The quadripartitioned neutrosophic set is the partition of indeterminacy function of the neutrosophic set into contradiction part and ignorance part. In this work, the concept of quadripartitioned neutrosophic graph s...
详细信息
Dominance constraints are logical tree descriptions originating from automata theory that have multiple applications in computational linguistics. The satisfiability problem of dominance constraints is NP-complete. In...
ISBN:
(纸本)9780898714906
Dominance constraints are logical tree descriptions originating from automata theory that have multiple applications in computational linguistics. The satisfiability problem of dominance constraints is NP-complete. In most applications, however, only normal dominance constraints are used. The satisfiability problem of normal dominance constraints can be reduced in linear time to the configuration problem of dominance graphs, as shown recently. In this paper, we give a polynomial time algorithm testing configurability of dominance graphs (and thus satisfiability of normal dominance constraints). Previous to our work no polynomial time algorithms were known.
Different researches have shown that long–term exposure to whole–body vibration can induce different injuries like back pain, injuries of the different part of the body, disturbing the physical and intellectual acti...
The biodynamic responses of seated occupants exposed to whole-body vibration have been mostly investigated in terms of apparent mass characteristics, which show negligible contributions due to exposure level. Consider...
Abstract-The article presents the history of the development of sports programming as a sport in Russia. The main stages of the formation of the legislative basis for this sport are given. The rationale and descriptio...
详细信息
ISBN:
(数字)9798350353532
ISBN:
(纸本)9798350353549
Abstract-The article presents the history of the development of sports programming as a sport in Russia. The main stages of the formation of the legislative basis for this sport are given. The rationale and description of the process of training athletes in higher education institutions are given - possible traj ectories in the disciplines of “algorithmic programming” and “product programming”, the influence of the development of sports programming on improving the quality of IT education. As an example, the organization of training students in the discipline of “algorithmic programming” at the Lipetsk State Technical University is given. The activities of the Lipetsk regional branch of the All- Russian Sports Federation to popularize this sport including among students are also described.
The goal of Partitioned Global Address Space (PGAS) languages is to improve programmer productivity in large scale parallel machines. However, PGAS programs may have many fine-grained shared accesses that lead to perf...
详细信息
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site “Beech forests of the Carpathians and ancient beech forests of Germany” usin...
详细信息
ISBN:
(数字)9781728167602
ISBN:
(纸本)9781728167619
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site “Beech forests of the Carpathians and ancient beech forests of Germany” using actual data and information from Gorgany Nature Reserve in Ivano-Frankivsk, Ukraine. The features of the structure and functions of background monitoring of the protected natural resources, forests and wildlife of Gorgany Nature Reserve is based on modern methods of collecting and processing of digital data, implementation of the principles of Internet of Things and cloud technologies, combined with GPS-systems, sensor networks with the use of optical and fiber-optic telecommunication channels. The information technology of the background monitoring system is based on figurative cluster models of monitoring objects according to theoretical principles of statistical, correlatory, spectral, cluster, logic-statistical and entropy analysis.
This study proposes a novel approach to fuzzy N-soft sets for handling cases where membership degree and grade are not related. In the standard model of fuzzy N-soft sets, membership degree and grade are assumed to be...
详细信息
The safety of software is becoming increasingly important as computers pervade control systems on which human life depends. Whilst hardware has become significantly more reliable over the years, the same cannot be sai...
详细信息
The safety of software is becoming increasingly important as computers pervade control systems on which human life depends. Whilst hardware has become significantly more reliable over the years, the same cannot be said of software. This has become more complex and methods to ensure its correctness have been slow in development. One approach is to mathematically verify software in such systems. This paper investigates the industrial use of these techniques, their advantages and disadvantages, and the introduction of standards and their recommendations concerning formal methods in this area. The cost of safety is also considered.
The paper describes a general automated method for synthesizing the design of both the topology and parameter values for controllers. The automated method automatically makes decisions concerning the total number of p...
详细信息
The paper describes a general automated method for synthesizing the design of both the topology and parameter values for controllers. The automated method automatically makes decisions concerning the total number of processing blocks to be employed in the controller, the type of each block, the topological interconnections between the blocks, the values of all parameters for the blocks, and the existence, if any, of internal feedback between the blocks of the overall controller. Incorporation of time-domain, frequency-domain, and other constraints on the control or state variables (often analytically intractable using conventional methods) can be readily accommodated. The automatic method described in the paper (genetic programming) is applied to a problem of synthesizing the design of a robust controller for a plant with a second-order lag. A textbook PID compensator preceded by a lowpass pre-filter delivers credible performance on this problem. However, the automatically created controller employs a second derivative processing block (in addition to proportional, integrative, and derivative blocks and a pre-filter). It is better than twice as effective as the textbook controller as measured by the integral of the time-weighted absolute error, has only two-thirds of the rise time in response to the reference (command) input, and is 10 times better in terms of suppressing the effects of disturbance at the plant input.
暂无评论