Loading...
Search for: automata-theory
0.004 seconds
Total 54 records

    Formalizing compatibility and substitutability in communication protocols using I/O-constraint automata

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 49-64 ; 03029743 (ISSN); 9783540756972 (ISBN) Niamanesh, M ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due to the need for on-the-fly reconfiguration of protocol stack in future communication and computation devices, formalizing substitutability and compatibility of protocol entities are important in correctness assessment of dynamic reconfiguration. In this paper, we extend Constraint Automata and propose I/O-Constraint Automata to model behavior of protocols and propose enough formalism for substitutability and compatibility relations between protocols. We introduce input-blocking property of communication protocols, and show... 

    A review on specifying software architectures using extended automata-based models

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 423-431 ; 03029743 (ISSN); 9783540756972 (ISBN) Sharafi, M ; Shams Aliee, F ; Movaghar, A ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Applying an appropriate formal model to specify software architecture makes a reliable foundation to formally verify non-functional properties and therefore, leads to early detection of defects. In this paper we make a comparison between automata-based models and evaluate their abilities to model different aspects of components interaction in software architectures. We try to use Team automata as a middleware to formally specify well-known architectural descriptions in UML2.0. A Limitation of current automata models, so called "actions interleaving" is also discussed and some approaches to overcome this limitation described. © Springer-Verlag Berlin Heidelberg 2007  

    Stochastic optimization using continuous action-set learning automata

    , Article Scientia Iranica ; Volume 12, Issue 1 , 2005 , Pages 14-25 ; 10263098 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    Sharif University of Technology  2005
    Abstract
    In this paper, an adaptive random search method, based on continuous action-set learning automata, is studied for solving stochastic optimization problems in which only the noisecorrupted value of a function at any chosen point in the parameter space is available. First, a new continuous action-set learning automaton is introduced and its convergence properties are studied. Then, applications of this new continuous action-set learning automata to the minimization of a penalized Shubert function and pattern classification are presented. © Sharif University of Technology  

    Using on-the-fly Translation of Temporal Logic to Automata in Model Checking

    , M.Sc. Thesis Sharif University of Technology Salehi Ghahfarokhi, Khayyam (Author) ; Ardeshir, Mohammad (Supervisor) ; Izadi, Mohammad (Supervisor)
    Abstract
    According to increasing computer systems, needs for verification of such systems with respect to desirable properties is critical. Model checking is one of the best methods of verification. Different methods have been proposed for model checking. The most efficient of these methods is automata-theoretic approach. In this approach, formal specification of desirable property, specified by formula in temporal logics, is translated to corresponding automaton. If the system model is expressed as automaton, the problem of model checking is then reduced to a problem of automata-theory. The question is the following. Are all the computations of the corresponding automaton accepted by the automaton... 

    Learning automata based dynamic guard channel algorithms

    , Article Computers and Electrical Engineering ; Volume 37, Issue 4 , 2011 , Pages 601-613 ; 00457906 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, we first propose two learning automata based decentralized dynamic guard channel algorithms for cellular mobile networks. These algorithms use learning automata to adjust the number of guard channels to be assigned to cells of network. Then, we introduce a new model for nonstationary environments under which the proposed algorithms work and study their steady state behavior when they use LR-I learning algorithm. It is also shown that a learning automaton operating under the proposed nonstationary environment equalizes its penalty strengths. Computer simulations have been conducted to show the effectiveness of the proposed algorithms. The simulation results show that the... 

    Deterministic randomness extraction from generalized and distributed santha-vazirani sources

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6 July 2015 through 10 July 2015 ; Volume 9134 , 2015 , Pages 143-154 ; 03029743 (ISSN) ; 9783662476710 (ISBN) Beigi, S ; Etesami, O ; Gohari, A ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    A Santha-Vazirani (SV) source is a sequence of random bits where the conditional distribution of each bit, given the previous bits, can be partially controlled by an adversary. Santha and Vazirani show that deterministic randomness extraction from these sources is impossible. In this paper, we study the generalization of SV sources for nonbinary sequences. We show that unlike the binary case, deterministic randomness extraction in the generalized case is sometimes possible. We present a necessary condition and a sufficient condition for the possibility of deterministic randomness extraction. These two conditions coincide in “non-degenerate” cases. Next, we turn to a distributed setting. In... 

