A Computational Model for Inference Chains in Expert Systems

Size: px
Start display at page:

Download "A Computational Model for Inference Chains in Expert Systems"

Transcription

1 A Comptational Moel for Inference Chains in Expert Systems József Sziray Department of Informatics Széchenyi University Egyetem tér, H-926 Győr Hngary Abstract: This paper eals with the calclations performe in the reasoning process of rle-base expert systems, where inference chains are applie. It presents a logic moel for representing the rles an the rle base of a given system. Also, the fact base of the same expert system is involve in the logic moel. The propose eqivalent representation manifests itself in a logic network. After that, a for-vale logic algebra is introce. This algebra is se for the calclations where forwar chaining is carrie ot. Next, the notion of line-vale jstification is escribe. This operation is applie in the backwar chaining process, also on the base of the previosly introce for-vale logic. The paper escribes two exact algorithms which serve for the forwar an backwar chaining processes. These algorithms make it possible to be implemente by a compter program, reslting in an efficient inference engine of an expert system. The achieve reslt enhances the reliability an sability of the intelligent software systems which is extremely important in embee environments. I. INTRODUCTION The application area of embee systems an the relate economical an reliability reqirements imply a specific harware-software strctre that is significantly ifferent from the resorces available in moern high-en systems. The relatively low processing performance, small memory space an the safety prescriptions have reslte in varios architectral properties an programming soltions. In case of real-time safety-critical systems the reaction time for the external events is a key isse. It means that the spee of the calclations is a critical factor. On the other han, the same applies to the memory consmption []. In many cases, artificial intelligence is realize within the frames of expert systems. This approach has gaine a wie-sprea se in controlling railway stations, angeros chemical processes, airplane flights, meical systems, etc. These applications are eqally relate to safety-oriente systems. As known, the most common form of storing knowlege in expert systems is the se of rles. It means that the knowlege base (long-term memory) consists of rles an facts. The other component of sch an expert system is the inference engine which is the most important factor for a sccessfl operation. An inference engine sally works in a fixe manner, for example, it col be esigne as either ata riven (i.e., forwar reasoning or forwar chaining) or goal riven (i.e., backwar reasoning or backwar chaining), however, most of the moern systems may well se both ways of reasoning [2]-[4]. The major concern relate to the inference processes is their excessive comptational amont. The algorithmic complexity erives from the fact that the task to be solve belongs to the so-calle NP-complete problems. As known, NP-complete problems have a comptational complexity for which there exists no pper bon by a finite-egree polynomial of the problem size. It means actally that the nmber of the comptational steps is finite, bt npreictable [5]-[7]. Here the problem size can be expresse by the nmber of rles in the knowlege base. De to the escribe featres of the comptations, the exection spee of the software is a crcial factor. This paper eals with the calclations performe in the reasoning process of rle-base expert systems, where inference chains are applie. It presents a logic moel for representing the rles an the rle base of a given system. Also, the fact base of the same expert system is involve in the logic moel. The propose eqivalent representation manifests itself in a logic network. After that, a for-vale logic algebra is introce. This algebra is se for the calclations where forwar chaining is carrie ot. Next, the notion of line-vale jstification is escribe. This operation is se in the backwar chaining process, also on the base of the previosly introce for-vale logic. The paper escribes two exact algorithms which serve for the forwar an backwar chaining processes. These algorithms make it possible to be implemente by a compter program, reslting in an efficient inference engine of an expert system.

2 II. FUNDAMENTAL CONCEPTS In a rle-base system, any rle consists of two parts: the IF part, calle the anteceent (premise or conition) an the THEN part, calle the conseqent (conclsion or action). The basic syntax of a rle is: IF <anteceent> THEN <conseqent>. In general, a rle can have mltiple anteceents joine by the keywors AND (conjnction), OR (isjnction), or a combination of both. Negation of an anteceent is also allowe. In this case the NOT operator is se. For example, IF the spill is liqi AND the spill ph < 6 AND the spill smell is vinegar THEN the spill material is acetic aci. Forwar chaining is an inference metho where rles are matche against facts to establish new facts, finally reaching a conclsion. In case of backwar chaining the system starts with what it wants to prove, an tries to establish the facts it nees to prove the initial fact. The necessarily applie components of the reasoning process constitte the so-calle inference chain. The knowlege base consists of the set of rles (rle base), an the set of facts (fact base), where the rle base is permanent, while the fact base contains an initial set of facts epening on the actal task to be solve, an it changes in accorance with the concrete reasoning process. The existent expert systems bil p the knowlege base in a sal ata-base strctre, an their inference engine applies an exhastive search throgh all the rles ring each cycle. The aim of the search is to fin the appropriate rles for which the anteceents or the conseqents satisfy the actal conitions. As a conseqence of this process, systems with a large set of rles (over rles) can be slow, an ths they may be nsitable for real-time applications, especially in the fiel of embee systems [3]. In the following a novel knowlege representation which is base on Boolean algebra an logic networks will be introce. On this base, a for-vale logic system is introce. This new moel reslts in a significantly more efficient inference processing than the classical one. The comptational improvement is estimate to be at least two orers of magnite, which is e to the reqire small memory space an fast operations in the logic omain. III. THE USE OF BOOLEAN ALGEBRA AND LOGIC NETWORKS The relationships of Boolean algebra can also be se for the rle-base systems. As it is well-known, Boolean logic involves two vales: (false) an (tre), where the following three basic operations are se: logic AND (enote by the mltiplication point ( ), logic OR (enote by the aition sign (+), an logic NOT (enote by an apostrophe scceeing the actal variable). For instance, A means the negation of A. It can be easily seen that the logic conitions within the rles can irectly be sbstitte by the corresponing Boolean operations an logic gates [7]. As an example let s consier the following set of rles, where the facts are enote by capital letters: IF C AND D THEN L, IF NOT E THEN K, IF L OR K THEN P, IF E AND M THEN Q. The Boolean escription of the above rles is the following: L = C D, K = E, P = L + K, Q = E M. These for rles can be represente by for logic gates: two AND gates, one NOT gate, an one OR gate. Now, if we connect the inpts an otpts of these gates in accorance with the ientical letters, the logic network of Figre will be obtaine. It shol be note here that in case of a simple irect rle, for example, IF U THEN V, its corresponing Boolean form will be V = U. This relation is represente by a YES gate which oes not moify its inpt vale.

3 C D L P K E M Q Fig.. The logic network for the rle base IV. THE USE OF A FOUR-VALUED LOGIC SYSTEM As known, the original Boolean algebra is base on a two-vale logic, i.e., on an. These are calle etermine vales as well. If a fact is tre in the inference process, then its logic variable will have the vale, if it is false then its vale is. However, as far as the general algebraic treatment of rle bases is concerne, it reqires more than these two vales. It can be prove that the nmber of necessary an sfficient vales is for. It means that in aition to an, two more vales are to be involve. These are as follows: ) The inifferent or on t care logic vale:. It is interprete in sch a way that the network line which carries this vale can take on either or freely, withot inflencing the comptational reslts. 2) The nknown logic vale:. In this case we have not any knowlege abot the concrete logic vale (, or ) of the network line carrying. The treatment of the for vales can be extene to the basic Boolean operations. This extension is smmarize in the trth tables of Table, below: TABLE. TRUTH TABLES OF THE FOUR-VALUED LOGIC SYSTEM AND OR NOT

4 Next we are going to show how these tables are se for forwar an backwar chaining. To reach this goal, consier the rle base above an the logic network belonging to it (see Figre ). Let the initial set of facts be as follows: T = {A, B, C, D, E, G, H}. A. The forwar chaining procere In or representation, the forwar chaining is performe in the following way: Step : C = an D =, since they both are in the fact base, which reslts in L =, so L is place in the fact base. Step 2: E =, becase E is in the fact base, from which it follows that K =, bt L = alone implies P =, so P is place in the fact base. Step 3: The fact base oes not contain M. In or logic system it can be interprete as M =. Thogh E =, e to the nknown vale of M, this is not sfficient to imply Q =. It means that Q =, ths Q cannot be place in the fact base. Here the final conclsion of the forwar chaining was that fact P is tre alone. The above comptational procere can also be calle forwar tracing of the logic vales. It means that we calclate the otpt vales of the logic gates with knowlege of the gate-inpt vales. B. The backwar chaining procere The same way as before, the backwar chaining procere involves backwar tracing of the logic vales throgh the network. Now the inpt vales of a gate have to be etermine with knowlege of the actal gateotpt vale. In this case the goal is to jstify that a primary otpt vale is, i.e., a selecte fact is tre. It reqires a sccessive ecision process which is also calle line-vale jstification [9] [2]. As known, line-vale jstification is a procere with the aim of sccessively assigning inpt vales to the logic elements in sch a way that they are consistent with each previosly assigne vale. (This concept is an axiliary calclation process for jstifying an initial set of logic vales in a network, first applie in the so-calle D-algorithm, for two-vale logic [9].) The backwar tracing of the logic vales can also be performe in accorance with the for-vale trth table. However, this principle iffers in some points from the forwar tracing. In case of forwar tracing, the otpt vale of a gate is to be calclate with knowlege of the inpt vales at the gate. If the inpts are given then they etermine the otpt nambigosly. On the other han, for a given otpt vale at a gate not only one inpt combination can be assigne, there may be more than one possible choices. If two-inpt gates are consiere, the possible choices are smmarize in Figre 2 an Figre 3. If the nmber of inpts at a gate were more than two, it wol increase the nmber of choices, bt wol not case any ifference in principle. No soltion exists Fig. 2. Backwar tracing choices for an AND gate

