• Title/Summary/Keyword: Computer Algebra Systems

Search Result 36, Processing Time 0.02 seconds

Generation of Finite Fuzzy Algebra and Finite De Morgan Algebra Using a Computer

  • Tastumi, Hisayuki;Araki, Tomoyuki;Mukaidono, Masao;Tokumasu, Shinji
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.531-536
    • /
    • 1998
  • It is well known that a Boolean algebra is one of the most important algebra for engineering. A fuzzy algebra, which is referred to also as a Kleen algebra, is obtained from a Boolean algebra by replacing the complementary law in the axioms of a Bloolean algebra with the Kleen's law, where the Kleen's law is a weaker condition than the complementary law. Removal of the Kleen's law from a Kleen algebra gives a De Morgan algebra. In this paper, we generate lattice structures of the above related algebraic systems having finite elements by using a computer. From the result, we could find out a hypothesis that the structure excepting for each element name between a Kleene algebra and a De Morgan algebra is the same from the lattice standpoint.

  • PDF

Visualisation of the Mathematical Process: Boolean Algebra and Graph Theory with TI-83/89

  • Gashkov, Igor
    • Research in Mathematical Education
    • /
    • v.11 no.2
    • /
    • pp.143-151
    • /
    • 2007
  • Nowadays there are practically no mathematical courses in which Computer Algebra Systems (CAS) programs, such as MATHEMATlCA, Maple, and TI-89/92, are not used to some extent. However, generally the usage of these programs is reduced to illustration of computing processes: calculation of integrals, differentiation, solution of various equations, etc. This is obtained by usage of standard command of type: Solve [...] in MATHEMATICA. At the same time the main difficulties arise at teaching nonconventional mathematical courses such as coding theory, discrete mathematics, cryptography, Scientific computing, which are gaining the increasing popularity now. Now it is impossible to imagine a modern engineer not having basic knowledge in discrete mathematics, Cryptography, coding theory. Digital processing of signals (digital sound, digital TV) has been introduced in our lives.

  • PDF

A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure

  • Nia, Nahid Hamzehee;Adabi, Sepideh;Nategh, Majid Nikougoftar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2346-2361
    • /
    • 2017
  • A major challenge in cloud infrastructure is the efficient allocation of virtual network elements on top of substrate network elements. Path algebra is a mathematical framework which allows the validation and convergence analysis of the mono-constraint or multi-constraint routing problems independently of the network topology or size. The present study proposes a new heuristic approach based on mathematical framework "paths algebra" to map virtual nodes and links to substrate nodes and paths in cloud. In this approach, we define a measure criterion to rank the substrate nodes, and map the virtual nodes to substrate nodes according to their ranks by using a greedy algorithm. In addition, considering multi-constraint routing in virtual link mapping stage, the used paths algebra framework allows a more flexible and extendable embedding. Obtained results of simulations show appropriate improvement in acceptance ratio of virtual networks and cost incurred by the infrastructure networks.

Process Algebra for Multiple Shared Resources (다중 공유 자원을 위한 프로세스 대수)

  • Yoo, Hee-Jun;Lee, Ki-Huen;Choi, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.337-344
    • /
    • 2000
  • In this paper, we define a Process Algebra ACSMR(Algebra of Communicating Shared Multiple Resources) for system specification and verification using multiple resources. ACSMR extends a concept of multiple resources in ACSR that is a branch of formal methods based on process algebra. We'll show that two specification and verification examples. One is the specification of system behavior in multiprocessor using EDF(Earliest-Deadline-First) which is a scheduling algorithm of a real-time system. The other is the specification of describing timing analysis and resources restriction in a super scalar processor using multiple ports registers.

  • PDF

Equivalence Checking for Statechart Specification (Statechart 명세의 등가 관계 검사)

  • Park, Myung-Hwan;Bang, Ki-Seok;Choi, Jin-Young;Lee, Jeong-A;Han, Sang-Yoong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.6
    • /
    • pp.608-619
    • /
    • 2000
  • In this paper, we give a formal semantics for Statechart via a translation into Algebra of Communicating Shared Hesources(ACSR). Statechart is a very rich graphical specification language, which is suitable to specify complicated reactive systems. However, the incorporation of graph into specification and rich syntax makes Statechart semantics very complicated and ambiguous. Thus, it is very difficult to verify the correctness of Statechart specifications. Also, we propose the formal verification method for Statechart specifications by showing equivalence relation between two Statechart specifications. This makes it possible to combine the advantages of a graphical language with the rigor of process algebra.

