Search results

1 – 10 of over 1000
Article
Publication date: 1 April 1995

Edward T. Lee

Logic function representations play an important role in logic design and computer design, as well as VLSI design. There are many ways to represent a logic function…

246

Abstract

Logic function representations play an important role in logic design and computer design, as well as VLSI design. There are many ways to represent a logic function. Presents and classifies 11 representation methods into “unique representation category” and “non‐unique representation category”. History of these methods is also briefly mentioned. There are three non‐unique representation methods: Boolean expression;sum of products; and product sums, and eight unique representation methods: truth table; canonical sum of products; canonical product of sums; sum of minterms; product of maxterms; Karnaugh map; Boolean lattice; and Venn diagram. A theorem is found which states that Boolean expression, sum of products, product of sums, sum of minterms, product of maxterms, and Karnaugh map, form a lattice structure. The results may have useful applications in knowledge representation, pictorial knowledge representation and other related areas.

Details

Kybernetes, vol. 24 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 17 March 2021

André Oksas

This paper aims to show how a sociological description – a swarm analysis of the Nazi dictatorship – initially made with the means borrowed from George Spencer-Brown’s…

98

Abstract

Purpose

This paper aims to show how a sociological description – a swarm analysis of the Nazi dictatorship – initially made with the means borrowed from George Spencer-Brown’s Calculus of Indications, can be transformed into a digital circuit and with which methods and tools of digital mathematics this digital circuit can be analyzed and described in its behavior. Thus, the paper also aims to contribute to a better understanding of Chapter 11 of “Laws of Form.”

Design/methodology/approach

The analysis uses methods of automata theory for finite, deterministic automata. Basic set operations of digital mathematics and special set operations of the Boolean Differential Calculus are used to calculate digital circuits. The software used is based on ternary logic, in which the binary Boolean logic of the elements {0, 1} is extended by the third element “Don’t care” to {0, 1, −}.

Findings

The paper confirms the method of transforming a form into a digital circuit derived from the comparative functional and structural analysis of the Modulator from Chapter 11 of “Laws of Form” and defines general rules for this transformation. It is shown how the indeterminacy of re-entrant forms can be resolved in the medium of time using the methods of automata theory. On this basis, a refined definition of the degree of a form is presented.

Originality/value

The paper shows the potential of interdisciplinary approaches between sociology and information technology and provides methods and tools of digital mathematics such as ternary logic, Boolean Differential Calculus and automata theory for application in sociology.

Article
Publication date: 1 June 1995

C. Musès

Carrying on the arithmetization of Euler diagrams by George Boole, with refinements by Augustus De Morgan and others, the full‐scale incorporation of binary strings into…

126

Abstract

Carrying on the arithmetization of Euler diagrams by George Boole, with refinements by Augustus De Morgan and others, the full‐scale incorporation of binary strings into the scheme is discussed, with emphasis on the usefulness of the operator EXOR and its consequent EXORcism of what had remained unclear. Examples and applications are given. By this powerful extension of Boolean algebra Euler/Venn diagrams of class relations can be digitally computed. Its uses to system theory and cybernetics are manifold.

Details

Kybernetes, vol. 24 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 January 1993

Ankie Visschedijk and Forbes Gibb

This article reviews some of the more unconventional text retrieval systems, emphasising those which have been commercialised. These sophisticated systems improve on…

Abstract

This article reviews some of the more unconventional text retrieval systems, emphasising those which have been commercialised. These sophisticated systems improve on conventional retrieval by using either innovative software or hardware to increase retrieval speed or functionality, precision or recall. The software systems reviewed are: AIDA, CLARIT, Metamorph, SIMPR, STATUS/IQ, TCS, TINA and TOPIC. The hardware systems reviewed are: CAFS‐ISP, the Connection Machine, GESCAN,HSTS,MPP, TEXTRACT, TRW‐FDF and URSA.

Details

Online and CD-Rom Review, vol. 17 no. 1
Type: Research Article
ISSN: 1353-2642

Keywords

Article
Publication date: 1 June 1997

Arvind Verma

Although fuzzy logic is being extensively used in electronics and mathematical sciences, it has found little or no application in the social sciences, especially…

949

Abstract

Although fuzzy logic is being extensively used in electronics and mathematical sciences, it has found little or no application in the social sciences, especially criminology. As a mathematical system, fuzzy logic generalizes the Boolean logic and can be a very useful tool for the social sciences where concepts and terms involve shades of meanings. Outlines the essential mathematics behind this approach and develops a technique that could be useful in building offender profiles from fuzzy descriptions provided by witnesses. Also suggests several other possible areas of applications of this mathematical system.

Details

Policing: An International Journal of Police Strategies & Management, vol. 20 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 March 1987

Durward Lee Power

InfoBaserBibSrch (originally called BibSrch) began as a hobby and has turned into a vocation. In developing the product, there was no sponsor to whom to answer. No one's…

Abstract

InfoBaserBibSrch (originally called BibSrch) began as a hobby and has turned into a vocation. In developing the product, there was no sponsor to whom to answer. No one's requirements list had to be satisfied. The development process was an opportunity to explore, experiment, and challenge assumptions. My guidelines resulted from listening over the last twenty years to librarians critique systems. The product was in development for three years before the first test site was selected. Many people gave moral support and helped critique the product. My colleagues at the Federal Library and Information Center Committee provided special assistance, for which I am most grateful.