    Failure-based equivalence of constraint automata

    , Article International Journal of Computer Mathematics ; Volume 87, Issue 11 , 2010 , Pages 2426-2443 ; 00207160 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Constraint automata are the first-proposed operational semantics of Reo coordination language. They can be composed not only by all well-defined composition operators of labeled transition systems but also by two new operators. The new operators are joining of constraint automata with respect to their common port names and hiding a port name in all transition labels. The operations of these two extra operators depend on the internal structures of the transition labels, while in the others each transition label is considered as a simple entity. An equivalence relation between transition systems is a congruence relation if the replacement of the components of a model by the equivalent ones... 

    A formalism for recongurability analysis in distributed non-blocking components

    , Article 28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008, Beijing, 17 June 2008 through 20 June 2008 ; 2008 , Pages 453-458 ; 9780769531731 (ISBN) Niamanesh, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Reconfigurability for a component of a distributed component-based system means ability to replace the component with a new one, in presence of the other components. In this context, substitutability and compatibility of components should be analyzed. In this paper, we use I/O-Constraint Automata to model behavior of components and propose enough formalism for substitutability and compatibility analysis. We show that in the context of distributed non-blocking components, there is a relation weaker than usual simulation relation in automata theory for notion of substitutability. We illustrate the relation between substitutability and compatibility to reason about the reconfigurability of a... 

    Model checking of component based software using compositional reductions

    , Article International Journal of Software Engineering and Knowledge Engineering ; Volume 18, Issue 5 , 2008 , Pages 683-712 ; 02181940 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd  2008
    Abstract
    A component-based computing system consists of two main parts: a set of components and a coordination subsystem. Reo is an exogenous coordination language for compositional construction of the coordination subsystem. Constraint automaton has been defined as the operational semantics of Reo. The main goal of this paper is to prepare a model checking method for verifying linear time temporal properties of component-based systems whose coordinating subsystems are modeled by Reo and components are modeled by labeled transition systems. For this purpose, we introduce modified definitions of constraint automata and their composition operators by which, every constraint automaton can be considered... 

    Examining the ε-optimality property of a tunable FSSA

    , Article 6th IEEE International Conference on Cognitive Informatics, ICCI 2007, Lake Tahoe, CA, 6 August 2007 through 8 August 2007 ; October , 2007 , Pages 169-177 ; 1424413273 (ISBN); 9781424413270 (ISBN) Jamalian, A. H ; Iraji, R ; Sefidpour, A. R ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2007
    Abstract
    In this paper, a new fixed structure learning automaton (FSSA), with a tuning parameter for amount of its rewards, is presented and its behavior in stationary environments will be studied. This new automaton is called TFSLA (Tunable Fixed Structured Learning Automata). The proposed automaton characterizes by star shaped transition diagram and each branch of the star contains N states associated with a particular action. TFSLA is tunable, so that the automaton can receive reward flexibly, even when it accepted penalty according to its previous action. Experiments show that TFSLA converges to the optimal action faster than some older FSSAs (e.g. Krinsky and Krylov) and the analytic examination... 

    Utilizing distributed learning automata to solve stochastic shortest path problems

    , Article International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems ; Volume 14, Issue 5 , 2006 , Pages 591-615 ; 02184885 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2006
    Abstract
    In this paper, we first introduce a network of learning automata, which we call it as distributed learning automata and then propose some iterative algorithms for solving stochastic shortest path problem. These algorithms use distributed learning automata to find a policy that determines a path from a source node to a destination node with minimal expected cost (length). In these algorithms, at each stage distributed learning automata determines which edges to be sampled. This sampling method may result in decreasing unnecessary samples and hence decreasing the running time of algorithms. It is shown that the shortest path is found with a probability as close as to unity by proper choice of... 

