Showing 1,301 - 1,320 results of 2,211 for search '"logicism"', query time: 0.04s Refine Results
  1. 1301

    A neutrosophic framework for evaluating security measures in information systems by Jessica Santander Moreno, Jessica Alexandra Ortega Matoma, Marcelo Raúl Dávila Castillo, Jerson Alexis Ordóñez Sarchi

    Published 2024-11-01
    “…Addressing the inherent uncertainty and complexity of cybersecurity challenges, this research focuses on optimizing decision-making processes by leveraging the unique capabilities of neutrosophic logic. The study identifies a critical gap in existing literature, where comprehensive evaluations of cybersecurity measures often overlook the dynamic and uncertain nature of threats. …”
    Get full text
    Article
  2. 1302

    Correction of Line-Sampling Bias of Rock Discontinuity Orientations Using a Modified Terzaghi Method by Huiming Tang, Junrong Zhang, Lei Huang, Changbin Yan, Shengming Hu, Mutasim Adam Mohamed Ez Eldin

    Published 2018-01-01
    “…The applicability of the redefined bias-compensatory factor is verified through a mathematical logical deduction. The accuracy of the conventional and the modified Terzaghi methods are compared using a case study in Wenchuan, China, revealing improved accuracy for the latter.…”
    Get full text
    Article
  3. 1303

    Irritable bowel syndrome: pathophysiological and clinical issues by V. T. Ivashkin, Ye. A. Poluektova

    Published 2015-03-01
    “…At irritable bowel syndrome there are series of structural changes interconnected with each other, built into logic chain, that ends by development of symptoms. …”
    Get full text
    Article
  4. 1304

    Understanding Ambiguity in Knowledge, Value and Institutional Structure: A Case Study of Chinese Open Network Community by Yao Jin

    Published 2023-08-01
    “…The analysis shows structural problems are the internal logical starting point of ambiguity in the net- work community and the underlying cause of gradual accumulation and pre- cipitation in social tension. …”
    Get full text
    Article
  5. 1305

    A Biometric Key Establishment Protocol for Body Area Networks by Lin Yao, Bing Liu, Guowei Wu, Kai Yao, Jia Wang

    Published 2011-08-01
    “…The correctness of the proposed key establishment protocol is formally verified based on SVO logic. Security analysis shows that our protocol can guarantee data confidentiality, authenticity and integrity. …”
    Get full text
    Article
  6. 1306

    Design of Efficient Full Adder in Quantum-Dot Cellular Automata by Bibhash Sen, Ayush Rajoria, Biplab K. Sikdar

    Published 2013-01-01
    “…Further, the usefulness of such design is established with the synthesis of high-level logic. Experimental results illustrate the significant improvements in design level in terms of circuit area, cell count, and clock compared to that of conventional design approaches.…”
    Get full text
    Article
  7. 1307

    Novel intelligent adaptive sliding mode control for marine fuel cell system via hybrid algorithm by Shiyi Fang, Daifen Chen, Xinyu Fan

    Published 2025-01-01
    “…The control strategy employs a non-singular fast terminal sliding surface for the controller, integrating a fuzzy logic and particle swarm optimization to tune the sliding mode gain and dynamically regulate output, thereby enhancing system efficiency and minimizing energy consumption. …”
    Get full text
    Article
  8. 1308

    A Novel Rules Based Approach for Estimating Software Birthmark by Shah Nazir, Sara Shahzad, Sher Afzal Khan, Norma Binti Alias, Sajid Anwar

    Published 2015-01-01
    “…For this purpose, the concept of soft computing such as probabilistic and fuzzy computing has been taken into account and fuzzy logic is used to estimate properties of birthmark. …”
    Get full text
    Article
  9. 1309

    Fuzzy Networked Control Systems Design Considering Scheduling Restrictions by H. Benítez-Pérez, A. Benítez-Pérez, J. Ortega-Arjona, O. Esquivel-Flores

    Published 2012-01-01
    “…The related control law is designed considering fuzzy logic approximation for nonlinear time delays coupling, where the main advantage is the integration of this behavior through extended state space representation keeping certain linear and bounded behavior and leading to a stable situation during events presentation by guaranteeing stability through Lyapunov.…”
    Get full text
    Article
  10. 1310

