نتایج جستجو برای: symbolic sequences

تعداد نتایج: 242153  

Journal: :IEEE Transactions on Circuits and Systems Ii-express Briefs 2023

A systematic method to find short unstable periodic orbits embedded in chaotic attractors is proposed. The based on the construction of symbolic representations trajectories, which are used limit number symbol sequences considered with a given period and also candidates orbits. Newton applied accurate positions Using Rössler system as an example, it shown that proposed outperforms existing meth...

Journal: :CoRR 2006
Yuri Pritykin

The notion of almost periodicity nontrivially generalizes the notion of periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite words) first appeared in the field of symbolic dynamics, but then turned out to be interesting in connection with computer science. The paper studies the class of eventually strongly almost periodic sequences (i. e., becoming strongly almost peri...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2011
A Provata C Beck

Symbolic sequences generated by coupled map lattices (CMLs) can be used to model the chaotic-like structure of genomic sequences. In this study it is shown that diffusively coupled Chebyshev maps of order 4 (corresponding to a shift of four symbols) very closely reproduce the multifractal spectrum D(q) of human genomic sequences for coupling constant α = 0.35 ± 0.01 if q > 0. The presence of ra...

1998
Miroslav N. Velev Randal E. Bryant

This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill’s pipeline verification method [6] to the bit level, is a technique for providing on-the-fly identical initial memory state to two different memory execution sequences. We also present an algorithm which compares the final states of two memories for terna...

2013
Hamidreza Saberkari Mousa Shamsi Hamed Heravi Mohammad Hossein Sedaaghi

Punctual identification of protein-coding regions in Deoxyribonucleic Acid (DNA) sequences because of their 3-base periodicity has been a challenging issue in bioinformatics. Many DSP (Digital Signal Processing) techniques have been applied for identification task and concentrated on assigning numerical values to the symbolic DNA sequence and then applying spectral analysis tools such as the sh...

1988
Arthur C. Sanderson Luiz S. Homem de Mello

Classical control systems utilize implicit analytical models and select inputs using numerical computation in order to achieve desired plant performance in real time. Artificial intelligence planning systems utilize explicit symbolic or logical models of discrete operations and construct consistent planned sequences using symbolic reasoning to achieve specified task goals. In the development of...

1998
Miroslav N. Velev Randal E. Bryant

This paper makes the idea of memory shadowing [5] applicable to symbolic ternary simulation. Memory shadowing, an extension of Burch and Dill’s pipeline verification method [6] to the bit level, is a technique for providing on-the-fly identical initial memory state to two different memory execution sequences. We also present an algorithm which compares the final states of two memories for terna...

1997
Randal E. Bryant Miroslav N. Velev

This paper extends Burch and Dill’s pipeline verification method [4] to the bit level. We introduce the idea of memory shadowing, a new technique for providing on-the-fly identical initial memory state to two different memory execution sequences. We also present an algorithm which compares the final states of two memories for equality. Memory shadowing and the comparison algorithm build on the ...

2001
SÉBASTIEN FERENCZI LUCA Q. ZAMBONI

We describe an algorithm for generating the symbolic sequences which code the orbits of points under an interval exchange transformation on three intervals. The algorithm has two components. The first is an arithmetic division algorithm applied to the lengths of the intervals. This arithmetic construction was originally introduced by the authors in an earlier paper and may be viewed as a two-di...

1997
Randal E. Bryant Miroslav N. Velev

This paper extends Burch and Dill’s pipeline verification method [4] to the bit level. We introduce the idea of memory shadowing, a new technique for providing on-the-fly identical initial memory state to two different memory execution sequences. We also present an algorithm which compares the final states of two memories for equality. Memory shadowing and the comparison algorithm build on the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید