Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 49
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

We discuss epistemological and methodological aspects of the Bayesian approach in astrophysics and cosmology. The introduction to the Bayesian framework is given for a further discussion concerning the Bayesian inference in physics. The interplay between the modern cosmology, Bayesian statistics, and philosophy of science is presented. We consider paradoxes of confi rmation, like Goodman’s paradox, appearing in the Bayesian theory of confirmation. As in Goodman’s paradox the Bayesian inference is susceptible to some epistemic limitations in the logic of induction. However, Goodman’s paradox applied to cosmological hypotheses seems to be resolved due to the evolutionary character of cosmology and the accumulation of new empirical evidence. We argue that the Bayesian framework is useful in the context of falsifiability of quantum cosmological models, as well as contemporary dark energy and dark matter problem.

Go to article

Authors and Affiliations

Jakub Mielczarek
Marek Szydłowski
Adam Krawiec
Paweł Tambor
Download PDF Download RIS Download Bibtex

Abstract

The purpose of this paper is to demonstrate how Bertrand Russell depicts the relation of mysticism to three other areas of human activity: philosophy, science, and religion, and thus: its special role. In his essay Mysticism and Logic (1914), Russell defines mystical thinking as beliefs in (1) the existence of special insight, (2) the unity of all things, (3) the unreality of time, and (4) the effacement of the boundaries between good and evil. Although he considers full mysticism – as a belief about the ontic structure of the world – to be erroneous – as a life attitude he attributes to it an element of wisdom that is lacking in other areas of human intellectual activity. Mysticism proves wrong also at the epistemological level, i.e. as a certain test of truth. But in its spirit of inquiry, it contains something that science also benefits from, and from which, therefore, scientific philosophy should take its cue. What additionally gives mysticism its value is the claim of impartial contemplation which gives rise to an attitude of love towards the whole world. Significantly, it was the combination of the best features of mystical thinking with scientific thinking and method which gave rise to Russell’s advocacy of scientific philosophy. In light of this, I argue that according to Russell mysticism is not an exclusively religious phenomenon, which is demonstrated, among other things, by the fact that he attributes two aspects of mysticism to the field of mathematics.
Go to article

Authors and Affiliations

Tatiana Barkovskiy
1
ORCID: ORCID

  1. Uniwersytet Warszawski, Wydział Filozofii, ul. Krakowskie Przedmieście 3, 00-047 Warszawa
Download PDF Download RIS Download Bibtex

Abstract

In this paper I present Bertrand Russell’s contacts with Polish readers and outstanding Polish writers. In paragraphs 2 and 3 I discuss books by Russell that were published in Poland and mention his personal contacts and correspondence. Russell exchanged letters with L. Chwistek, J. Conrad‑Korzeniowski, M. Dziewicki, G. Herling-‑Grudziński, S. Leśniewski, W. Lutosławski and A. Tarski. Interesting comments on his philosophy were offered by M. Ossowska, K. Twardowski, J. Salamucha and M. Heitzman. Paragraphs 4 and 5 discuss the influence that Russell’s logical ideas have exerted on the development of logic in Poland, especially in the works of L. Chwistek and S. Leśniewski.
Go to article

Authors and Affiliations

Jan Woleński
1
ORCID: ORCID

  1. Wyższa Szkoła Informatyki i Zarządzania w Rzeszowie, Katedra Nauk Spo-łecznych, ul. Sucharskiego 2, 35-225 Rzeszów
Download PDF Download RIS Download Bibtex

Abstract

An enormous output of Bertrand Russell breaks down into three groups. The first consists of works on logic, especially on philosophy of mathematics. But the program of reducing mathematics to logic, instead of providing certainty that Russell was looking for, multiplied our doubts. As a by‑product of these works, a program of logical analysis of ordinary language emerged and exerted a huge impact on the history of philosophy of the 20th century. But it did not fulfil the original hopes connected with it. The second group contains results of ontological and epistemological investigations. Here Russell achieved nothing, and what he proposed lay beyond the mainstream of 20th‑century ontology and epistemology. The third group was an outline of a social utopia, addressed to the general public. Professional philosophers ignored these works by Russell, and as a possible program to build a better world, they have become obsolete.
Go to article

Authors and Affiliations

Wojciech Sady
1
ORCID: ORCID

  1. Uniwersytet Śląski w Katowicach, Instytut Filozofii, ul. Bankowa 11, 40-007 Katowice
Download PDF Download RIS Download Bibtex

Abstract

This paper presents novel approach to the Huffman’s asynchronous sequential circuit two valued Boolean switching system design. The algorithm is implemented as software using distributed, service oriented application model with means of the web service component design. It considers method implementation challenges, both towards Moore and Mealy structures with particular respect to the estimation of the Huffman’s minimization algorithm computational complexity. The paper provides implementation details, theoretical model estimation and experimental results that acknowledge the theoretical approach in practice. This paper also examine the multistep design process implementation and its problems inherent in web service based environment both for development and educational purposes.

Go to article

Authors and Affiliations

Piotr Czekalski
Krzysztof Tokarz
Bolesław Pochopień
Download PDF Download RIS Download Bibtex

Abstract

The article introduces a new proposal of a defuzzification method, which can be implemented in fuzzy controllers. The first chapter refers to the origin of fuzzy sets. Next, a modern development based on this theory is presented in the form of ordered fuzzy numbers (OFN). The most important characteristics of ordered fuzzy numbers are also presented. In the following chapter, details about the defuzzification process are given as part of the fuzzy controller model. Then a new method of defuzzification is presented. The method is named center of circles intersection (CCI). The authors compare this method with a similar geometric solution: triangular expanding (TE) and geometric mean (GM). Also, the results are compared with other methods such as center of gravity (COG), first of maxima (FOM) and last of maxima (LOM). The analysis shows that the proposed solution works correctly and provides results for traditional fuzzy numbers as well as directed fuzzy numbers. The last chapter contains a summary, in which more detailed conclusions are provided and further directions of research are indicated.

