2017 Computer Science and Information Technologies (CSIT)最新文献

筛选
英文 中文
Modeling dynamic single-cell and coupling faults via automata models 利用自动机模型对动态单细胞故障和耦合故障进行建模
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/csitechnol.2017.8312142
D. Hayrapetyan, A. Manukyan
{"title":"Modeling dynamic single-cell and coupling faults via automata models","authors":"D. Hayrapetyan, A. Manukyan","doi":"10.1109/csitechnol.2017.8312142","DOIUrl":"https://doi.org/10.1109/csitechnol.2017.8312142","url":null,"abstract":"The main purpose of this paper is to introduce a new method of static and dynamic fault representation with the help of deterministic finite automata (DFA) formalization. This method can be used during memory behavior simulation at register transfer level.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121035027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A multi-user and multi-purpose CA simulator 一个多用户和多用途CA模拟器
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312133
H. Nahapetyan, J. Jessel, S. Poghosyan, Yu. H. Shoukourian
{"title":"A multi-user and multi-purpose CA simulator","authors":"H. Nahapetyan, J. Jessel, S. Poghosyan, Yu. H. Shoukourian","doi":"10.1109/CSITECHNOL.2017.8312133","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312133","url":null,"abstract":"In this paper, a software package for cellular automata simulation, 2D/3D visualization with a shared work support system was introduced, that was designed considering the needs of researchers in both local and virtual laboratories. As an example of cellular automata, abelian sandpile model has been chosen. An appropriate software package has been developed using Microsoft .Net and C# enabling users to work at the same time on the same models independent of the geographical location of users within the public network.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Volterra polynomials in the intelligent control system of wind power plant operation Volterra多项式在风电场运行智能控制系统中的应用
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312157
S. Solodusha, I. Orlova
{"title":"Volterra polynomials in the intelligent control system of wind power plant operation","authors":"S. Solodusha, I. Orlova","doi":"10.1109/CSITECHNOL.2017.8312157","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312157","url":null,"abstract":"The paper is focused on the possibility of integrating situation control and simulation modeling based on the Volterra integro-power series when describing transient processes in a nonlinear dynamic object of input-output type. A reference object was represented by a model of horizontal-axis wind turbine. The research deals with nonlinear dynamics of a rotation speed of wind turbine components depending on the blade angle and wind speed. A two-level technology is applied to prevent emergency situations. It consists of a quantitative analysis and a qualitative analysis. The first level is implemented using the situation analysis tools based on semantic modeling. At the second level the simulation modeling is performed. An algorithm for construction of a set of current situations in the semantic model is based on the Volterra polynomial integral equations. The Newton-Kantorovich method was applied to develop an iterative method to approximately solve respective nonlinear equations. The paper demonstrates the specific features of numerically solving the studied equations with a fixed length of mantissa in machine representation of a floating-point number.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy string matching with finite automat 有限自动模糊字符串匹配
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/csitechnol.2017.8312128
A. Kostanyan
{"title":"Fuzzy string matching with finite automat","authors":"A. Kostanyan","doi":"10.1109/csitechnol.2017.8312128","DOIUrl":"https://doi.org/10.1109/csitechnol.2017.8312128","url":null,"abstract":"The string matching problem is one of the widely-known symbolic computation problems having applications in many areas of artificial intelligence. The most famous algorithms solving the string matching problem are the finite automata method, Knuth-Morris-Pratt and Rabin-Karp's algorithms. In this paper we focus on applying the finite automata method to find a fuzzy pattern in a text.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel approach to background-text-nontext separation in ancient degraded document images 古代退化文档图像背景-文本-非文本分离的新方法
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312161
D. Asatryan, Grigor Sazhumyan, Lusine Aznauryan
{"title":"Novel approach to background-text-nontext separation in ancient degraded document images","authors":"D. Asatryan, Grigor Sazhumyan, Lusine Aznauryan","doi":"10.1109/CSITECHNOL.2017.8312161","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312161","url":null,"abstract":"Nowadays lots of handwritten and printed ancient documents needs to perform to digitized form for automated processing and analysis. In this paper, an approach to background-text-nontext separation procedure based on differences of presented in a document image objects sizes which can be obtained by binarization and segmentation algorithms, is proposed. After binarization by a proper method, it is segmented and the distribution of segments sizes is obtained. It is assumed that the three types of objects presented in an image have significantly different sizes; therefore, the problem of separation comes to discrimination of the set of segments into three groups. The thresholds for the separation of these groups can be found by minimizing the intrasample variation which is used in discriminant analysis. Some examples of images from the Matenadaran collection are considered and the separated parts of the image are illustrated and interpreted.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Belousov quasigroups and bigroups 关于Belousov准群和大群
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312132
Yu. M. Movsisyan
{"title":"On Belousov quasigroups and bigroups","authors":"Yu. M. Movsisyan","doi":"10.1109/CSITECHNOL.2017.8312132","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312132","url":null,"abstract":"In this paper we characterize the variety of Belousov quasigroups by bigroups and finite fields.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116192862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization of behavioral aspects of AADL-models aadl模型行为方面的可视化
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312147
S. Zelenov, D. Buzdalov
{"title":"Visualization of behavioral aspects of AADL-models","authors":"S. Zelenov, D. Buzdalov","doi":"10.1109/CSITECHNOL.2017.8312147","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312147","url":null,"abstract":"In the paper, we describe a metamodel to represent dynamics of AADL-models. The metamodel allows to visualize step-by-step a process of models' behavioral aspects analysis. In particular, it essentially helps to debug behavioral specifications. In the paper, we consider examples of the metamodel usage to represent dynamics for the following two aspects of AADL-models: 1) simulation of a modelled system on the basis of a Behavior Annex specification; 2) failure modes and effects analysis on the basis of an Error Model Annex specification. We also present a stepwise visualization tool (engine and applications for both mentioned examples) that is implemented in MASIW framework for design of modern avionics systems.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129434511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reachability confirmation of statically detected defects using dynamic analysis 利用动态分析确定静态检测缺陷的可达性
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312141
A. Gerasimov, L. Kruglov
{"title":"Reachability confirmation of statically detected defects using dynamic analysis","authors":"A. Gerasimov, L. Kruglov","doi":"10.1109/CSITECHNOL.2017.8312141","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312141","url":null,"abstract":"Static and dynamic analysis of programs are well known approaches to the problem of automatic program behaviour analysis. Both methods have advantages and limitations. Static analysis has lack of precision for the sake of scalability. On the other hand, dynamic analysis has 100% precision while reaching defect point, but suffers from scalability issues. This paper describes an approach to confirmation of reachability of source-sink defects that were found by static analysis with help of dynamic analysis. The combination of methods allows to circumvent limitations and multiply their advantages. Preliminary experiments on several open source projects show that real true positive defects can be confirmed to be reachable using the approach and some false positives can be proved.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Functional system of the fuzzy constructive logic 模糊构造逻辑的功能系统
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312135
I. Zaslavsky
{"title":"Functional system of the fuzzy constructive logic","authors":"I. Zaslavsky","doi":"10.1109/CSITECHNOL.2017.8312135","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312135","url":null,"abstract":"The principles of constructive mathematics are applied to the fuzzy constructive logic. The preceding results of the author in fuzzy constructive logic are generalized for predicate formulas including (in general) functional symbols and symbols of constants. The constructive (intuitionistic) predicate calculus on the base of such formulas is considered; it is denoted by H(fcon). The notion of identically f-true predicate formula is introduced. It is proved that any predicate formula deducible in H(fcon) is identically f-true.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130826781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mechanism of row redundancy sharing for reparable memory systems 可修复内存系统的行冗余共享机制
2017 Computer Science and Information Technologies (CSIT) Pub Date : 2017-09-01 DOI: 10.1109/CSITECHNOL.2017.8312140
K. Amirkhanyan, S. Shoukourian, V. Vardanian
{"title":"A mechanism of row redundancy sharing for reparable memory systems","authors":"K. Amirkhanyan, S. Shoukourian, V. Vardanian","doi":"10.1109/CSITECHNOL.2017.8312140","DOIUrl":"https://doi.org/10.1109/CSITECHNOL.2017.8312140","url":null,"abstract":"In this paper, we proposed a method for implementation of a mechanism for “redundancy sharing” allowing to repair a fault/defect in a memory instance from a memory system with hundreds/thousands of memory instances with an available shared redundant element of another memory instance in the same group of the Memory System that has been preliminarily grouped with respect to its main parameters, e.g. clock, power and position of instances. The calculations showed that the hardware is saved to a great extent with a negligible impact on memory's functional performance. Not only excluded redundancies contribute in the area saving but also reduction of the redundancy registers due to reduction of redundancies, as well as reduction of the control logic and the number of necessary fuses.","PeriodicalId":332371,"journal":{"name":"2017 Computer Science and Information Technologies (CSIT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信