Details

Reference Services Review, vol. 15 no. 3
Type: Research Article
ISSN: 0090-7324

Book part
Publication date: 8 June 2011

Thomas Greckhamer and Kevin W. Mossholder

Purpose – This chapter examines the potential of qualitative comparative analysis (QCA) for strategy research.Methodology/approach – We introduce the set-theoretic…

Abstract

Purpose – This chapter examines the potential of qualitative comparative analysis (QCA) for strategy research.

Methodology/approach – We introduce the set-theoretic framework of QCA and provide an overview of recent methodological developments.

Findings – We utilize a variety of examples relevant to strategy research to illustrate the action steps and key concepts involved in conducting a QCA study.

Originality/value of paper – We develop examples from core research areas in strategic management to illustrate QCA's potential for examining issues of causality and diversity in strategy research, and in settings involving medium-N samples. We conclude by emphasizing that QCA offers an alternative mode of inquiry to open and redirect important lines of strategy research.

Details

Building Methodological Bridges
Type: Book
ISBN: 978-1-78052-026-1

Keywords

Article
Publication date: 1 January 2005

R. Obiała, B.H.V. Topping, G.M. Seed and D.E.R. Clark

This paper describes how non‐orthogonal geometric models may be transformed into orthogonal polyhedral models. The main purpose of the transformation is to obtain a…

Abstract

Purpose

This paper describes how non‐orthogonal geometric models may be transformed into orthogonal polyhedral models. The main purpose of the transformation is to obtain a geometric model that is easy to describe and further modify without loss of topological information from the original model.

Design/methodology/approach

The transformation method presented in this paper is based on fuzzy logic (FL). The idea of using FL for this type of transformation was first described by Takahashi and Shimizu. This paper describes both philosophy and techniques behind the transformation method as well as its application to some example 2D and 3D models. The problem in this paper is to define a transformation technique that will change a non‐orthogonal model into a similar orthogonal model. The orthogonal model is unknown at the start of the transformation and will only be specified once the transformation is complete. The model has to satisfy certain conditions, i.e. it should be orthogonal.

Findings

The group of non‐orthogonal models that contain triangular faces such as tetrahedra or pyramids cannot be successfully recognized using this method. This algorithm fails to transform these types of problem because to do so requires modification of the structure of the model. It appears that only when the edges are divided into pieces and the sharp angles are smoothed then the method can be successfully applied. Even though the method cannot be applied to all geometric models many successful examples for 2D and 3D transformation are presented. Orthogonal models with the same topology, which make them easier to describe, are obtained.

Originality/value

This transformation makes it possible to apply simple algorithms to orthogonal models enabling the solution of complex problems usually requiring non‐orthogonal models and more complex algorithms.

Details

Engineering Computations, vol. 22 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 14 September 2021

Cris Koutsougeras, Mohammad Saadeh and Ahmad Fayed

This modeling facilitates the determination of control responses (or possibly reconfiguration) upon such events and the identification of which segments of the pipeline…

Abstract

Purpose

This modeling facilitates the determination of control responses (or possibly reconfiguration) upon such events and the identification of which segments of the pipeline can continue to function uninterrupted. Based on this modeling, an algorithm is presented to implement the control responses and to establish this determination. In this work, the authors propose using Message Queuing Telemetry Transport (MQTT), which is an integrated method to perform the system-wide control based on message exchanging among local node controllers (agents) and the global controller (broker).

Design/methodology/approach

Complex manufacturing lines in industrial plants are designed to accomplish an overall task in an incremental mode. This typically consists of a sequence of smaller tasks organized as cascaded processing nodes with local controls, which must be coordinated and aided by a system-wide (global) controller. This work presents a logic modeling technique for such pipelines and a method for using its logic to determine the consequent effects of events where a node halts/fails on the overall operation.

Findings

The method uses a protocol for establishing communication of node events and the algorithm to determine the consequences of node events in order to produce global control directives, which are communicated back to node controllers over MQTT. The algorithm is simulated using a complex manufacturing line with arbitrary events to illustrate the sequence of events and the agents–broker message exchanging.

Originality/value

This approach (MQTT) is a relatively new concept in Cyber-Physical Systems. The proposed example of feed-forward is not new; however, for illustration purposes, it was suggested that a feed-forward be used. Future works will consider practical examples that are at the core of the manufacturing processes.

Details

Journal of Intelligent Manufacturing and Special Equipment, vol. 2 no. 2
Type: Research Article
ISSN: 2633-6596

Keywords

Article
Publication date: 1 March 1989

Ian Scott, Stuart Gronow and Brian Rosser

Examines the ability of an expert computer system to evaluateuncertainty within a valuation context and thus emulate the professionalskill of the valuer. Shows that…

Abstract

Examines the ability of an expert computer system to evaluate uncertainty within a valuation context and thus emulate the professional skill of the valuer. Shows that because property valuation programs based on regression analysis require data input for each variable, they are unable to evaluate uncertainty and hence to apply the rational judgement which enables the human valuer to produce a valuation in the light of uncertain or incomplete information.

Details

Journal of Valuation, vol. 7 no. 3
Type: Research Article
ISSN: 0263-7480

Keywords

1 – 10 of over 1000