Go to article

Authors and Affiliations

H. Zarzycki
W.T. Dobrosielski
Ł. Apiecionek
T. Vince
Download PDF Download RIS Download Bibtex

Abstract

The reflection proposed in this article starts from the realities of the border and the sea, and from the problematic meaning they assumed in the frame of the city of Fiume (Rijeka) in the early twentieth century. The main goal is to explore how in the work of Enrico Morovich, an Italian writer coming from Fiume who had to personally and tragically experience war and exile, the border and the sea act as devices of literary creation, providing models of humorous reversal (the border) and symmetrical thinking (the sea). The analysis will focus in particular on the following works by Morovich: Cronache vicine e lontane (1981), La nostalgia del mare (1981), Un italiano di Fiume (1994).
Go to article

Bibliography

1. BACHTIN, M. M. (1979): “Autor i geroj v èstetičeskoj dejatel’nosti”, in ID.: Èstetika slovesnogo tvončestva, pod redaktsiyey S. G. Bočarov/S. S. Averincev, Iskusstvo, Moskva, 9–192.
2. ID. (1988): “L’autore e l’eroe nell’attività estetica”, in: ID.: L’autore e l’eroe. Teoria letteraria e scienze umane, a cura e trad. it. di C. STRADA JANOVIČ, Einaudi, Torino, 5–187.
3. BELLABARBA, M. (2014a): L’impero asburgico, Il Mulino, Bologna.
4. ID. (2014b): “Un impero multinazionale nella guerra delle nazioni. Lo strano caso dell’impero asburgico”, Studium, 110/6, 830–840.
5. BORONI, C. (2015): “Prefazione” a: MOROVICH, E.: I racconti per il “Giornale di Brescia”, a cura di C. BORONI, La Compagnia della Stampa Massetti Rodella Editori, Brescia, 13–57.
6. CIMADOR, G. (2018): “Bruno Maier: forme, categorie, aspetti del comico”, Archeografo Triestino, Serie IV, vol. LXXVIII (CXXVI della Raccolta), Trieste, 179–253.
7. D’ALESSANDRO, L. (2014): Mediterraneo crocevia di storia e culture: un caleidoscopio di immagini, Harmattan Italia, Torino.
8. MATTE BLANCO, I. (1975): The unconscious as infinite sets. An essay in bi‑logic, Duckworth, London.
9. MATVEJEVIĆ, P. (2006): Breviario del Mediterraneo, trad. it. di S. Ferrari, Garzanti, Milano.
10. MOROVICH, E. (1981a): Cronache vicine e lontane, San Marco dei Giustiniani, Genova.
11. ID. (1981b): La nostalgia del mare, Unimedia, Genova.
12. ID. (1985): Racconti di Fiume e altre cose, Compagnia dei Librai, Genova.
13. ID. (1988): Miracoli quotidiani, Sellerio, Palermo.
14. ID. (1994): Un italiano di Fiume, Rusconi, Milano.
15. ID. (2014): “Per una storia di Fiume”, Fiume. Rivista di studi adriatici, 29, 3–30.
16. MOROVICH, E./ VERDINO, S. (1990): Intervista a Enrico Morovich. Realizzata dal professor Stefano Verdino 21 novembre 1990, a cura della Provincia di Genova, Fondazione Mario Novaro, s.n., Genova, I: https://www.youtube.com/watch?v=MUQxNu7v2L8&t=290s; II: https://www. youtube.com/watch?v=4Rc1PI7L2_A; III: https://www.youtube.com/watch?v=YkWN9- sYE7rk; IV: https://www.youtube.com/watch?v=ebQybG9MjcA&t=9s.
17. ROMBI, B. (1997): Morovich oltre i confini, Editrice Liguria, Savona.
18. STELLI, G. (a cura di) (2006): Fiume, crocevia di popoli e culture, Atti del convegno internazionale, Roma, 27 ottobre 2005, Società di studi fiumani, Roma.

Go to article

Authors and Affiliations

Novella Di Nunzio
1

  1. Vilniaus Universitetas, Vilnius
Download PDF Download RIS Download Bibtex

Abstract

Quantum logic emerged in the 1930s as a response to the question of whether the conceptual changes initiated in physics by quantum mechanics required a revision of logic. In the English-language literature, John von Neumann is considered the founder of quantum logic, while the Polish literature points to Zygmunt Zawirski. Zawirski was the first researcher who suggested that quantum mechanics may follow a different logic than classical logic. He was the first researcher in the field of manyvalued quantum logic, but his influence ultimately proved to be limited. John von Neumann, on the other hand, along with Garrett Birkhoff, started the now dominant field of algebraic quantum logic. It turns out that despite their differences in assumptions and methods, what they have in common is their commitment to subjecting the design of quantum logic to two requirements - consideration of Heisenberg's indeterminacy principle and reconciliation of the resulting logic with probability calculus.
Go to article

Authors and Affiliations

Elżbieta Drozdowska
1

  1. Katolicki Uniwersytet Lubelski
Download PDF Download RIS Download Bibtex

Abstract

A novel dual mode logic (DML) model has a superior energy-performance compare to CMOS logic. The DML model has unique feature that allows switching between both modes of operation as per the real-time system requirements. The DML functions in two dissimilar modes (static and dynamic) of operation with its specific features, to selectively obtain either low-energy or high-performance. The sub-threshold region DML achieves minimum-energy. However, sub-threshold region consequence in performance is enormous. In this paper, the working of DML model in the moderate inversion region has been explored. The near-threshold region holds much of the energy saving of subthreshold designs, along with improved performance. Furthermore, robustness to supply voltage and sensitivity to the process temperature variations are presented. Monte carol analysis shows that the projected near-threshold region has minimum energy along with the moderate performance.

