Application of genetic programming and model checking for finite-state machine induction
نویسندگان
چکیده
منابع مشابه
development and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولUsing Genetic Programming for Turing Machine Induction
Turing machines are playing an increasingly significant role in Computer Science domains such as bioinformatics. Instead of directly formulating a solution to a problem, a Turing machine which produces a solution algorithm is generated. The original problem is reduced to that of inducing an acceptor for a recursively enumerable language or a Turing machine transducer. This paper reports on a ge...
متن کاملan application of equilibrium model for crude oil tanker ships insurance futures in iran
با توجه به تحریم های بین المملی علیه صنعت بیمه ایران امکان استفاده از بازارهای بین المملی بیمه ای برای نفتکش های ایرانی وجود ندارد. از طرفی از آنجایی که یکی از نوآوری های اخیر استفاده از بازارهای مالی به منظور ریسک های فاجعه آمیز می باشد. از اینرو در این پایان نامه سعی شده است با استفاده از این نوآوری ها با طراحی اوراق اختیارات راهی نو جهت بیمه گردن نفت کش های ایرانی ارائه نمود. از آنجایی که بر...
An Application of Genetic Network Programming Model for Pricing of Basket Default Swaps (BDS)
The credit derivatives market has experienced remarkable growth over the past decade. As such, there is a growing interest in tools for pricing of the most prominent credit derivative, the credit default swap (CDS). In this paper, we propose a heuristic algorithm for pricing of basket default swaps (BDS). For this purpose, genetic network programming (GNP), which is one of the recent evolutiona...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SPIIRAS Proceedings
سال: 2014
ISSN: 2078-9599,2078-9181
DOI: 10.15622/sp.15.7