5 No soltion exists Fig. 3. Backwar tracing choices for an OR gate When performing this process the following viewpoints have to be taken into consieration: Only the etermine logic vales, an, have to be trace back, i.e., these vales are to be jstifie at the gate inpts. The vale of nees no jstification, so it is nnecessary to trace it back. The otpt vale of is jstifie only by the inpt vales of. Since oes not reqire jstification, it is worth assigning the minimm nmber of etermine vales to the gate inpts, while leaving the others at the vale of. In this logic system, the etermine vales an are consistent only with. This fact is to be taken into consieration when a network line has alreay a previosly assigne vale, an another vale is reqire at the same line. Whenever a contraiction, i.e., inconsistency occrs, we have to make a new choice or change the last possible ecision. In or example (Figre ), the comptations procee as follows: Step : The proof of P = : At first let K = an L =, which are the minimally necessary assignments. Now from K = it follows that E =, which is a contraiction, for E is in the fact base, so E = hols. Step 2: We have to moify or previos ecision: Now let L = an K =. In this way L = is jstifie by C = an D =, withot any contraiction. Step 3: It is nnecessary to trace back the vale K =, since the inifferent vale oes not reqire jstification. So the proof of P has been finishe. Step 4: The proof of Q = : This conition reqires that both inpts to the AND gate be, i.e., E = an M =. Since E is a member of the fact base, E = hols. However, M is missing from the fact base, which means that M =. In this case it is impossible to jstify (prove) that Q =. V. CONCLUDING REMARKS This paper has presente a logic moel which is irectly applicable for inference chains in expert systems. Both forwar an backwar reasoning can be performe on the base of the moel. In comparison with the conventionally organize knowlege bases, the calclations sing this for-vale logic can avantageosly be organize an carrie ot in embee compting systems e to the following reasons: The storage reqirement of the for logic vales at the network lines is negligible: only two bits are necessary an sfficient for coing them.

6 Comptations among logic vales are ab ovo fast an efficient. This fact manifests itself especially when bit-level implementation is applie. The ata-base strctre of a logic network is comparatively simple. Only the gate types an the inpt-otpt connections of the gates are to be encoe an store. The forwar an backwar tracing are carrie ot irectly on this network strctre. VI. REFERENCES [] Massa, A.J., Embee Software Development with ecos, Prentice-Hall, Inc., USA, 23. [2] Waterman, D.A., A Gie to Expert Systems, Aison-Wesley Pblishing Company, USA, 986. [3] Negnevitsky, M., Artificial Intelligence: A Gie to Intelligent Systems, Aison-Wesley Pblishing Company, Great Britain, 22. [4] Chen, Zh., Comptational Intelligence for Decision Spport, CRC Press LLC, USA, 2. [7] Cormen, T.H., Ch. E. Leiserson, R.L. Rivest, C. Stein: Introction to Algorithms, McGraw-Hill Pblishing Company, USA, 2. [8] Uyemra, J.P., A First Corse in Digital Systems Design: An Integrate Approach, Brooks-Cole Pblishing Company, USA, 2. [9] J.P. Roth, Diagnosis of Atomata Failres: a Calclation an a Metho, IBM Jornal of Research an Development, USA, Jly 966, Vol., pp , [] Abramovici, M., M.A. Breer, an A.D. Frieman, Digital Systems Testing an Testable Design, Compter Science Press, USA, 99. [] J. Sziray, Test Calclation for Logic Networks by Composite Jstification, Digital Processes, Great Britain, 979, Vol. 5, No. -2, pp [2] J. Sziray, Test Calclation for Logic an Timing Falts, IEEE International Workshop on RTL an High Level Testing, (WRTLT-24), Osaka, Japan, November -2, 24. Proceeings, pp [5] Lewis, H.R., Ch. H. Papaimitrio, Elements of the Theory of Comptation, Prentice-Hall, Inc., USA, 998. [6] Hopcroft, J.E., R. Motwani, J.D. Ullman, Introction to Atomata Theory, Langages, an Comptation, Secon Eition, Aison-Wesley Pblishing Company, USA, 2.