Go to article

Authors and Affiliations

Pavankumar Bikki
Download PDF Download RIS Download Bibtex

Abstract

Selected scientific contacts of Jacek Hawranek and Jan Zygmunt with Professor Bogusław Wolniewicz in the period from the end of the 1980s to the beginning of the 21st century are presented in this essay. They concerned the algebraic aspects of the ontology of situations and from one moment – one only question that was posed by Wolniewicz in his note A question about join-semilattices (Bulletin of the Section of Logic, 19/3, 1990, pp. 108–108), and resulted in the Hawranek & Zygmunt paper Wokół pewnego zagadnienia z dziedziny półkrat górnych z jednością (“Some comments on a question about semilattices with unit”) (Acta Universitatis Wratislaviensis 1445, Logika 15 (1993), pp. 59–68) containing an answer to Wolniewicz’s question. The Hawranek & Zygmunt paper is reprinted below, and the essay might be also treated as a kind of an analytical and historical introduction to it. The story of contacts Wolniewicz – Hawranek & Zygmunt has been told with the help of the preserved correspondence between the three persons. In his letters Professor Wolniewicz appears as a passionate researcher, open to discussion, ready to share his research successes and difficulties with others.

Go to article

Authors and Affiliations

Jan Zygmunt
Download PDF Download RIS Download Bibtex

Abstract

In the article I indicate and synthetically discuss issues that can be found in the achievements of Bertrand Russell, and which can be included in the domain of metaphilosophy. I point to Russell’s philosophical inspirations and to his views on philosophy. His views are intertwined with the threads of the traditional understanding of philosophy and innovative elements. These innovative elements include assigning a special role to mathematical logic, of which Russell is one of the founders, and emphasizing the role of analysis in philosophical research. It is also characteristic of him to emphasize the role of science for philosophical reflection. At the same time, however, Russell rejects the radical slogans of logical positivism. This justifies the thesis that in his oeuvre there are threads of both traditional and innovative understanding of philosophy and its tasks.
Go to article

Authors and Affiliations

Ryszard Kleszcz
1
ORCID: ORCID

  1. Uniwersytet Łódzki, Instytut Filozofii, ul. Lindleya 3/5, 90-131 Łódź
Download PDF Download RIS Download Bibtex

Abstract

The operational mineral deposit reconnaissance tends to evaluate its parameters to conduct safe and profitable production. Particular deposit parameters, important from the point of mineral deposit management, are estimated on the basis of observations carried out by mining geological surveys. These observations usually involve sampling, drilling, laboratory analyses and others. The use of fuzzy description to assess the parameters of the mineral deposit was proposed in the paper. In the fuzzy characteristics, an imprecise descriptive description appeared in place of a particular numerical quantity. This approach was used to description of the ore deposit features (metal content, volume, and metal yield) by assigning them specific characteristic functions, whose distributions were based on basic statistical quantities. Characteristic functions can be used to prepare operational strategies for any configuration of required deposit parameters resulting from the production management needs. For this purpose, selected logical operators of fuzzy sets were used. In the next approach to fuzzy modeling, an opportunity to characterize the deposit in a subjective approach was indicated, where the assessment of the deposit parameters is based on rough, in some way, discretionary observation and evaluation. Such model construction enabled the overall assessment of the deposit from the point of view of any parameters. Through the implementation of appropriate inference rules, adequate fuzzy control planes were obtained, which may also be useful in the context of operational mine strategy planning.

Go to article

Authors and Affiliations

Mariusz Krzak
Paweł Panajew
Download PDF Download RIS Download Bibtex

Abstract

The basis for a mineral deposit delimitation is a qualitative and quantitative assessment of deposit parameters, qualifying a deposit as an economically valuable object. A conventional approach to the mineral deposit recognition and a deposit detailed parameters qualification in the initial stages of development work in the KGHM were presented in the paper. The goals of such recognition were defined, which through a gradual detailed expansion, resulting from the information inflow, allows for the construction of a more complete decision-making model. The description of the deposit parameters proposed in the article in the context of fuzzy logic, enables a presentation of imprecise statements and data, which may be a complement to a traditional description. Selected non-adjustable and adjustable s-norm and t-norm operators were demonstrated. Operators effects were tested for selected ore quality parameters (copper content and deposit thickness) by constructing adequate membership functions. In a practical application, the use of chosen fuzzy logic operators is proposed for the assessment of the qualitative parameters of copper-silver ore in the exploitation blocks for one of the mines belonging to KGHM Polish Copper S.A. The considerations have been extended by including the possibility of using compensation operators.

Go to article

Authors and Affiliations

Mariusz Krzak
Paweł Panajew
Download PDF Download RIS Download Bibtex

Abstract

Hydrocarbon production under certain geological conditions of these deposits can cause surface subsidence and deformation of the terrain surface. Such deformations appear as subsidence troughs of considerable range and the magnitude of the subsidence depending on the total thickness of the reservoir, compaction properties of reservoir and on the number of other factors. In the past there have been widely recognized magnitudes of the subsidence up to 9 meters. The stress zones in the subsidence trough may affect the buildings and surface structures. However there have been well known some cases of destroyed boreholes or pipelines belonging to the gas or oil mine. Therefore there is a requirement to analyze the possibility of occurrence unfavorable phenomenon on the ground surface, to monitor surface deformations during production and to protect surface infrastructure located in the range of mining influences. In the paper the issue of surface subsidence caused by hydrocarbon production has been presented. The cause - effect relationship between the compaction of thereservoir rock and the subsidence of surface area has been assumed. The prediction model base on the influence function and on the superposition of elementary influences. For the purpose of building damage protection a new model of risk assessment has been developed. This model base on the elements of fuzzy logicallows to incorporate in the analysis the quantitative and qualitative factors that contribute to the risk of building damage. Use of the fuzzy logic made it possible to obtain one value which clearly discriminate the risk of buildings damage. However, risk analyzes of damage to the large number of buildings has been required additional tools. The spatial analysis has been made by using GIS. The subjects of the paper have been illustrated with a practical example.

Go to article

Authors and Affiliations

Ryszard Hejmanowski
Agnieszka Malinowska
Download PDF Download RIS Download Bibtex

Abstract

In this paper the new synthesis method for reversible networks is proposed. The method is suitable to generate optimal circuits. The examples will be shown for three variables reversible functions but the method is scalable to larger number of variables. The algorithm could be easily implemented with high speed execution and without big consuming storage software. Section 1 contains general concepts about the reversible functions. In Section 2 there are presented various descriptions of reversible functions. One of them is the description using partitions. In Section 3 there are introduced the cascade of the reversible gates as the target of the synthesis algorithm. In order to achieve this target the definitions of the rest and remain functions will be helpful. Section 4 contains the proposed algorithm. There is introduced a classification of minterms distribution for a given function. To select the successive gates in the cascade the condition of the improvement the minterms distribution must be fulfilled. Section 4 describes the algorithm how to improve the minterms distributions in order to find the optimal cascade. Section 5 shows the one example of this algorithm.

