共查询到20条相似文献,搜索用时 31 毫秒
1.
A method is proposed for the identification of nonlinear dependences on the basis of a composition of a fuzzy knowledge base
and a neural network. The structure of a neurofuzzy network that is isomorphic to a system of linguistic statements of the
form “if-then” is specified, and analytical models for training are obtained. The efficiency of the proposed method of identification
is illustrated by a computer experiment.
Translatedfrom Kibernetika i Sistemnyi Analiz, No. 2, pp. 37–44, March–April, 2000 相似文献
2.
An approach is proposed to solving inventory control problems using information available on current demand and stock. The
approach is based on identification of nonlinear dependences using fuzzy knowledge bases. By tuning a fuzzy model against
a learning sample, model control actions can be made very close to an expert’s decision. This approach can further be developed
by creating adaptive (neuro-fuzzy) inventory control models for enterprises and trading companies.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 3, pp. 123–133, May–June 2006. 相似文献
3.
B. Steinsky 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2003,7(5):350-356
We use an adaptation of the Prüfer code for trees to encode labeled directed acyclic graphs, which are often abbreviated
to DAGs (or ADGs). In this paper, each DAG is assigned a unique DAG code, which allows an easy handling for several purposes.
The set of all possible DAG codes (and therefore the set of all DAGs) for a fixed number of n vertices can be generated efficiently. Furthermore, we are able to rank DAGs, i.e., we provide an algorithm that assigns
every DAG a unique number in the set {0,…,a
n
−1}, where a
n
is the cardinality of the set of labeled DAGs with n≥1 vertices, and we are able to unrank DAGs, which is the inverse operation. We also gain recurrence relations, which can
be used to calculate a
n
and a
n,q
, i.e., the number of DAGs with n vertices and q edges. Finally, it is possible to generate, enumerate, rank and unrank DAGs with given number of edges and also DAGs with
bounded indegree.
RID="*"
ID="*" This research was supported by the Austrian Science Fund (FWF), P13261-INF.
I want to thank the reviewers, specially the one who suggested to add the algorithm for unranking DAG codes, for reading
the paper very carefully and for the helpful comments. 相似文献
4.
This paper generalizes the method of identification of nonlinear dependences by a fuzzy knowledgebase to the case of fuzzy
training sets. In such a set, terms are used to estimate inputs. The computer experiments performed showed that the fuzziness
of experimental data is no obstacle to identification. The use of fuzzy training sets allows one to apply the proposed method
to the identification of "input-output" dependences in medicine, economics, sociology, politics, and other areas in which
experimental data are based on expert judgments.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 17–24, March–April 2006.
An erratum to this article is available at . 相似文献
5.
A method is proposed for comparative structural-parametric identification of a model of individual multifactor estimation.
An experimental solution to this problem is obtained using evolutionary methods.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 151–159, January–February 2007. 相似文献
6.
An analysis of the problem of isomorphism of natural modular graphs is continued. New results are obtained for regular graphs
of degree 4. The general approach to the analysis of arbitrary regular NM-graphs is developed, which brings close to solving
the isomorphism problem for a given class of numerical graphs.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 95–103, January–February 2006. 相似文献
7.
We consider distribution-free property-testing of graph connectivity. In this setting of property testing, the distance between
functions is measured with respect to a fixed but unknown distribution D on the domain, and the testing algorithm has an oracle access to random sampling from the domain according to this distribution D. This notion of distribution-free testing was previously defined, and testers were shown for very few properties. However,
no distribution-free property testing algorithm was known for any graph property.
We present the first distribution-free testing algorithms for one of the central properties in this area—graph connectivity
(specifically, the problem is mainly interesting in the case of sparse graphs). We introduce three testing models for sparse
graphs:
We prove that connectivity can be tested in each of these testing models, in a distribution-free manner, using a number of
queries that is independent of the size of the graph. This is done by providing a new analysis to previously known connectivity
testers (from “standard”, uniform distribution property-testing) and by introducing some new testers.