    IJA automaton: Expediency and ε -Optimality properties

    , Article 5th IEEE International Conference on Cognitive Informatics, ICCI 2006, Beijing, 17 July 2006 through 19 July 2006 ; Volume 1 , 2006 , Pages 617-622 Iraji, R ; Manzuri Shalmani, M. T ; Jamalian, A. H ; Beigy, H ; Sharif University of Technology
    2006
    Abstract
    In this paper, we present a new fixed structure learning automaton (FSSA), called IJA, and study its steady state behavior in stationary environments. The proposed automaton characterizes by star shaped transition diagram and each branch of the star contains N states associated with a particular action. This new automaton is an improvement of the Krinsky FSSA and not only ε-optimal and expedient, but also converges to the optimal action faster than the old one. © 2006 IEEE  

    An equivalence based method for compositional verification of the linear temporal logic of constraint automata

    , Article Electronic Notes in Theoretical Computer Science ; Volume 159, Issue 1 , 2006 , Pages 171-186 ; 15710661 (ISSN) Izadi, M ; Movaghar Rahimabadi, A ; Sharif University of Technology
    2006
    Abstract
    Constraint automaton is a formalism to capture the operational semantics of the channel based coordination language Reo. In general constraint automaton can be used as a formalism for modeling coordination of some components. In this paper we introduce a standard linear temporal logic and two fragments of it for expressing the properties of the systems modeled by constraint automata and show that the equivalence relation defined by Valmari et al. is the minimal compositional equivalence preserving that fragment of linear time temporal logic which has no next-time operator and has an extra operator distinguishing deadlocks and a slight modification of this equivalence is the minimal... 

    Thermal and grain-structure simulation in a land-based turbine blade directionally solidified with the liquid metal cooling process

    , Article Metallurgical and Materials Transactions B: Process Metallurgy and Materials Processing Science, Warrendale ; Volume 31, Issue 6 , 2000 , Pages 1293-1304 ; 10735615 (ISSN) Kermanpur, A ; Varahram, N ; Davami, P ; Rappaz, M ; Sharif University of Technology
    Minerals, Metals & Materials Soc (TMS)  2000
    Abstract
    The thermal field and the grain structure of a cored superalloy turbine blade, which has been directionally solidified with the liquid metal cooling (LMC) process, has been simulated in three dimensions using a cellular automaton (CA) coupled with finite-element (CAFE) model. The cooling induced by the liquid aluminum bath has been replaced by a heat-transfer coefficient, whose temperature- and time-dependence has been adjusted on the basis of natural convection simulations and dimensionless analyses. The simulated grain structure and crystallographic texture have been compared with the microstructure, and the electron back-scattered diffraction (EBSD) results were obtained for a real blade.... 

    A new real-coded Bayesian optimization algorithm based on a team of learning automata for continuous optimization

    , Article Genetic Programming and Evolvable Machines ; Vol. 15, Issue. 2 , 2014 , pp. 169-193 ; ISSN: 13892576 Moradabadi, B ; Beigy, H ; Sharif University of Technology
    Abstract
    Estimation of distribution algorithms have evolved as a technique for estimating population distribution in evolutionary algorithms. They estimate the distribution of the candidate solutions and then sample the next generation from the estimated distribution. Bayesian optimization algorithm is an estimation of distribution algorithm, which uses a Bayesian network to estimate the distribution of candidate solutions and then generates the next generation by sampling from the constructed network. The experimental results show that the Bayesian optimization algorithms are capable of identifying correct linkage between the variables of optimization problems. Since the problem of finding the... 

