By Topic

Multiple-Valued Logic, 1988., Proceedings of the Eighteenth International Symposium on

Date 0-0 1988

Filter Results

Displaying Results 1 - 25 of 61
  • Degrees of untruth

    Publication Year: 1988, Page(s):2 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    The author points out that truth and falsehood are not open to supplementation by other truth values in the way that early work in many-valued logic, proposed, nor is truth amenable to gradation in the way that is suggested by the terminology of degrees of truth. He maintains that nevertheless there may be a degree of untruth: one untruth may be more or less false than another is. He discusses a v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of highly parallel residue arithmetic circuits based on multiple-valued bidirectional current-mode MOS technology

    Publication Year: 1988, Page(s):6 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB)

    A residue arithmetic circuit based on multiple-valued bidirectional current-mode MOS technology is proposed. Each residue digit is represented by multiple-valued coding suitable for highly parallel computation. Using the coding, mod m/sub i/ multiplication can be simply performed by a shift operation. In mod m/sub i/ addition, radix-five signed-digit full adders are used to obtain a high degree of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ternary physical protocol for MARILAN, a multiple-access ring local area network

    Publication Year: 1988, Page(s):14 - 20
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB)

    A design is presented for an asynchronous ternary transmission physical-layer protocol for a multiple-access-ring local area network (MARILAN) that uses the PLAYTHROUGH data-link-layer protocol. The ternary encoding scheme presented provides for both bit synchronization and simultaneous information transfer on a single pair of wires without increase in hardware complexity or bandwidth requirements... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural computer-aided design of current-mode CMOS logic circuits

    Publication Year: 1988, Page(s):21 - 30
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB)

    A set of CAD (computer-aided design) tools for the synthesis and layout generation of multiple-valued current-mode CMOS logic (CMCL) circuits is described. The synthesis method is based on the cost-table method. The general circuit structure, the cost-table functions, and the decomposition procedure used in the synthesis program are explained. The program is based on a logically complete set of ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of decoders for Q-valued logic circuits

    Publication Year: 1988, Page(s):32 - 39
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB)

    A design procedure is presented for multivalued threshold decoders using only three very simple modules. This general design method can be used in any technology, either in voltage or in current mode. The resulting decoders can easily be included in integrated circuits using standard integration techniques. The procedure is applied, as an example, to the design of a quaternary decoder in CMOS tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposed DDT/IDCT chip design using quaternary logic

    Publication Year: 1988, Page(s):40 - 44
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    CMOS quaternary threshold logic circuits are used in the design of the instruction memory and arithmetic sections of a proposed single-chip implementation of a unified discrete cosine transform/inverse discrete cosine transform (DCT/IDCT) architecture. The chip is projected to be capable of real-time processing of 10-MHz video signals. The unified DCT/IDCT architecture is described, and the use of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semi-custom technique realizing nondestructive information processing

    Publication Year: 1988, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB)

    A semicustom multiple-valued logic array integrated circuit (SCMAIC) that is able to realize nondestructive information processing is processed. It uses compatible NMOS-DYL multiple-valued logic circuits as basic units. Experimental studies indicate that it is impossible to integrate thousands of SCMAICs in a chip. The units can be used to fabricate gate arrays.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the associativity of C(x, y) and x-C(x, 1-y)

    Publication Year: 1988, Page(s):52 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    In the framework of generalized logical connectives the authors study the simultaneous associativity of the copulas C(x, y) and x-C(x, 1-y). The techniques of the theory of functional equations are used.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a class of binary operations: non-strict Archimedean aggregation functions

    Publication Year: 1988, Page(s):54 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB)

    The concept of nonstrict Archimedean aggregation function appears in a natural form when the orthomodularity property for pairs of aggregation function-t-norm and aggregation function-t-conorm connectives is studied. A theorem for the unicity of generator of these functions is proved. By using this result, which is already known for Archimedean t-norms, this kind of aggregation functions can be ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copulas in the unit interval uniformly close to some t-norms

    Publication Year: 1988, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB)

    A class of logical connectives often used in multivalued logic, called t-norms, are considered. Some uniformly close families of copulas are studied in detail.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An event based fuzzy temporal logic

    Publication Year: 1988, Page(s):64 - 71
    Cited by:  Papers (16)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB)

    A temporal logic is developed to deal with events that are uncertain with regard to their occurrence in a given interval of time. Events are represented as fuzzy sets with the membership function giving the possibility of occurrence of the event in a given interval of time. An axiomatization of the fuzzy event calculus is presented, and several of its properties are proved. The logic is simple but... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to handling fuzzy decision-making problems

    Publication Year: 1988, Page(s):72 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB)

