Showing 1 - 20 results of 60 for search '(( boolean implement (method OR methods) ) OR ( boolean implementing (method OR methods) ))*', query time: 0.22s Refine Results
  1. 1

    Determine the best place to implement groundwater artificial pond design by using two methods of boolean and AHP by Omid Bagheri Dadvokalaii, Jamal Mohammadvali samani, Javad Sarvarian

    Published 2017-05-01
    “…In this research, two methods of boolean and ahp using GIS (arc geographic information system) were used to determine the best site for implementing groundwater artificial gutters in the Garmsar plain of Semnan. …”
    Get full text
    Article
  2. 2

    Hardware implementation of Boolean functions based on the automaton model by A. A. Butov

    Published 2023-03-01
    “…Another approach can be proposed where a control device with a standard structure is synthesized from typical integrated circuits and implements a Boolean function describing the required control actions.The purpose of the work is to investigate the possibility of implementing Boolean functions using devices with a standard structure, the design of which is based on the use of a discrete automaton model.Methods. …”
    Get full text
    Article
  3. 3

    CIRCUIT IMPLEMENTATION OF VHDL-DESCRIPTIONS OF SYSTEMS OF PARTIAL BOOLEAN FUNCTIONS by P. N. Bibilo

    Published 2016-09-01
    “…Method for description of incompletely specified (partial) Boolean functions in VHDL is proposed. …”
    Get full text
    Article
  4. 4

    OPTIMIZATION PROBLEM FOR NUMBER OF LOGIC GATES NEEDED TO IMPLEMENT MULTIPLE BOOLEAN FUNCTIONS USING DECODER by M. Onai, H. Skopyk

    Published 2024-10-01
    “…An opportunity for their optimization was found in one of the ways to implement a circuit, which involves a decoder. Decoders are basic circuit components whose behavior makes it easy to implement multiple Boolean functions. …”
    Get full text
    Article
  5. 5
  6. 6

    The self-checking integrated control circuits synthesis based on the boolean complement method to "2-out-of-4" constant-weight code by D. V. Efanov, V. V. Sapozhnikov, Vl. V. Sapozhnikov, D. V. Pivovarov

    Published 2018-12-01
    “…The article describes the features of integrated control circuits implementation by the Boolean complement method. It is noted that it is possible to synthesize the structures of discrete devices, which have less structural redundancy than in situation of the control circuit implementation by the method of duplication. …”
    Get full text
    Article
  7. 7

    Technology independent optimization when implementing sparse systems of disjunctive normal forms of Boolean functions in ASIC by P. N. Bibilo, S. N. Kardash

    Published 2024-03-01
    “…The problem of choosing the best methods and programs for circuit implementation as part of digital ASIC (Application-Specific Integrated Circuit) sparse systems of disjunctive normal forms (DNF) of completely defined Boolean functions is considered. …”
    Get full text
    Article
  8. 8
  9. 9

    Models, systems, networks in economics, engineering, nature and society by S.I. Noskov, E.S. Popov

    Published 2024-11-01
    “…This goal is formalized by setting the task of automating the formation of the composition of the index set of observation numbers to implement the antirobust estimation method within the framework of the mixed estimation method by solving a linear Boolean programming problem. …”
    Article
  10. 10

    Logical optimization of Boolean nets using Shannon expansion by P. N. Bibilo, Yu. Y. Lankevich

    Published 2019-06-01
    “…Most of the developed methods of optimization of BDD-representations use the initial representations of functions systems in the form of disjunctive normal form (DNF).In the article an algorithm of minimization of nodes number of Boolean net, which is a multi-level representation of the system of fully defined Boolean function, is proposed. …”
    Get full text
    Article
  11. 11

    The search for subsystems of related functions from multilevel representation of systems of Boolean functions1 by P. N. Bibilo, A. M. Pazniak

    Published 2020-03-01
    “…One of the directions of logical optimization of multilevel representations of systems of Boolean     functions is the methods based on the search of subsystems of functions that have the same parts in the domains of functions of selected subsystems. …”
    Get full text
    Article
  12. 12

    DECODING OF STRUCTURALLY AND LOGICAL CODES by Yu. D. Ivanov, I. N. Nikolov, B. V. Lozka

    Published 2016-07-01
    “…There are shown the basic points of the generalized algorithm of decoding SLC, which is based on the method of perfect matrix arrangement (PMA) of the n-dimensional cube vertices for adequate representation and transformation of boolean functions, which is based on the method of generating sequences of variables for building the maximum coverage of the cube vertices. …”
    Get full text
    Article
  13. 13

    BISGA: Recalculating the Entire Boolean-Valued Information System from Aggregates Using a Genetic Algorithm by Salman Ali, Muhammad Sadiq Khan, Habib Shah, Harish Garg, Abdullah Alsheddy

    Published 2023-01-01
    “…Based on that concept, this paper presents an algorithm to recalculate the entire BIS through a genetic algorithm (GA), named BISGA which is more general and easy to implement than the supposition method. A solved example is presented which explains how BISGA works. …”
    Get full text
    Article
  14. 14

    Algorithms for extracting subsystems from a multilevel representation of a system of Boolean functions for joint minimization by P. N. Bibilo, N. A. Kirienko, V. I. Romanov

    Published 2024-12-01
    “…The purpose of experimental research is to determine the effectiveness of new algorithms for extracting the so-called connected subsystems from formula descriptions of the original system of Boolean functions. Subsequently each of the extracted subsystems is minimized independently of the others, but the functions that make up each connected subsystem are minimized jointly.Methods. …”
    Get full text
    Article
  15. 15

    SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS by A. V. Sokolov, O. N. Zhdanov, O. A. Ayvazian

    Published 2016-03-01
    “…In addition, the fast method of synthesis of algebraic normal form of many-valued logic functions is the basis for their software and hardware implementation.…”
    Get full text
    Article
  16. 16

    DC Bus Overcurrent Protection Scheme in Metro DC Traction Power Supply System Based on Boolean Logic Calculation by LIU Yuxing, ZHENG Chunchun, LAI Peixin, XIE Jinlian, XIE Yuehai, LIU Yajie

    Published 2025-07-01
    “…[Objective] To enable accurate determination of DC (direct current) bus overcurrent protection in metro DC traction power supply system and enhance the selectivity of fault tripping in the system, the research on a suitable DC bus overcurrent protection scheme is required without increasing equipment or current sampling circuits. [Method] The current direction and protective operation status of various circuits connected to the DC bus are analyzed under various operating conditions of metro DC traction power supply system. …”
    Get full text
    Article
  17. 17

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  18. 18

    Inverse-design topology optimization of magnonic devices using level-set method by Andrey A. Voronov, Marcos Cuervo Santos, Florian Bruckner, Dieter Suess, Andrii V. Chumak, Claas Abert

    Published 2025-05-01
    “…Abstract The inverse design approach in magnonics exploits the wave nature of magnons and machine learning to develop logical devices with functionalities that exceed the capabilities of analytical methods. While promising for analog, Boolean, and neuromorphic computing, current implementations face memory limitations that hinder the design of complex systems. …”
    Get full text
    Article
  19. 19
  20. 20

    A SYSTEMATIC REVIEW ON THE IMPLEMENTATION OF LEAN HOSPITAL TO IMPROVE CHEMOTHERAPY UNIT SERVICES IN HOSPITAL by Evelyn Hemme Tambunan

    Published 2025-04-01
    “…Despite some methodological variations, the evidence supports lean methods as a cost-effective strategy for optimizing care delivery. …”
    Get full text
    Article