    Optimal maneuver-based motion planning over terrain and threats using a dynamic hybrid PSO algorithm

    , Article Aerospace Science and Technology ; Volume 26, Issue 1 , April–May , 2013 , Pages 60-71 ; 12709638 (ISSN) Karimi, J ; Pourtakdoust, S. H ; Sharif University of Technology
    2013
    Abstract
    Motion planning is a key factor in enhancing the autonomy level of unmanned flying vehicles. A new dynamic hybrid algorithm is developed to solve the motion planning problem in real-time using a heuristic optimization approach. The proposed algorithm effectively combines desired features such as rapid convergence to an optimal path with reduced computational effort. In addition to the terrain obstacles, the proposed algorithm is able to avoid random threats that may arise sporadically in the terrain. Using the maneuver automaton concept, nonlinear dynamic model and performance constraints are also considered in the process of motion planning to further ensure feasible trajectories.... 

    Modeling real-time coordination systems using timed Bchi automata

    , Article 2011 CSI International Symposium on Computer Science and Software Engineering, CSSE 2011, 15 June 2011 through 16 June 2011 ; June , 2011 , Pages 17-24 ; 9781612842073 (ISBN) Ahmadi Danesh, Z ; Izadi, M ; Sharif University of Technology
    2011
    Abstract
    Reo is an exogenous coordination language for synthesizing components participating in a component-based system. The notion of Bchi automaton over streams of records (BAR for short) is a proposed operational semantics for Reo that covers several aspects of coordination strategies such as synchronization, context dependencies and fairness constraints. In this paper and for the purpose of modeling real-time coordination systems specified by Reo, we present a timed version of BARs as the acceptors of timed streams of records. We show that timed BAR and its streams of records based semantics are more standard and also more expressive than timed constraint automaton which is the first proposed... 

    A learning automata-based adaptive uniform fractional guard channel algorithm

    , Article Journal of Supercomputing ; Volume 71, Issue 3 , 2015 , Pages 871-893 ; 09208542 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    Kluwer Academic Publishers  2015
    Abstract
    In this paper, we propose an adaptive call admission algorithm based on learning automata. The proposed algorithm uses a learning automaton to specify the acceptance/rejection of incoming new calls. It is shown that the given adaptive algorithm converges to an equilibrium point which is also optimal for uniform fractional channel policy. To study the performance of the proposed call admission policy, the computer simulations are conducted. The simulation results show that the level of QoS is satisfied by the proposed algorithm and the performance of given algorithm is very close to the performance of uniform fractional guard channel policy which needs to know all parameters of input traffic.... 

    Noise reduction and image sharpening using IJA stochastic learning automaton

    , Article 2nd International Conference on Computer Research and Development, ICCRD 2010, 7 May 2010 through 10 May 2010 ; May , 2010 , Pages 790-794 ; 9780769540436 (ISBN) Nooraliei, A ; Iraji, R ; Sharif University of Technology
    2010
    Abstract
    This paper utilizes IJA stochastic learning automaton for detecting noise and tuning value of alpha parameter which is used for image sharpening via gas diffusion model. The method has been applied to gray-scale images in an automatic and adaptive fashion. It is shown that the IJA automaton detects noise and can reform it appropriately. It glides the image to find the pattern of noise and replace it by the relevant characteristics of neighborhood to carry out the local restoration. Then, the automaton makes the image sharp with gas diffusion model by learning alpha parameter. The IJA automaton calculates appropriate local value for each pixel. Finally, experiments are presented and... 

    A learning automata and clustering-based routing protocol for named data networking

    , Article Telecommunication Systems ; 2016 , Pages 1-21 ; 10184864 (ISSN) Shariat, Z ; Movaghar, A ; Hoseinzadeh, M ; Sharif University of Technology
    Springer New York LLC 
    Abstract
    Named Data Networking (NDN) is a new information-centric networking architecture in which data or content is identified by a unique name and saved pieces of the content are used in the cache of routers. Certainly, routing is one of the major challenges in these networks. In NDN, to achieve the required data for users, interest messages containing the names of data are sent. Because the source and destination addresses are not included in this package, routers forward them using the names that carried in packages. This forward will continue until the interest package is served. In this paper, we propose a routing algorithm for NDN. The purpose of this protocol is to choose a path with the...