    Techniques for handling fuzzy decision-making problems are presented in which fuzzy production rules and fuzzy set theory are used for knowledge representation. The maximum fuzzy cover generation techniques used are described in detail. Some examples are given to illustrate the maximum fuzzy cover generation process. The examples are restricted to medical diagnostic problems; however, the techniqu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy measures and their representation

    Publication Year: 1988, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    A very general class of fuzzy measurable spaces and fuzzy measures is studied. The main result is an integral representation theorem without topological assumptions. The Markov kernel representation of fuzzy measures in the sense of E.P. Klement (1980) is discussed.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The incremental-cost approach for synthesis of CCD 4-valued unary functions

    Publication Year: 1988, Page(s):82 - 89
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A novel approach to the synthesis of one-variable four-valued functions using CCDs (charge-coupled devices) is presented. Starting at zero cost, a search is conducted for the possible functions that can be realized using basic CCD gate structures. These functions are recorded in a list. At a given cost C, each of the four possibilities of using the addition, overflow, inhibit, and multiplication a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CMOS four-valued logic circuits using charge control technique

    Publication Year: 1988, Page(s):90 - 97
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB)

    CMOS multiple-valued logic circuits using a charge-control method, which are suitable for use in synchronous sequential circuits together with the static-type MAX and MIN circuits, are presented. It is shown that circuits for conversion of logical values that are usually realized using complicated circuit configurations can be replaced by simple circuits with this approach. The technique of charge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JCTL: a Josephson complementary ternary logic circuit

    Publication Year: 1988, Page(s):98 - 104
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A novel complementary ternary logic circuit using Josephson junctions as switching gates is described. The principle of the circuit is based on the tristate of a Josephson junction, that is the state of switching in either positive direction or negative direction, in addition to the state of no switching. The JCTL is constructed of two SQUIDs (superconducting quantum interference devices), one of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of the Eighteenth International Symposium on Multiple-Valued Logic (Cat. No.88CH2546-0)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Fuzzy systolic arrays

    Publication Year: 1988, Page(s):106 - 112
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB)

    The design systolic arrays for the computation of the fuzzy inference process in expert systems is considered. Two arrays are designed: one for the overall fuzzy relation between the antecedent and the conclusion portions of the rules of the system, and the other one for the compositional rule of inference. A comparison between the proposed arrays and a uniprocessor is presented.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Society diagnosis. III. Person-event-person model

    Publication Year: 1988, Page(s):113 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB)

    For pt.II see ISMVL-1985, p.212-15 (Canada, 1985). The main goal of society diagnosis is to identify persons involved in a case and partition them into three classes: the innocent, the quality and the unintentional liars by analyzing the testimonies which one gives for or against the others. The authors' research in this area is reviewed, and a novel person-event-person model is proposed. The mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A discussion on the theory of logic value redundance

    Publication Year: 1988, Page(s):118 - 121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB)

    Logic value redundancy, a technique that differs from conventional redundancy techniques, is under development. It belongs to the same class of redundancy techniques as error-detecting and error-correcting codes. The concepts, theory, and applications of logic value redundancy are presented.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An iterative characterization of post algebras

    Publication Year: 1988, Page(s):124 - 128
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    A previous iterative characterization of Boolean algebras is extended to Post algebras. Use is made of iterative properties of algebraic functions on certain algebras constructed on the underlying lattice of a Post algebra.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of some results in lattice-valued model theory

    Publication Year: 1988, Page(s):129 - 133
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB)

    The author surveys some of his published results on the model theory of lattice-valued logic. Among the results surveyed are: the fundamental theorem of ultraproducts, the compactness theorem, the LST theorem, and the omitting types theorem. A proof of the compactness theorem is appended.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specific arithmetics in radices +/-4

    Publication Year: 1988, Page(s):134 - 139
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB)

    To accelerate binary arithmetics, algorithms in higher radices than two have been implemented. In particular, radices +or-4 present in many instances the optimum choice in terms of speed vs. complexity. In this context the author reviews Booth's algorithm for multiplication, nonrestoring redundant signed digit approaches to division and square root, and Knuth's scheme for complex arithmetic. He pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural nets as models for study of multivalued logic

    Publication Year: 1988
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (54 KB)

    Summary form only given. It is suggested that since one can now implement neural nets which can actually perform certain basic information processing functions, it is of interest to see if one can fashion nets or systems of nets which can reproduce (i.e. mimic) certain trains of actions regularly performed by humans. The particular issue addressed is that of implementing a multivalued logic system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fuzzy logic approach to the management of linguistically expressed uncertainty

    Publication Year: 1988, Page(s):144 - 151
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (534 KB)

    A description is given to the expert system shell called MILORD and, in particular, its management of uncertainty. This shell contains two inference engines, a rule-oriented editor, a rule compiler, and an explanation module. MILORD can be used to perform three different calculi of uncertainty, on an expert-defined set of linguistic labels, depending on three different models of the conjunction, d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.