An extended abstract of this work appeared in the proceedings of RANDOM-APPROX 2004. 相似文献
• | A model for bounded-degree graphs, |
• | A model for graphs with a bound on the total number of edges (both models were already considered in the context of uniform distribution testing), and |
• | A model which is a combination of the two previous testing models; i.e., bounded-degree graphs with a bound on the total number of edges. |
8.
V. A. Perepelitsa I. V. Sergienko A. M. Kochkarov 《Cybernetics and Systems Analysis》1999,35(4):572-585
Definitions of prefractal and fractal graphs are introduced, and they are used to formulate mathematical models in different
fields of knowledge. The topicality of fractal-graph recognition from the point of view of fundamental improvement in the
efficiency of the solution of algorithmic problems is emphasized. The class of polynomial algorithms for recognition of the
prefractality of those graphs is proposed and rigorously substantiated.
Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 72–89, July–August, 1999. 相似文献
9.
Ya. E. Romm 《Cybernetics and Systems Analysis》2007,43(2):291-302
The stability of a sorting-based scheme for identifying polynomial zeros under coefficient perturbation is discussed. A method
is proposed for simultaneous reconstruction (with a logarithmic estimate of time complexity) of the coefficients of an arbitrary
polynomial from the values of its zeros. The method of identification of polynomial zeros is based on the operator of localization
of extremal elements of a numerical sequence after its preliminary sorting. The method is extended to pattern recognition.
Part I of this article is published in No. 1 (2007).
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 161–174, March–April 2007. 相似文献
10.
A. N. Voronin 《Cybernetics and Systems Analysis》2009,45(4):597-604
The concept of a nonlinear compromise scheme in multicriteria problems of evaluation and optimization is presented. It is
shown that the problem is to approximate correctly the utility function and construct a substantial mathematical model (scalar
convolution) adequate to the given situation to solve various multicriteria problems. In analysis problems, this convolution
is an objective function. Its extremization results in a compromise-optimal vector of arguments. An illustrative example is
given.
Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 106–114, July–August 2009. 相似文献
11.
Structural models of algorithms in problems of applied programming. I. Formal algorithmic structures
A structural approach to modelling algorithms is proposed. The concept of an algorithmic structure with operations over algorithms
is introduced. Models of algorithms constructed from algorithmic structures reflect aspects of algorithm representation and
execution. Examples of structural and path models of algorithms are considered.
Translated from Kibernetika i Sistemnyi Analiz, No. 3, pp. 3–14, May-June 2009. 相似文献
12.
D. A. Alekseyev 《Cybernetics and Systems Analysis》1999,35(4):666-675
This paper deals with models of demand-supply problems. A scheme of virtually organized computer support of the solution of
such problems is discussed.
Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 174–183, July–August, 1999. 相似文献
13.
Akio Fujiyoshi 《Theoretical computer science》2010,411(38-39):3493-3506
In this paper, we study tree automata for directed acyclic graphs (DAGs). We define the movement of a tree automaton on a DAG so that a DAG is accepted by a tree automaton if and only if the DAG has a spanning tree accepted by the tree automaton. We call this automaton a spanning tree automaton. The NP-completeness of the membership problem of DAGs for spanning tree automata is shown. However, if inputs are restricted to series–parallel graphs or generalized series–parallel graphs, it is shown that the membership problem for spanning tree automata is solvable in linear time. 相似文献
14.
P. I. Stetsyuk 《Cybernetics and Systems Analysis》2006,42(1):54-64
New quadratic models are proposed to improve the upper-bound estimates in the maximum weighted cut problem. They are found
by two original methods for deriving redundant quadratic constraints. A well-known linear model is shown to follow from the
models proposed. Recommendations on how to develop its strengthened analogs are given.
This study is partially sponsored from the grant UM2-2574-KV-03 (CRDF Cooperative Grants Program).
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 63—75, January–February 2006. 相似文献
15.
