scholarly journals The program decision logic approach to predicated execution

1999 ◽  
Vol 27 (2) ◽  
pp. 208-219 ◽  
Author(s):  
David I. August ◽  
John W. Sias ◽  
Jean-Michel Puiatti ◽  
Scott A. Mahlke ◽  
Daniel A. Connors ◽  
...  
2015 ◽  
Vol 42 (1) ◽  
pp. 113-138
Author(s):  
Dariusz Piętka ◽  
Paweł Stacewicz

Abstract The subject of the paper is a contemporary interpretation of J.S. Mill’s elimination method using selected concepts of Zdzisław Pawlak’s decision logic. The aim of the interpretation is to reformulate the original rules (canons) of Mill’s induction so that they correspond more precisely to his concept of cause as a complex sufficient condition. In the first part of the paper, we turn to Mill’s writings and justify the thesis that in his understanding the cause is an aggregation of circumstances, and not a single circumstance; next, we point out that Mill’s original canons (for example the canon of agreement and the canon of difference) do not allow causes-aggregations to be singled out from empirical data. In the second part of this paper, we present such aspects of Z. Pawlak’s decision logic that serve as the basis for the formalisation of the method of eliminative induction. We describe exhaustively the schema of induction that involves a gradual - divided into three stages - simplification of a set of implications corresponding to the observed dependencies [system of potential causes, effect]. The simplification is deductive because it maintains consistency within the set of implications. We show that such schema is ideal for isolating complex causes (aggregations of circumstances), ultimately described using complex conditional formulas of decision logic.


2019 ◽  
Vol 8 (3) ◽  
pp. 5926-5929

Blind forensic-investigation in a digital image is a new research direction in image security. It aims to discover the altered image content without any embedded security scheme. Block and key point based methods are the two dispensation options in blind image forensic investigation. Both the techniques exhibit the best performance to reveal the tampered image. The success of these methods is limited due to computational complexity and detection accuracy against various image distortions and geometric transformation operations. This article introduces different blind image tampering methods and introduces a robust image forensic investigation method to determine the copy-move tampered image by means of fuzzy logic approach. Empirical outcomes facilitate that the projected scheme effectively classifies copy-move type of forensic images as well as blurred tampered image. Overall detection accuracy of this method is high over the existing methods.


1998 ◽  
Author(s):  
Thomas Meitzler ◽  
Regina Kistner ◽  
Bill Pibil ◽  
Euijung Sohn ◽  
Darryl Bryk ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document