期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Theory of Approximate Reasoning in Two-Valued Predicate Logic Based on the Quasi-truth Degrees 被引量:2
1
作者 秦晓燕 刘军 +2 位作者 徐扬 陈树伟 刘熠 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期23-27,共5页
Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the ... Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the quasi-truth degrees of first-order formulae is discussed, and it is proved that there is no isolated point in the logic metric space (F, ρ ). Thus the pseudo-metric between first-order formulae is well defined to develop the study about approximate reasoning in the logic metric space (F, ρ ). Then, three different types of approximate reasoning patterns are proposed, and their equivalence under some condition is proved. This work aims at filling in the blanks of approximate reasoning in quantitative predicate logic. 展开更多
关键词 approximate reasoning PSEUDO-METRIC quasi-truth degree predicate logic
下载PDF
Modeling Trusted Computing 被引量:2
2
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
下载PDF
INTELLIGENT RESOLUTION OF COOPERATIVE CONFLICT
3
作者 李林森 于海勋 +1 位作者 罗继勋 佟明安 《Chinese Journal of Aeronautics》 SCIE EI CSCD 2000年第1期24-28,共6页
First, the concept of cooperative conflict is presented, and the characteristic of cooperative air combat is researched. Then, four methods of conflict resolution are designed by way of the first order predicate logic... First, the concept of cooperative conflict is presented, and the characteristic of cooperative air combat is researched. Then, four methods of conflict resolution are designed by way of the first order predicate logic, i.e. , link up, coordination, accommodation and integration, and corresponding examples are given. A 2 vs 2 air combat simulation was carried out; after conflict resolution, the loss ratio is dropped to 0.54 from the original 1.32, so the enhancement of effectiveness is notable. The present research findings are that the wide conflicts discover the essence of multi fighter cooperation, i.e. , to as fully as possible enhance the effectiveness of each fighter to attain global optimization, and that the possibility of conflict resolution shows the application prospect. The proposed method in this paper is a helpful try to the application of the Fifth Generation Computer in the new generation of C 3I system. 展开更多
关键词 cooperative conflict predicate logic conflict resolution multi fighter air combat
下载PDF
A programmable approach to revising knowledge bases 被引量:6
4
作者 LUAN Shangmin DAI Guozhong LI Wei 《Science in China(Series F)》 2005年第6期681-692,共12页
关键词 knowledge base knowledge base revision RULES predicate logic propositional logic
原文传递
Semantic Description and Verification of Security Policy Based on Ontology 被引量:1
5
作者 TANG Chenghua WANG Lina +2 位作者 TANG Shensheng QIANG Baohua TIAN Jilong 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期385-392,共8页
To solve the shortage problem of the semantic descrip- tion scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By de... To solve the shortage problem of the semantic descrip- tion scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By defining the basic elements of the security policy, the relationship model between the ontology and the concept of security policy based on the Web ontology language (OWL) is established, so as to construct the semantic description framework of the security policy. Through modeling and reasoning in the Protege, the ontology model of authorization policy is proposed, and the first-order predicate description logic is introduced to the analysis and verification of the model. Results show that the ontology-based semantic description of security policy has better flexibility and practicality. 展开更多
关键词 security policy ONTOLOGY semantic description ofpolicy the first-order predicate description logic
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部