The problem on a mathematical safe is formulated and studied in terms of graph theory. The cases of simplest digraphs such
as paths, contours, and doubly connected components are analyzed. A number of statements on the existence of solutions to
these problems are proved. The results obtained are extended to the case of corresponding nondirected graphs.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 3, pp. 3–14, May–June 2006. 相似文献
16.
Secure data sharing in third-party environments such as the cloud requires that both authenticity and confidentiality of the data be assured, especially when such structures encode sensitive information (such as in XML documents). Existing authentication schemes for trees and directed acyclic graphs (DAGs) are authenticity-preserving, but not confidentiality-preserving, and lead to leakage of sensitive information during authentication. In this paper, we propose a family of three leakage-free authentication schemes for (1) tree data structures, (2) directed acyclic graphs (DAGs), and (3) graphs (with cycles), which are also efficient. This family of schemes referred to as the “structural signatures” is based on the structure of the tree as defined by tree traversals and aggregate signatures. We also show through complexity and performance analysis that our scheme is practical in terms of the cost for authentication of data. We have also discussed two applications of the proposed scheme: (1) automatic correction and recovery from structural errors, and (2) secure publish /subscribe of XML documents. 相似文献
17.
A. S. Balabanov 《Cybernetics and Systems Analysis》2008,44(6):803-815
This paper considers some properties of (locally) minimal separators in oriented graphical dependency models, i.e., in Bayesian
networks, Gaussian networks, and hybrid networks. Statements and rules are inferred from the criterion of d-separation and
acyclic property of digraph. Necessary conditions are established that should be satisfied by members of (locally) minimal
separators. Patterns of evidences are found that allow one to identify the presence or absence of an edge without an extensive
search for a separator. These means facilitate the efficient inference of a model structure with the help of constraint-based
algorithms.
Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 17–32, November–December 2008. 相似文献
18.
For given two sets of locks, the corresponding problems on mathematical safes are formulated on graphs. In the first set,
all the locks have the same number of sates and, in the second set, any pair of locks can consist of different numbers of
sates. A number of conditions are obtained under which there exist solutions to these problems for safes specified on directed
or undirected single graphs such as a path, a chain, a cycle, and a star.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 5, pp. 14–21, September–October 2006. 相似文献
19.
A. E. Doroshenko 《Cybernetics and Systems Analysis》1995,31(6):818-834
Conclusion We have considered dynamic models of parallel computations and transformation algorithms for macropipelined programs that
increase the internal exchange asynchronism of the parallel components. The models generalize the well-known CSP synchronous
exchange paradigm (the rendezvous mechanism) [18] and provide a theoretical justification for the development of a whole range
of interconnected semantic models of asynchronous computation with increasing degree of exchange asynchronism. Some publications
ensure asynchronous exchange only by buffering [15, 16]. The dynamic model approach developed in this study combines buffering
and analysis of data dependences of the exchange operators. It not only reduces losses associated with synchronization of
communicating parallel processes, but also ensures automatic resolution of some classes of data exchange deadlocks. Experience
with dynamic models as a means of increasing the efficiency of macropipelined programs and multilevel memory in multiprocessor
systems [12, 17] can be applied in other programming systems and parallel program design systems of both compiling (S1, S2) and interpreting (S3) type.
Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 45–65, November–December, 1995. 相似文献
20.
A self-organizing map for adaptive processing of structured data 总被引:1,自引:0,他引:1
Recent developments in the area of neural networks produced models capable of dealing with structured data. Here, we propose the first fully unsupervised model, namely an extension of traditional self-organizing maps (SOMs), for the processing of labeled directed acyclic graphs (DAGs). The extension is obtained by using the unfolding procedure adopted in recurrent and recursive neural networks, with the replicated neurons in the unfolded network comprising of a full SOM. This approach enables the discovery of similarities among objects including vectors consisting of numerical data. The capabilities of the model are analyzed in detail by utilizing a relatively large data set taken from an artificial benchmark problem involving visual patterns encoded as labeled DAGs. The experimental results demonstrate clearly that the proposed model is capable of exploiting both information conveyed in the labels attached to each node of the input DAGs and information encoded in the DAG topology. 相似文献