Go to article

Authors and Affiliations

Andrzej Skorupski
Krzysztof Gracki
Download PDF Download RIS Download Bibtex

Abstract

Wireless Sensor Networks (WSN) acquired a lot of attention due to their widespread use in monitoring hostile environments, critical surveillance and security applications. In these applications, usage of wireless terminals also has grown significantly. Grouping of Sensor Nodes (SN) is called clustering and these sensor nodes are burdened by the exchange of messages caused due to successive and recurring re-clustering, which results in power loss. Since most of the SNs are fitted with nonrechargeable batteries, currently researchers have been concentrating their efforts on enhancing the longevity of these nodes. For battery constrained WSN concerns, the clustering mechanism has emerged as a desirable subject since it is predominantly good at conserving the resources especially energy for network activities. This proposed work addresses the problem of load balancing and Cluster Head (CH) selection in cluster with minimum energy expenditure. So here, we propose hybrid method in which cluster formation is done using unsupervised machine learning based kmeans algorithm and Fuzzy-logic approach for CH selection.
Go to article

Authors and Affiliations

Basavaraj M. Angadi
1
Mahabaleshwar S. Kakkasageri
1

  1. Faculty of Electronics and Communication Engineering Department,Basaveshwar Engineering College, Bagalkote, Karnataka, INDIA
Download PDF Download RIS Download Bibtex

Abstract

This paper is focused on multiple soft fault diagnosis of linear time-invariant analog circuits and brings a method that achieves all objectives of the fault diagnosis: detection, location, and identification. The method is based on a diagnostic test arranged in the transient state, which requires one node accessible for excitation and two nodes accessible for measurement. The circuit is specified by two transmittances which express the Laplace transform of the output voltages in terms of the Laplace transform of the input voltage. Each of these relationships is used to create an overdetermined system of nonlinear algebraic equations with the circuit parameters as the unknown variables. An iterative method is developed to solve these equations. Some virtual solutions can be eliminated comparing the results obtained using both transmittances. Three examples are provided where laboratory or numerical experiments reveal effectiveness of the proposed method.
Go to article

Bibliography

[1] A. Guney, G. Önal and T. Atmaca, “New aspect of chromite gravity tailings re-processing”, Minerals Engineering, Vol., 24, no 11, pp. 1527- 1530, 2001. https://doi.org/10.1016/S0892-6875(01)00165-0.
[2] W.M. Ambrósa, C.H. Sampaioa, Bogdan G. Cazacliub, Paulo N.Conceiçãoa and Glaydson S.dos Reisab, “Some observations on the influence of particle size and size distribution on stratification in pneumatic jigs”, Powder Technology, Vol. 342, pp. 594-606, 2019. https://doi.org/10.1016/j.powtec.2018.10.029.
[3] M.V. Verkhoturov, “Gravitational enrichment methods”. Moscow: MAX Press, 2006, pp.160- 180. ISBN 5-317-01710-6.
[4] Ya-li Kuang, Jin-Wu Zhuo, Li Wang, Chao Yang, “Laws of motion of particles in a jigging process”, Journal of China University of Mining and Technology, Vol. 18, no 4, pp. 575-579, December 2008. https://doi.org/10.1016/S1006-1266(08)60297-7.
[5] S.Cierpisz. “A dynamic model of coal products discharge in a jig”, Minerals Engineering, Vol. 105, pp. 1-6, 1 May 2017. https://doi.org/10.1016/j.mineng.2016.12.010.
[6] B.A. Suleimenov and Ye.A. Kulakova, “The prospects for the use of intelligent systems in the processes of gravitational enrichment”, Informatyka, Automatyka, Pomiary w Gospodarcei Ochronie Środowiska, Vol. 9, no 2, pp. 46-49, 2019. https://doi.org/10.5604/01.3001.0013.2547.
[7] Y.R. Murthy, S.K. Tripathy, C.R. Kumar, “Chrome ore beneficiation challenges & opportunities – A review”, Minerals Engineering, Vol. 24, no 5, pp. 375-380, 2011, DOI: https://doi.org/10.1016/j.mineng.2010.12.001.
[8] L. Panda, S.K. Tripathy, “Performance prediction of gravity concentrator by using artificial neural network – A case study”. International Journal of Mining Science and Technology, Vol. 24, no 4, pp. 461-465, 2014. https://doi.org/10.1016/j.ijmst.2014.05.007.
[9] Y.R. Murthy, S.K. Tripathy, C.R. Kumar, “Chrome ore beneficiation challenges & opportunities-a review”, Minerals Engineering, Vol. 36, no 5, pp. 375-380, 2014, https://doi.org/10.1016/j.ijmst.2014.05.007.
[10] T. J. Stich, and J.K. Spoerre and T.Velasco, “The application of artificial neutral networks to monitoring and control of an induction hardening process”, Journal of Industrial Technology, Vol. 16, no 1, pp.168-174, 2015.
[11] L.Panda, A.K. Sahoo, S.K Tripathy and others, “Application of artificial neural network to study the performance of jig for beneficiation of noncoking coal”, Fuel, Vol. 97, pp. 151-156, 2012. https://doi.org/10.1016/j.fuel.2012.02.018.
[12] K. Shravan and R. Venugopal, “Performance analyses of jig for coal cleaning using 3D response surface methodology”, International Journal of Mining Science and Technology, Vol. 27, no 2, pp 333-337, March 2017.
[13] B.A. Suleimenov and E.A. Kulakova, “Development of intelligent system for optimal process control”, Resource–saving technologies of raw–material base development in mineral mining and processing: Multy–authored monograph, Universitas Publishing, Romania, Petrosani: 2020, pp.198-217. URI: ep3.nuwm.edu.ua/id/eprint/18359.
[14] V. Mashkov, A. Smolarz, V. Lytvynenko, and K. Gromaszek, “The problem of system fault-tolerance”, Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 4, no. 4, pp. 41-44, 2014, https://doi.org/10.5604/20830157.1130182
[15] M. S. Islam, P. Nepal and others. “A knowledge-based expert system to assess power plant project cost overrun risks”, Expert Systems With Applications, Vol. 136, pp. 12-32, 2019. https://doi.org/10.1016/j.eswa.2019.06.030.
[16] B.A.Suleimenov and E.A Kulakova, “Creation the knowledge base of the intelligent control system for gravitational enrichment processes using expert information processing methods”, Vestnik KazNRTU, Vol. 5, no 141, pp. 590-597, October 2020.
[17] Ye.A. Kulakova and B.A. Suleimenov, “Development and Research of Intelligent Algorithms for Controlling the Process of Ore Jigging”, International Journal of Emerging Trends in Engineering Research, Vol. 8, no 9, pp. 6240-6246, September 2020. https://doi.org/10.30534/ijeter/2020/21589202.
[18] N. Siddique. “Intelligent Control”, Springer International Publishing, Switzerland, 2014, pp.54-78. https://doi.org/10.1007/978-3-319-02135-5.
[19] P.V. de Campos Souza, “Fuzzy neural networks and neuro-fuzzy networks: A review the main techniques and applications used in the literature” Applied Soft Computing. Vol. 92, pp. 106275, July 2020. https://doi.org/10.1016/j.asoc.2020.106275.
[20] A.Tripathy, L.Panda, A.K Sahoo, S.K. Biswal, R.K Dwari, A.K. Sahu, “Statistical optimization study of jigging process on beneficiation of fine size high ash Indian non-coking coal”, Advanced Powder Technology, Vol. 27, no 4, pp. 1219-1224, 2016. https://doi.org/10.1016/j.apt.2016.04.006.
[21] A.K. Mukherjeea and B.K. Mishrab, “An integral assessment of the role of critical process parameters on jigging”, International Journal of Mineral Processing Vol. 81, no 3, pp. 187-200, December 2006. https://doi.org/10.1016/j.minpro.2006.08.005.
[22] N.(K.)M. Faber, “Estimating the uncertainty in estimates of root mean square error of prediction: application to determining the size of an adequate test set in multivariate calibration”, Chemometrics and Intelligent Laboratory Systems, Vol. 49, no 1, pp. 79-89, 6 September 1999, https://doi.org/10.1016/S0169-7439(99)00027-1.
Go to article

