabilistic planners are very flexible tools that can provide good solutions for difficult tasks. However, they rely on a model of the domain, which may be costly to either hand code or automatically learn for complex tasks.
Alenyà Ribas, Guillem +4 more
core +1 more source
A study of fuzzy and many-valued logics in cellular automata
In this paper we provide an analytical study of the theory of multi-valued and fuzzy cellular automata where the fuzziness appears as the result of the application of an underlying multi-valued or continuous logic as opposed to standard logic as used ...
Mingarelli, Angelo B.
core +3 more sources
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control [PDF]
The study of canonically complete attribute-based access control (ABAC) languages is relatively new. A canonically complete language is useful as it is functionally complete and provides a "normal form" for policies. However, previous work on canonically
Crampton, Jason, Williams, Conrad
core +2 more sources
Proposal for the Formalization of Dialectical Logic
Classical logic is typically concerned with abstract analysis. The problem for a synthetic logic is to transcend and unify available data to reconstruct the object as a totality. Three rules are proposed to pass from classic logic to synthetic logic.
José Luis Usó-Doménech +2 more
doaj +1 more source
This article presents the problem of diagnostic examination by the (DIAG) diagnostic system of devices of the House on Water (HoW) hybrid electric power system in the multi-valued (2, 3, and 4) state assessment.
Stanisław Duer +4 more
doaj +1 more source
Reasoning about Temporal Context using Ontology and Abductive Constraint Logic Programming [PDF]
The underlying assumptions for interpreting the meaning of data often change over time, which further complicates the problem of semantic heterogeneities among autonomous data sources.
A.C. Kakas +7 more
core +2 more sources