    Edge Computing in an IoT Base Station System: Reprogramming and Real-Time Tasks by Huifeng Wu, Junjie Hu, Jiexiang Sun, Danfeng Sun

    Published 2019-01-01
    “…Embedded programmable logic controllers serve as the edge nodes; a dynamic programming method creates a seamless integration between the edge nodes and the cloud. …”
    Get full text
    Article
  11. 1311

    Research of technological interaction methods between expert structures and political institutions by A. S. Gusarov, D. Yu. Znamensky

    Published 2023-03-01
    “…The relevance of the research lies in the analysis of the answers to these questions. The logical purpose of the work is to form an understanding of a number of modern problems faced by both experts and representatives of political institutions at the current stage of development of their interaction in the formation of public policy.…”
    Get full text
    Article
  12. 1312

    Cross-Provincial City-Regionalism in China: Evidence from Smart Planning and Integrated Governance of the Yangtze River Delta by Tianren Ge, Yang Yu, Xiaohua Zhong, Yongli Jiao

    Published 2025-01-01
    “…The new framework alters the assumption and institutional logic of the traditional city-regionalism theory and extends its explanatory scope.…”
    Get full text
    Article
  13. 1313

    Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA by Emna Amouri, Habib Mehrez, Zied Marrakchi

    Published 2013-01-01
    “…The wave dynamic differential logic (WDDL) has been identified as a promising countermeasure to increase the robustness of cryptographic devices against differential power attacks (DPA). …”
    Get full text
    Article
  14. 1314

    Localized Multistreams for P2P Streaming by Majed Alhaisoni, Mohammed Ghanbari, Antonio Liotta

    Published 2010-01-01
    “…Another issue is that they are based on logical overlays, which are not optimized for the physical underlay infrastructure. …”
    Get full text
    Article
  15. 1315

    L’espace dialogique chez Flaubert : la « cabane de l’Ermite » et le double pupitre des copistes by Rocky Penate

    Published 2009-01-01
    “…That is to say that Antoine’s prayers are fundamentally reflexive, despite their apparent variety — they do not transcend the logic of the monologue. Bouvard and Pécuchet’s experience, on the other hand, proceed from a spirit of dialogue. …”
    Get full text
    Article
  16. 1316

    A comprehensive literature review of fuzzy differential equations with applications by Kamal Hossain Gazi, Aditi Biswas, Payal Singh, Mostafijur Rahaman, Suman Maity, Animesh Mahata, Sankar Prasad Mondal

    Published 2025-03-01
    “…Many different types of uncertain healing occur in the real-world. Fuzzy logic is an effective mathematical tool for defining the sense of non-random uncertainty. …”
    Get full text
    Article
  17. 1317

    Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol by Xiaoru Li, Xiaohong Li, Guangquan Xu, Jing Hu, Zhiyong Feng

    Published 2014-01-01
    “…In our analysis, we employ and combine the strength of extended modeling language CSP# and linear temporal logic (LTL) to verify the fairness of OMPCS protocols. …”
    Get full text
    Article
  18. 1318

    Fuzzy Assessment of Steel Deck Pavement for Long Suspension Bridge of the Fourth Nanjing Yangtze River Bridge by Jinyu Zong, Keqiang Zhang, Binggen Zhan, Rui Ma

    Published 2021-01-01
    “…To rapidly and comprehensively evaluate the schemes for pavement, a fuzzy evaluation method was introduced in this paper. A three-level logical assessment structure including 21 basic impact factors was built according to analytic hierarchy process (AHP), and the weight for each judgment matrix was determined by the Delphi method. …”
    Get full text
    Article
  19. 1319

    Human rights to Internet access and its safe use by V. V. Popov, P. I. Moskalenko, S. V. Cherkasova

    Published 2022-09-01
    “…The methodological and theoretical basis of the research are private and general scientific approaches to the study of this topic. Formal logical and comparative methods were used, as well as methods of structural analysis. …”
    Get full text
    Article
  20. 1320

    Fixed-Time Convergent Guidance Law with Impact Angle Control by Zhongtao Cheng, Hao Wu, Bo Wang, Lei Liu, Yongji Wang

    Published 2020-01-01
    “…The guidance command is continuous during the engagement without utilizing the switching logics. Unlike the existing guidance law in the literature, the fixed-time stability theory is utilized to ensure the impact angle error to converge to zero before the interception. …”
    Get full text
    Article