Authors and Affiliations

Yelena Kulakova
1
Waldemar Wójcik
2
Batyrbek Suleimenov
1
Andrzej Smolarz
2

  1. Satbaev University, Almaty, Kazakhstan
  2. Lublin University of Technology, Lublin, Poland
Download PDF Download RIS Download Bibtex

Abstract

Bogusław Wolniewicz created an original formal system based on his considerations on the ontology and semantics embedded in Wittgenstein’s Tractatus. His system – called by Wolniewicz ‘ontology of situations’ – can be complemented by a philosophical interpretation. In this article I identify the implicit and intuitive underpinnings of the system, its formal content and its philosophical implications. I also indicate a few applications of the system to axiology and logical hermeneutics.

Go to article

Authors and Affiliations

Mieczysław Omyła
Download PDF Download RIS Download Bibtex

Abstract

Formalization of a set of beliefs expressed in one language consists in translating them into sentences of another language. The characteristic property of a good formalization is that the target language is correctly chosen and the translations precisely reflect the meaning of the original sentences. In the paper a formalization of ontology of situations (given by Professor Bogusław Wolniewicz) is discussed. I argue that this is an example of a perfect solution of the problem.

Go to article

Authors and Affiliations

Anna Wójtowicz
Download PDF Download RIS Download Bibtex

Abstract

This paper presents a method based on the use of fuzzy logic for the rapid selection of optimal induction sintering parameters. The prepared fuzzy controller uses expert knowledge developed from the results of induction sintering tests of Ti-5Al-5Mo-5V-3Cr alloy green compacts produced from a mixture of elemental powders. The analysis of the influence of the applied sintering parameters on the material characteristics was based on the evaluation of the microstructure state and the measurement of the relative density of the samples after sintering. In this way, a universal tool for estimating the sintering parameters of titanium powder-based green compacts was obtained. It was shown that with the help of fuzzy logic it is possible to analyze the influence of the parameters of the manufacturing process of metal powder materials on the quality of the obtained products.
Go to article

Authors and Affiliations

K. Zyguła
1
ORCID: ORCID
M. Wojtaszek
1
ORCID: ORCID

  1. AGH University of Science and Technology, Faculty of Metals Engineering and Industrial Computer Science, Al. Mickiewicza 30, 30-059 Kraków, Poland
Download PDF Download RIS Download Bibtex

Abstract

The information technologies for assessing the quality of IT-specialties graduates' training of university by means of fuzzy logic and neural networks are developed in the article. It makes possible taking into account a wide set of estimation and output parameters, influence of the external and internal factors and allows to simplify the assessing process by means of modern mathematical apparatuses of artificial intelligence.

Go to article

Authors and Affiliations

Anzhelika O. Azarova
Larysa E. Azarova
Sergii V. Pavlov
Nataliia B. Savina
Iryna S. Kaplun
Waldemar Wójcik
Saule Smailova
Aliya Kalizhanova
Download PDF Download RIS Download Bibtex

Abstract

The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal.
Go to article

Authors and Affiliations

Mohankumar N.
1
Jayakumar M.
1
Nirmala Devi M.
1

  1. Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa, Vidyapeetham, India
Download PDF Download RIS Download Bibtex

Abstract

The COVID-19 pandemic has influenced virtually all aspects of our lives. Across the world, countries have applied various mitigation strategies, based on social, political, and technological instruments. We postulate that multi-agent systems can provide a common platform to study (and balance) their essential properties. We also show how to obtain a comprehensive list of the properties by “distilling” them from media snippets. Finally, we present a preliminary take on their formal specification, using ideas from multi-agent logics.
Go to article