Cryptanalysis of Password Authentication Scheme Using Smart Cards

Cryptanalysis of Password Authentication Scheme Using Smart Cards Jornal of Internet Technology an Secre Transactions (JITST, Volme 1, Isse 1, March 2012 Cryptanalysis of Passwor Athentication Scheme Using Smart Cars Sattar J Abo Department of Information Technology

More information

Network Coding-Based Protection

Network Coding-Based Protection Network Coing-Base Protection Ahme E. Kamal Mirza Mohanespor epartment of Electrical an Compter Engineering Iowa State University Ames, IA 500 {kamal,mirzam}@iastate.e Abstract This paper serves as a ttorial

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

The Volcano Optimizer Generator: Extensibility and Efficient Search

The Volcano Optimizer Generator: Extensibility and Efficient Search The Volcano Optimizer Generator: Extensibility and Efficient Search - Prithvi Lakshminarayanan - 301313262 Athors Goetz Graefe, Portland State University Won the Most Inflential Paper award in 1993 Worked

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

The Recommendation Mechanism in an Internet Information System with Time Impact Coefficient

The Recommendation Mechanism in an Internet Information System with Time Impact Coefficient International Jornal of Compter Science & Applications Vol. 3 Isse 3, pp 65-8 26 Technomathematics esearch Fonation The ecommenation Mechanism in an Internet Information System with Time Impact Coefficient

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

DYNAMIC ROAD STRUCTURE ESTIMATION

DYNAMIC ROAD STRUCTURE ESTIMATION Blletin of the Transilania Uniersity of Braşo Vol. 8 (57) No. - 15 Series I: Engineering Sciences DYNAMIC ROAD STRUCTURE ESTIMATION S.M. GRIGORESCU 1 G. MĂCEŞANU 1 Abstract: The paper presents a roa strctre

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

PART I: Adding Instructions to the Datapath. (2 nd Edition):

PART I: Adding Instructions to the Datapath. (2 nd Edition): EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Decoders. 3-Input Full Decoder

Decoders. 3-Input Full Decoder ecoders A fll decoder with n inpts has 2 n otpts. Let inpts be labeled In, In, In 2,..., In n, and let otpts be labeled Ot, Ot,..., Ot 2 n. A fll decoder fnctions as follows: Only one of otpts has vale

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

NEW MULTI-BLOCK COMPUTATIONAL METHODOLOGY BY CHARACTERISTIC INTERFACE CONDITIONS WITH HIGH-ORDER INTERPOLATION

NEW MULTI-BLOCK COMPUTATIONAL METHODOLOGY BY CHARACTERISTIC INTERFACE CONDITIONS WITH HIGH-ORDER INTERPOLATION 27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES NEW MULTI-BLOCK COMPUTATIONAL METHODOLOGY BY CHARACTERISTIC INTERFACE CONDITIONS WITH HIGH-ORDER INTERPOLATION Takahiro Smi* Takji Ktotaki ** an

More information

EEC 483 Computer Organization

EEC 483 Computer Organization EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Fig. 1 The principle of redundant actuation of parallel robots

Fig. 1 The principle of redundant actuation of parallel robots Control an Calibration of Renantly Actate Parallel Robots Valasek, M., Bela, K., Florian, M. Czech echnical University in Prage Karlovo nam. 13, CZ-121 35 Praha 2 valasek@fsik.cvt.cz Abstract he principle