  • PDF

Implementation issues for Uncertain Relational Databases

  • Yu, Hairong;Ramer, Arthur
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.128-133
    • /
    • 1998
  • This paper aims to present some ideas for implementation of Uncertain Relational Databases (URD) which are extensions of classical relational databases. Our system firstly is based on possibility distribution and probability theory to represent and manipulate fuzzy and probabilistic information, secondly adopts flexible mechanisms that allow the management of uncertain data through the resources provided by both available relational database management systems and front-end interfaces, and lastly chooses dynamic SQL to enhance versatility and adjustability of systems.

  • PDF

Tailoring Operations based on Relational Algebra for XES-based Workflow Event Logs

  • Yun, Jaeyoung;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.21-28
    • /
    • 2019
  • Process mining is state-of-the-art technology in the workflow field. Recently, process mining becomes more important because of the fact that it shows the status of the actual behavior of the workflow model. However, as the process mining get focused and developed, the material of the process mining - workflow event log - also grows fast. Thus, the process mining algorithms cannot operate with some data because it is too large. To solve this problem, there should be a lightweight process mining algorithm, or the event log must be divided and processed partly. In this paper, we suggest a set of operations that control and edit XES based event logs for process mining. They are designed based on relational algebra, which is used in database management systems. We designed three operations for tailoring XES event logs. Select operation is an operation that gets specific attributes and excludes others. Thus, the output file has the same structure and contents of the original file, but each element has only the attributes user selected. Union operation makes two input XES files into one XES file. Two input files must be from the same process. As a result, the contents of the two files are integrated into one file. The final operation is a slice. It divides anXES file into several files by the number of traces. We will show the design methods and details below.

A Method of Service Reuse using Analysis of Process Similarity and Meta Repository (프로세스 유사도 분석과 메타 저장소를 이용한 서비스 재사용 기법)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Jung, Kye-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1375-1380
    • /
    • 2014
  • SaaS at a cloud computing is a framework to provide a software as a service. Depending on the difference of the tenant and the use, if the service provider re-establish a service, they are required resources In terms of costs and managerial. So we propose a technique for analysis of software structure using the process algebra to reuse existing software. A process algebra analyze the structure of the software, express in different languages and verify that it can be reused. CCS in a process algebra is useful to convert the business process or XML, by using this, we structure a process as process view and propose meta storage for comparison and management a structured document.

A Method for Specifying the Access Control of XML Document using Process Algebra (프로세스 대수를 이용한 XML 문서의 접근권한 표현법)

  • Lee, Ji-Yeon;Kim, Il-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.251-258
    • /
    • 2007
  • With the increase of a web service technology, a new access control mechanism has developed for XML documents. As a result, as legacy access control systems, access control systems has become an active research topic. In this paper, we propose a methodology to translate access control policies for XML documents into formal specification language CSP. To do this, first, we introduce a method to translate a hierarchical access to XML documents using XPath language into CSP process algebra. Second, we explain a method to represent a XML schema as a formal model like automata. Third, we present a method for representing the semantics of access control policies such as the scope of rules and confliction resolution into a process algebra language. Finally, a CSP specification example of an XML schema and path expressions aye shown to illustrate the validity of our approach.

  • PDF

Petri Nets Modeling Using Relational Algebra (관계 대수를 이용한 페트리 네트의 모델링)

  • Young Chan Kim
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1992.10a
    • /
    • pp.12-12
    • /
    • 1992
  • This paper proposes an analysis method of Petri nets (PNs) using the relational algebra (RA). More specifically, we represent PNs in relations of the relational model. Based on such representation, we first develop an algorithms for analyzing properties of PNs, such as boundedness, conservation, coverability, reachability, and liveness. The advantage of this approach is as follows: First, the algorithms represented by RA can be easily converted to a query language such as SQL of the widely used, commercial relational database management systems (DBMSs). Second, we can alleviate the problem of state space explosion because relational DBMSs can handle large amounts of data efficiency. Finally, we can use the DBMS's query language to interpret the Petri nets and make simulation.

  • PDF