Bibliography

  1.  A. Soltani, R. Calo, and C. Bergstrom, “Contacttracing apps are not a solution to the COVID-19 crisis,” Brookings Tech Stream, 27 April 2020. [Online]. Available: https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/.
  2.  J. Morley, J. Cowls, M. Taddeo, and L. Floridi, “Ethical guidelines for COVID-19 tracing apps,” Nat. Comment, pp. 29–31, 4 June 2020. [Online]. Available: https://www.nature.com/articles/d41586-020-01578-0.
  3.  A. Stollmeyer, M. Schaake, and F. Dignum, “The Dutch tracing app ’soap opera’ – lessons for Europe,” euobserver, 7 May 2020. [Online]. Available: https://euobserver.com/opinion/148265.
  4.  G. Weiss, Ed., Multiagent Systems. A Modern Approach to Distributed Artificial Intelligence. MIT Press: Cambridge, Mass, 1999.
  5.  Y. Shoham and K. Leyton-Brown, Multiagent Systems – Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, 2009.
  6.  A. Rao and M. Georgeff, “Modeling rational agents within a BDI-architecture,” in Proceedings of KR, 1991, pp. 473–484.
  7.  M.Wooldridge, Reasoning about Rational Agents. MIT Press : Cambridge, Mass, 2000.
  8.  M. Dastani, K. Hindriks, and J. Meyer, Eds., Specification and Verification of Multi-Agent Systems. Springer, 2010.
  9.  W. Jamroga, Logical Methods for Specification and Verification of Multi-Agent Systems. ICS PAS, 2015.
  10.  W. Jamroga, D. Mestel, P.B. Rønne, P.Y.A. Ryan, and M. Skrobot, “A survey of requirements for COVID-19 mitigation strategies. Part I: newspaper clips,” CoRR, vol. abs/2011.07887, 2020.
  11.  A. Lomuscio, H. Qu, and F. Raimondi, “MCMAS: An open-source model checker for the verification of multiagent systems,” Int. J. Software Tools Technol. Trans., vol. 19, no. 1, pp. 9–30, 2017.
  12.  G. Behrmann, A. David, and K. Larsen, “A tutorial on UPPAAL,” in Formal Methods for the Design of Real-Time Systems: SFM-RT, ser. LNCS, no. 3185. Springer, 2004, pp. 200–236.
  13.  G. Kant, A. Laarman, J. Meijer, J. van de Pol, S. Blom, and T. van Dijk, “LTSmin: High-performance languageindependent model checking,” in Proceedings of TACAS, ser. Lecture Notes in Computer Science, vol. 9035. Springer, 2015, pp. 692–707.
  14.  D. Kurpiewski, W. Jamroga, and M. Knapik, “STV: Model checking for strategies under imperfect information,” in Proceedings of AAMAS. IFAAMAS, 2019, pp. 2372–2374.
  15.  S. Woodhams, “COVID-19 digital rights tracker,” Top10VPN, 10 June 2020. [Online]. Available: https://www.top10vpn.com/research/ covid-19-digital-rights-tracker/.
  16.  AFP, “Major finding: Lockdowns averted 3 million deaths in 11 European nations: study,” RTL Today, 9 June 2020. [Online]. Available: https://today.rtl.lu/news/science-and-environment/a/ 1530963.html.
  17.  I. Ilves, “Why are Google and Apple dictating how European democracies fight coronavirus?” The Guardian, 16 June 2020. [Online]. Available: https://www.theguardian.com/commentisfree/2020/jun/16/google-apple-dictating-european-democracies-coronavirus.
  18.  “NHS COVID-19: the new contact-tracing app from the NHS,” NCSC, 14 May 2020. [Online]. Available: https://www.ncsc.gov.uk/ information/nhs-covid-19-app-explainer.
  19.  J. Steinhauer and A. Goodnough, “Contact tracing is failing in many states. Here’s why.” New York Times, 5 October 2020. [Online]. Available: https://www.nytimes.com/2020/07/31/health/covid-contact-tracing-tests.html.
  20.  S. Bicheno, “Unlike France, Germany decides to do smartphone contact tracing the Apple/Google way,” telecoms.com, 27 April 2020. [Online]. Available: https://telecoms.com/503931/unlike-france-germany-de cides-to-do-smartphone-contact-tracing-the-apple-goo gle- way/.
  21.  “Together we can fight coronavirus — Smittestopp,” helsenorge, 28 April 2020. [Online]. Available: https://helsenorge.no/coronavirus/ smittestopp?redirect=false.
  22.  P.H. O’Neill, T. Ryan-Mosley, and B. Johnson, “A flood of coronavirus apps are tracking us. now it’s time to keep track of them,” MIT Technol. Rev., 7 May 2020. [Online]. Available: https://www.technologyreview.com/2020/05/07/1000961/launching-mittr-covid-tracing- tracker/.
  23.  M. Zastrow, “Coronavirus contact-tracing apps: can they slow the spread of COVID-19?” Nature (Technol. Feature), 19 May 2020. [Online]. Available: https://www.nature.com/articles/d41586-020-01514-2.
  24.  J. Taylor, “How did the Covidsafe app go from being vital to almost irrelevant?” The Guardian, 23 May 2020. [Online]. Available: https://www.theguardian.com/world/2020/may/24/how-did-the-covidsafe-app-go-from-being-vital-to-almost-irrelevant.
  25.  D. Robertson, “Transparency key to uptake of coronavirus tracing app,” RMIT news, 27-April 2020. [Online]. Available: https://www. rmit.edu.au/news/all-news/2020/april/transparency-key-to-uptake-of-coronavirus-traci ng-app.
  26.  D. Tahir and C. Lima, “Google and Apple’s rules for virus tracking apps sow division among states,” Politico, 10 June 2020. [Online]. Available: https://www.politico.com/news/2020/06/10/google-and-apples-rules-for-virus-tracking-apps-sow-division-among-states-312199.
  27.  A. Clarance, “Aarogya Setu: Why India’s Covid-19 contact tracing app is controversial,” BBC News, 15 May 2020. [Online]. Available: https://www.bbc.com/news/world-asia-india-52659520.
  28.  J. Davies, “UK snubs Google and Apple privacy warning for contact tracing app,” telecoms.com, 28 April 2020. [Online]. Available: https://telecoms.com/503967/uk-s nubs-google-and-apple-privacy-warning-for-contact-tr acing-app/.
  29.  A. Eisenberg, “Privacy fears threaten New York City’s coronavirus tracing efforts,” Politico, 4 June 2020. [Online]. Available: https:// www.politico.com/states/new-york/albany/story/2020/06/04/privacy-fears-threaten-new-york-citys-coronavirus-tracing-efforts-1290657.
  30.  C. Timberg, “Most Americans are not willing or able to use an app tracking coronavirus infections. that’s a problem for Big Tech’s plan to slow the pandemic,” Washington Post, 29 April 2020. [Online]. Available: https://www.washingtonpost.com/technology/2020/04/ 29/ most-americans-are-not-willing-or-able-use-an-app-tracking-coronavirus-infections-thats-problem-big-tec hs-plan-slow-pandemic/.
  31.  M. Burgess, “Just how anonymous is the NHS Covid-19 contact tracing app?” Wired, 12 May 2020. [Online]. Available: https://www. wired.co.uk/article/nhs-covid-app-data-anonymous.
  32.  “Getting it right: States struggle with contact tracing push,” Politico, 17 May 2020. [Online]. Available: https://www.politico.com/ news/2020/05/17/privacy-coronavirus-tracing-261369.
  33.  S.L. Frasier, “Coronavirus antibody tests have a mathematical pitfall,” Sci. Am., 1 July 2020. [Online]. Available: https://www. scientificamerican.com/article/coronavirus-antibody-tests- have-a-mathematical-pitfall/.
  34.  M. Scott and Z. Wanat, “Poland’s coronavirus app offers playbook for other governments,” Politico, 2 April 2020. [Online]. Available: https://www.politico.eu/article/poland-coronavirus-app-offers-playbook-for-other-governments/.