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

6 Using Bookmarks Using Saved Pages Advanced Features

6 Using Bookmarks Using Saved Pages Advanced Features Overview... - Yahoo! Keitai... -3 Connecting to Yahoo! Keitai... -3 PC Site Browser... -5 PC Site Browser... -5 Connecting to PC Websites... -5 Page Operations... -8 Navigating Pages... -8 Jmping to Next

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Performance of Multi-Channel IEEE WLANs with Bidirectional Flow Control - Extended Report

Performance of Multi-Channel IEEE WLANs with Bidirectional Flow Control - Extended Report Performance of Mlti-Channel IEEE 82.11 WLANs with Biirectional Flow Control - Extene Report Song H. Ngyen, Lachlan L. H. Anrew, Hai L. V Centre for Avance Internet Architectres, Technical Report 1373B

More information

Nonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plausible Relations. Ofer Arieli and Arnon Avron

Nonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plausible Relations. Ofer Arieli and Arnon Avron Nonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plasible Relations Ofer Arieli and Arnon Avron Department of Compter Science, School of Mathematical Sciences, Tel-Aviv University,

More information

ECE232: Hardware Organization and Design

ECE232: Hardware Organization and Design ECE232: Harware Organization an Design ectre 11: Introction to IPs path apte from Compter Organization an Design, Patterson & Hennessy, CB IPS-lite processor Compter Want to bil a processor for a sbset

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11 . Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System

More information

УДК OPTIMAL PARALLELING FOR SOLVING COMBINATORIAL MODELLING PROBLEMS USING GRAPHICS PROCESSING UNITS. S.M. Yefimenko

УДК OPTIMAL PARALLELING FOR SOLVING COMBINATORIAL MODELLING PROBLEMS USING GRAPHICS PROCESSING UNITS. S.M. Yefimenko Yefienko S.M. УДК 519.254 OPTIMAL PARALLELING FOR SOLVING COMBINATORIAL MODELLING PROBLEMS USING GRAPHICS PROCESSING UNITS S.M. Yefienko International Research an Training Centre of Inforation Technologies

More information

Ma Lesson 18 Section 1.7

Ma Lesson 18 Section 1.7 Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,

More information

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Linear First-Order PDEs

Linear First-Order PDEs MODULE 2: FIRST-ORDER PARTIAL DIFFERENTIAL EQUATIONS 9 Lecture 2 Linear First-Orer PDEs The most general first-orer linear PDE has the form a(x, y)z x + b(x, y)z y + c(x, y)z = (x, y), (1) where a, b,

More information

Image Denoising Algorithms

Image Denoising Algorithms Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Curves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science

Curves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science Crves and Srfaces CS 57 Interactive Compter Graphics Prof. David E. Breen Department of Compter Science E. Angel and D. Shreiner: Interactive Compter Graphics 6E Addison-Wesley 22 Objectives Introdce types

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Early Results of the CASCADE Technology Demonstration Payload on CASSIOPE

Early Results of the CASCADE Technology Demonstration Payload on CASSIOPE SSC14-XII-5 Early Reslts of the CSCDE Technology Demonstration Payloa on CSSIOPE Mark Senez, Jeff Hemingway, Brce Ents MD Systems Lt. 13800 Commerce Parkway, Richmon BC, Canaa, V6V 2J3; 604-231-2327 msenez@macorporation.com.w.

More information

New-Sum: A Novel Online ABFT Scheme For General Iterative Methods

New-Sum: A Novel Online ABFT Scheme For General Iterative Methods New-Sm: A Novel Online ABFT Scheme For General Iterative Methods Dingwen Tao (University of California, Riverside) Shaiwen Leon Song (Pacific Northwest National Laboratory) Sriram Krishnamoorthy (Pacific

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Fast Ray Tetrahedron Intersection using Plücker Coordinates

Fast Ray Tetrahedron Intersection using Plücker Coordinates Fast Ray Tetrahedron Intersection sing Plücker Coordinates Nikos Platis and Theoharis Theoharis Department of Informatics & Telecommnications University of Athens Panepistemiopolis, GR 157 84 Ilissia,

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

Advances in Environmental Biology

Advances in Environmental Biology AESI Jornals Advances in Environmental Biology ISS-1995-0756 EISS-1998-1066 Jornal home page: http://www.aensiweb.com/aeb/ The Generic Mathematical Model of Freency Sampling Digital Filters with Shiftable

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Switched state-feedback controllers with multi-estimators for MIMO systems

Switched state-feedback controllers with multi-estimators for MIMO systems Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR

More information

VirtuOS: an operating system with kernel virtualization

VirtuOS: an operating system with kernel virtualization VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design

More information

Chapter 6 Enhancing Performance with. Pipelining. Pipelining. Pipelined vs. Single-Cycle Instruction Execution: the Plan. Pipelining: Keep in Mind

Chapter 6 Enhancing Performance with. Pipelining. Pipelining. Pipelined vs. Single-Cycle Instruction Execution: the Plan. Pipelining: Keep in Mind Pipelining hink of sing machines in landry services Chapter 6 nhancing Performance with Pipelining 6 P 7 8 9 A ime ask A B C ot pipelined Assme 3 min. each task wash, dry, fold, store and that separate

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

Energy Efficient Polynomial Based Group Key Management Protocol for Secure Group Communications in MANET

Energy Efficient Polynomial Based Group Key Management Protocol for Secure Group Communications in MANET International Jornal of Applie Engineering Research ISSN 0973-4562 Volme 11, Nmber 9 (2016) pp 6701-6705 Research Inia Pblications. http://www.ripblication.com Energy Efficient Polynomial Base Grop Key

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

CS 251, Winter 2019, Assignment % of course mark

CS 251, Winter 2019, Assignment % of course mark CS 25, Winter 29, Assignment.. 3% of corse mark De Wednesday, arch 3th, 5:3P Lates accepted ntil Thrsday arch th, pm with a 5% penalty. (7 points) In the diagram below, the mlticycle compter from the corse

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Triangle-Free Planar Graphs as Segments Intersection Graphs

Triangle-Free Planar Graphs as Segments Intersection Graphs Triangle-ree Planar Graphs as Segments Intersection Graphs N. de Castro 1,.J.Cobos 1, J.C. Dana 1,A.Márqez 1, and M. Noy 2 1 Departamento de Matemática Aplicada I Universidad de Sevilla, Spain {natalia,cobos,dana,almar}@cica.es

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Semantic segmentation is the task of labeling every pixel in

Semantic segmentation is the task of labeling every pixel in Deep Learning for Visal Understanding: Part Anrag Arnab, Shai Zheng, Sadeep Jayasmana, Bernardino Romera-Paredes, Måns Larsson, Alexander Kirillov, Bogdan Savchynskyy, Carsten Rother, Fredrik Kahl, and

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches

More information

The Depth Discontinuity Occlusion Camera

The Depth Discontinuity Occlusion Camera The Depth Discontinity Occlsion Camera Voic Popesc * Daniel Aliaga Pre University Pre University Figre 1 Depth image, DDOC reerence image, an corresponing pair o rames. The DDOC reerence image alleviates

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 15: Virtal Address Space Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian OS Abstractions Applications

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in

More information

Refinement calculus for reactive systems

Refinement calculus for reactive systems Refinement calcls for reactive systems Stavros Tripakis UC Berkeley and Aalto University Joint work with Viorel Preoteasa (Aalto), Ben Lickly (Berkeley), Thomas Henzinger (IST Astria), and Edward Lee (Berkeley)

More information

1048: Computer Organization

1048: Computer Organization 48: Compter Organization Lectre 5 Datapath and Control Lectre5B - mlticycle implementation (cwli@twins.ee.nct.ed.tw) 5B- Recap: A Single-Cycle Processor PCSrc 4 Add Shift left 2 Add ALU reslt PC address

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

The effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems

The effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems The effectiveness of PIES comparing to FEM and BEM for 3D elasticit problems A. Boltc, E. Zienik, K. Sersen Faclt of Mathematics and Compter Science, Universit of Bialstok, Sosnowa 64, 15-887 Bialstok,

More information

A Duality Based Approach for Realtime TV-L 1 Optical Flow

A Duality Based Approach for Realtime TV-L 1 Optical Flow A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos

More information

A Highly-Digital Frequency Synthesizer Using Ring Oscillator Frequency-to-Digital Conversion and Noise Cancellation

A Highly-Digital Frequency Synthesizer Using Ring Oscillator Frequency-to-Digital Conversion and Noise Cancellation A Highly- Freqency Synthesizer Using Ring Oscillator Freqency-to- Conversion and Noise Cancellation Colin Weltin-W,2, Gobi Zhao, Ian Galton University of California at San Diego, La Jolla, CA 2 Analog

More information