-
1
Determine the best place to implement groundwater artificial pond design by using two methods of boolean and AHP
Published 2017-05-01“…In this research, two methods of boolean and ahp using GIS (arc geographic information system) were used to determine the best site for implementing groundwater artificial gutters in the Garmsar plain of Semnan. …”
Get full text
Article -
2
Hardware implementation of Boolean functions based on the automaton model
Published 2023-03-01“…Another approach can be proposed where a control device with a standard structure is synthesized from typical integrated circuits and implements a Boolean function describing the required control actions.The purpose of the work is to investigate the possibility of implementing Boolean functions using devices with a standard structure, the design of which is based on the use of a discrete automaton model.Methods. …”
Get full text
Article -
3
CIRCUIT IMPLEMENTATION OF VHDL-DESCRIPTIONS OF SYSTEMS OF PARTIAL BOOLEAN FUNCTIONS
Published 2016-09-01“…Method for description of incompletely specified (partial) Boolean functions in VHDL is proposed. …”
Get full text
Article -
4
OPTIMIZATION PROBLEM FOR NUMBER OF LOGIC GATES NEEDED TO IMPLEMENT MULTIPLE BOOLEAN FUNCTIONS USING DECODER
Published 2024-10-01“…An opportunity for their optimization was found in one of the ways to implement a circuit, which involves a decoder. Decoders are basic circuit components whose behavior makes it easy to implement multiple Boolean functions. …”
Get full text
Article -
5
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Get full text
Article -
6
The self-checking integrated control circuits synthesis based on the boolean complement method to "2-out-of-4" constant-weight code
Published 2018-12-01“…The article describes the features of integrated control circuits implementation by the Boolean complement method. It is noted that it is possible to synthesize the structures of discrete devices, which have less structural redundancy than in situation of the control circuit implementation by the method of duplication. …”
Get full text
Article -
7
Technology independent optimization when implementing sparse systems of disjunctive normal forms of Boolean functions in ASIC
Published 2024-03-01“…The problem of choosing the best methods and programs for circuit implementation as part of digital ASIC (Application-Specific Integrated Circuit) sparse systems of disjunctive normal forms (DNF) of completely defined Boolean functions is considered. …”
Get full text
Article -
8
-
9
Models, systems, networks in economics, engineering, nature and society
Published 2024-11-01“…This goal is formalized by setting the task of automating the formation of the composition of the index set of observation numbers to implement the antirobust estimation method within the framework of the mixed estimation method by solving a linear Boolean programming problem. …”
Article -
10
Logical optimization of Boolean nets using Shannon expansion
Published 2019-06-01“…Most of the developed methods of optimization of BDD-representations use the initial representations of functions systems in the form of disjunctive normal form (DNF).In the article an algorithm of minimization of nodes number of Boolean net, which is a multi-level representation of the system of fully defined Boolean function, is proposed. …”
Get full text
Article -
11
The search for subsystems of related functions from multilevel representation of systems of Boolean functions1
Published 2020-03-01“…One of the directions of logical optimization of multilevel representations of systems of Boolean functions is the methods based on the search of subsystems of functions that have the same parts in the domains of functions of selected subsystems. …”
Get full text
Article -
12
DECODING OF STRUCTURALLY AND LOGICAL CODES
Published 2016-07-01“…There are shown the basic points of the generalized algorithm of decoding SLC, which is based on the method of perfect matrix arrangement (PMA) of the n-dimensional cube vertices for adequate representation and transformation of boolean functions, which is based on the method of generating sequences of variables for building the maximum coverage of the cube vertices. …”
Get full text
Article -
13
BISGA: Recalculating the Entire Boolean-Valued Information System from Aggregates Using a Genetic Algorithm
Published 2023-01-01“…Based on that concept, this paper presents an algorithm to recalculate the entire BIS through a genetic algorithm (GA), named BISGA which is more general and easy to implement than the supposition method. A solved example is presented which explains how BISGA works. …”
Get full text
Article -
14
Algorithms for extracting subsystems from a multilevel representation of a system of Boolean functions for joint minimization
Published 2024-12-01“…The purpose of experimental research is to determine the effectiveness of new algorithms for extracting the so-called connected subsystems from formula descriptions of the original system of Boolean functions. Subsequently each of the extracted subsystems is minimized independently of the others, but the functions that make up each connected subsystem are minimized jointly.Methods. …”
Get full text
Article -
15
SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS
Published 2016-03-01“…In addition, the fast method of synthesis of algebraic normal form of many-valued logic functions is the basis for their software and hardware implementation.…”
Get full text
Article -
16
DC Bus Overcurrent Protection Scheme in Metro DC Traction Power Supply System Based on Boolean Logic Calculation
Published 2025-07-01“…[Objective] To enable accurate determination of DC (direct current) bus overcurrent protection in metro DC traction power supply system and enhance the selectivity of fault tripping in the system, the research on a suitable DC bus overcurrent protection scheme is required without increasing equipment or current sampling circuits. [Method] The current direction and protective operation status of various circuits connected to the DC bus are analyzed under various operating conditions of metro DC traction power supply system. …”
Get full text
Article -
17
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
18
Inverse-design topology optimization of magnonic devices using level-set method
Published 2025-05-01“…Abstract The inverse design approach in magnonics exploits the wave nature of magnons and machine learning to develop logical devices with functionalities that exceed the capabilities of analytical methods. While promising for analog, Boolean, and neuromorphic computing, current implementations face memory limitations that hinder the design of complex systems. …”
Get full text
Article -
19
-
20
A SYSTEMATIC REVIEW ON THE IMPLEMENTATION OF LEAN HOSPITAL TO IMPROVE CHEMOTHERAPY UNIT SERVICES IN HOSPITAL
Published 2025-04-01“…Despite some methodological variations, the evidence supports lean methods as a cost-effective strategy for optimizing care delivery. …”
Get full text
Article