  35.  K. McCarthy, “UK finds itself almost alone with centralized virus contact-tracing app that probably won’t work well, asks for your location, may be illegal,” The Register, 5 May 2020. [Online]. Available: https://www.theregister.com/2020/05/05/uk_coronavirus_app/.
  36.  “Legal advice on smartphone contact tracing published,” matrix chambers, 3 May 2020. [Online]. Available: https://www.matrixlaw.co.uk/ news/legal-advice-on-smartphone-contact-tracing-published/.
  37.  A. Hern, “UK abandons contact-tracing app for Apple and Google model,” The Guardian, 18 June 2020. [Online]. Available: https://www. theguardian.com/world/2020/jun/18/uk-poised-to-abandon-coronavirus-app-in-favour-of-apple-and-google-models.
  38.  “Coronavirus: Member States agree on an interoperability solution for mobile tracing and warning apps,” European Commission – Press release, 16 June 2020. [Online]. Available: https://digital-strategy.ec.europa.eu/en/news/coronavirus-member-states-agree-interoperability- solution-mobile-tracing-and-warning-apps.
  39.  A. Oslo, “Norway suspends virus-tracing app due to privacy concerns,” The Guardian, 15 June 2020. [Online]. Available: https://www. theguardian.com/world/2020/jun/15/norway-suspends-virus-tracing-app-due-to-privacy-concerns.
  40.  S. Wodinsky, “The UK’s contact-tracing app breaks the UK’s own privacy laws (and is just plain broken),” Gizmodo, 13 May 2020. [Online]. Available: https://gizmodo.com/the-uk-s-contact-tracing-app-breaks-the-uk-s-own-privac-1843439962.
  41.  R. Garthwaite and I. Anderson, “Coronavirus: Alarm over ’invasive’ Kuwait and Bahrain contact-tracing apps,” BBC News, 16 June 2020. [Online]. Available: https://www.bbc.com/news/world-middle-east-53052395.
  42.  “Coronavirus privacy: Are South Korea’s alerts too revealing?” BBC News, 5 March 2020. [Online]. Available: https://www.bbc.com/ news/amp/world-asia-51733145.
  43.  K. Szymielewicz, A. Obem, and T. Zieliński, “Jak Polska walczy z koronawirusem i dlaczego aplikacja nas przed nim nie ochroni [How Poland fights the corona, and why the app won’t protect us]?” Panoptykon, 5 May 2020. [Online]. Available: https://panoptykon.org/ protego-safe-ryzyka.
  44.  J.-M. Bezat, “L’application StopCovid, activée seulement par 2% de la population, connaît des débuts décevants,” Le Monde, 10 June 2020. [Online]. Available: https://www.lemonde.fr/pixels/article/2020/06/10/l-application-stopcovid-connait-des-debuts- decevants_6042404_4408996.html.
  45.  P.H. O’Neill, “No, coronavirus apps don’t need 60% adoption to be effective,” MIT Technol. Rev., 5 June 2020. [Online]. Available: https:// www.technologyreview.com/2020/06/05/1002775/covid-apps-effective-at-less-than-60-percent-download/.
  46.  R. Hinch et al., “Effective configurations of a digital contact tracing app: A report to NHSX,” Oxford University, Tech. Rep., 2020. [Online]. Available: https://github.com/BDI-pathogens/covid-19_instant_tracing/blob/master/Report-EffectiveConfigurationsofaDigitalC ontactTracingApp.pdf.
  47.  “Corona-app soll open source werden,” Süddeutsche Zeitung, 6 May 2020. [Online]. Available: https://www.sueddeutsche.de/digital/ corona-app-tracing-open-source-1.4899711.
  48.  “Cybernetica proposes privacy-preserving decentralised architecture for COVID-19 mobile application for Estonia,” Cybernetica, 6 May 2020. [Online]. Available: https://cyber.ee/news/2020/05-06/.
  49.  E. Emerson, “Temporal and modal logic,” in Handbook of Theoretical Computer Science, J. van Leeuwen, Ed. Elsevier, 1990, vol. B, pp. 995–1072.
  50.  R. Fagin, J.Y. Halpern, Y. Moses, and M.Y. Vardi, Reasoning about Knowledge. MIT Press, 1995.
  51.  J. Broersen, M. Dastani, Z. Huang, and L. van der Torre, “The BOID architecture: conflicts between beliefs, obligations, intentions and desires,” in Proceedings of the Fifth International Conference on Autonomous Agents. ACM Press, 2001, pp. 9–16.
  52.  R. Alur, T.A. Henzinger, and O. Kupferman, “Alternating-time Temporal Logic,” J. ACM, vol. 49, pp. 672–713, 2002.
  53.  N. Bulling, V. Goranko, andW. Jamroga, “Logics for reasoning about strategic abilities in multi-player games,” in Models of Strategic Reasoning. Logics, Games, and Communities, ser. Lecture Notes in Computer Science. Springer, 2015, vol. 8972, pp. 93–136.
  54.  F. Laroussinie and P. Schnoebelen, “A hierarchy of temporal logics with past,” Theoretical Computer Science, vol. 148, no. 2, pp. 303–324, 1995.
  55.  W. Penczek and A. Polrola, Advances in Verification of Time Petri Nets and Timed Automata: A Temporal Logic Approach, ser. Studies in Computational Intelligence. Springer, 2006, vol. 20.
  56.  M. Knapik, É. André, L. Petrucci, W. Jamroga, and W. Penczek, “Timed ATL: forget memory, just count,” J. Artif. Intell., vol. 66, pp. 197–223, 2019.
  57.  W. Jamroga, V. Malvone, and A. Murano, “Natural strategic ability,” Artif. Intell., vol. 277, 2019.
  58.  N. Alechina, B. Logan, H. Nguyen, and A. Rakib, “Resource-bounded alternating-time temporal logic,” in Proceedings of International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010, pp. 481–488.
  59.  N. Bulling and B. Farwer, “Expressing properties of resource-bounded systems: The logics RTL* and RTL,” in Proceedings of CLIMA, ser. Lecture Notes in Computer Science, vol. 6214, 2010, pp. 22–45.
  60.  C. Baier and M. Z. Kwiatkowska, “Model checking for a probabilistic branching time logic with fairness,” Distributed Comput., vol. 11, no. 3, pp. 125–155, 1998.
  61.  T. Chen, V. Forejt, M. Kwiatkowska, D. Parker, and A. Simaitis, “PRISM-games: A model checker for stochastic multi-player games,” in Proceedings of TACAS, ser. Lecture Notes in Computer Science, vol. 7795. Springer, 2013, pp. 185–191.
  62.  M. Kwiatkowska, G. Norman, and D. Parker, “PRISM: probabilistic symbolic model checker,” in Proceedings of TOOLS, ser. Lecture Notes in Computer Science, vol. 2324. Springer, 2002, pp. 200–204.
  63.  N.M. Ferguson et al., “Impact of non-pharmaceutical interventions (NPIs) to reduce COVID-19 mortality and healthcare demand,” Imperial College London, Tech. Rep. 9 (16‒03‒2020), 2020.
  64.  B. Adamik et al., “Estimation of the severeness rate, death rate, household attack rate and the total number of COVID-19 cases based on 16 115 Polish surveillance records,” Prepr. Lancet, 2020.
  65.  W. Bock et al., “Mitigation and herd immunity strategy for COVID-19 is likely to fail,” medRxiv, 2020.
  66.  R. McCabe et al., “Modelling ICU capacity under different epidemiological scenarios of the COVID-19 pandemic in three western European countries,” Imperial College London, Tech. Rep. 36 (16‒11‒2020), 2020.
  67.  S. Zionts, “A multiple criteria method for choosing among discrete alternatives,” Eur. J. Oper. Res., vol. 7, no. 2, pp. 143–147, 1981, fourth EURO III Special Issue.
  68.  Y. Collette and P. Siarry, Multiobjective Optimization: Principles and Case Studies. Springer, 2004.
  69.  R. Radulescu, P. Mannion, D. M. Roijers, and A. Nowé, “Multi-objective multi-agent decision making: a utilitybased analysis and survey,” Auton. Agents Multi-Agent Syst., vol. 34, no. 1, p. 10, 2020.
Go to article

Authors and Affiliations

Wojciech Jamroga
1 2
David Mestel
1
Peter B. Roenne
1
Peter Y.A. Ryan
1
Marjan Skrobot
1

  1. Interdisciplinary Centre on Security, Reliability and Trust, SnT, University of Luxembourg
  2. Institute of Computer Science, Polish Academy of Sciences, ul. Jana Kazimierza 5, 01-248 Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

Construction objects must be protected not only at the stage of their construction, but also during exploitation. Particular attention should be paid to objects included in the list of monuments. The Act on the Protection of Monuments and the Guardianship of Monuments states that any building that is important for history and science can become a heritage building and should therefore be preserved. The aim of this article was to improve the method of visual assessment of the technical condition of heritage buildings with the use of fuzzy logic. The improved method is to facilitate the comparison of assessments of the technical condition of a building performed at intervals specified in the regulations, often by different people. The research was conducted on the basis of technical expertise prepared for five examined buildings that were tenement houses entered in the register of monuments. The use of the visual method provides for the assessment of individual elements of the object by an expert and a verbal description of the elements using a five-point scale. A significant limitation of this method is uncertainty associated with the exact ranges of the acceptable values, as these ranges are subjective and depend on the opinion of an evaluator. The impact of this limitation can be reduced by applying fuzzy logic. In the fuzzy logic model, as input variables the following were applied; assessments of the technical condition of individual elements of the object (underground structure, load-bearing walls, ceilings, roof, other elements) and an integral indicator of the technical condition of the entire historic object, calculated as the output value.
Go to article

Authors and Affiliations

Marzena Lendo-Siwicka
1
ORCID: ORCID
Roman Trach
1
ORCID: ORCID
Katarzyna Pawluk
1
ORCID: ORCID
Grzegorz Wrzesiński
1
ORCID: ORCID
Ada Żochowska
1
ORCID: ORCID

  1. Warsaw University of Life Sciences-SGGW, Institute of Civil Engineering, ul. Nowoursynowska159, 02-776 Warsaw, Poland

This page uses 'cookies'. Learn more