This document describes a process for converting regular expressions to non-deterministic finite automata (NFA). It discusses Thompson's algorithm, which divides regular expressions into smaller chunks and transforms them into NFAs that are then combined. The algorithm has 5 simple rules and works by treating each symbol as an NFA, combining NFAs for concatenation, adding epsilon transitions for union and Kleene star. The proposed system would accept a regular expression, define a transition table, check the expression against conditions defined by the algorithm, and display the resulting NFA transition table. Future work could include optimizing the NFA size and error handling to improve reliability.
Regular Expression to Deterministic Finite AutomataIRJET Journal
This document discusses converting regular expressions to deterministic finite automata (DFA). It first provides background on regular expressions and DFAs. It then reviews several existing approaches for converting regular expressions to NFAs and then NFAs to equivalent DFAs using subset construction. The methodology section outlines the step-by-step process for this conversion. It begins with converting the regular expression to a non-deterministic finite automata (NFA) and then converting the NFA to an equivalent DFA. The results and discussion section evaluates limitations and applications. It concludes that regular expression to DFA conversion is well-understood and important for applications involving pattern matching and text parsing.
Pattern Matching using Computational and Automata TheoryIRJET Journal
This document discusses using finite automata for pattern matching. It begins by defining finite automata and their components. It then discusses how finite automata can be used to represent patterns for pattern matching by having states correspond to prefixes of the pattern. Transition tables are provided as an example for the patterns "memo" and detecting the string "barbara". Common pattern matching algorithms like Knuth-Morris-Pratt and Boyer-Moore are also mentioned. The document concludes that finite automata can effectively be used to match regular expressions and languages.
Pattern-based Definition and Generation of Components for a Synchronous React...ijeukens
This document discusses a method for specifying components in a synchronous reactive actor-oriented language and automatically generating code from those specifications to guarantee the components are correct with respect to the language's semantics. The method enhances component interfaces with patterns of required input data that capture possible conditions for output generation. Algorithms are described for generating code from interfaces with patterns to ensure the code is consistent with the synchronous reactive semantics. A case study demonstrates the usefulness of the approach.
This document presents an algorithm for converting a non-deterministic finite automaton (NFA) to a deterministic finite automaton (DFA) in C language. It discusses existing NFA to DFA conversion methods and proposes implementing the conversion algorithm using C data structures like structures, queues and linked lists. The algorithm takes the NFA transition table as input and generates the corresponding DFA transition table and final state. Pseudocode and flowcharts of the algorithm are provided. The implementation is shown to work similarly to how NFA to DFA conversion is done manually. The summary provides an overview of the key aspects and goal of the presented work.
This document describes a web-based application that allows users to create and test deterministic finite automata (DFA). The application provides a graphical user interface for constructing DFAs by adding states, transitions between states with input strings, and marking final states. Users can then test DFAs by inputting strings and seeing if they are accepted or rejected. The goals of the project are to help students and learners visualize and understand how DFAs work in a hands-on way through interactive design and testing. It reviews related work on tools for finite automata and discusses the methodology, including algorithms, for building and testing DFAs using the application. Screenshots demonstrate an example DFA constructed and test strings evaluated. Potential future work is discussed,
IMPLEMENTATION OF FRACTIONAL ORDER TRANSFER FUNCTION USING LOW COST DSPIAEME Publication
In this paper, different fractional order transfer functions are taken first and discretized them using available methods and filters (i.e. Oustaloup or modified Oustaloup). Coefficients of discretized transfer function are calculated and scaled using Q15 number system to get the coefficients in the range between -1 to 1, and converted into equivalent hexadecimal number. These coefficients are entered into the Micro C code that is generated using filter design tool of Micro C for dsPIC microcontroller. Also the simulation results are validated using EasydsPIC4 development board.
IRJET - Speech to Speech Translation using Encoder Decoder ArchitectureIRJET Journal
This document summarizes a research paper on speech-to-speech translation using an encoder-decoder architecture. It describes a system that takes speech in one language as input, recognizes the speech to generate text, translates the text to another language, and synthesizes speech in the other language as output. The system consists of three main modules: speech recognition in the source language, text translation between languages, and speech generation in the target language. It aims to enable two-way translation between spoken sentences in different languages.
Regular Expression to Deterministic Finite AutomataIRJET Journal
This document discusses converting regular expressions to deterministic finite automata (DFA). It first provides background on regular expressions and DFAs. It then reviews several existing approaches for converting regular expressions to NFAs and then NFAs to equivalent DFAs using subset construction. The methodology section outlines the step-by-step process for this conversion. It begins with converting the regular expression to a non-deterministic finite automata (NFA) and then converting the NFA to an equivalent DFA. The results and discussion section evaluates limitations and applications. It concludes that regular expression to DFA conversion is well-understood and important for applications involving pattern matching and text parsing.
Pattern Matching using Computational and Automata TheoryIRJET Journal
This document discusses using finite automata for pattern matching. It begins by defining finite automata and their components. It then discusses how finite automata can be used to represent patterns for pattern matching by having states correspond to prefixes of the pattern. Transition tables are provided as an example for the patterns "memo" and detecting the string "barbara". Common pattern matching algorithms like Knuth-Morris-Pratt and Boyer-Moore are also mentioned. The document concludes that finite automata can effectively be used to match regular expressions and languages.
Pattern-based Definition and Generation of Components for a Synchronous React...ijeukens
This document discusses a method for specifying components in a synchronous reactive actor-oriented language and automatically generating code from those specifications to guarantee the components are correct with respect to the language's semantics. The method enhances component interfaces with patterns of required input data that capture possible conditions for output generation. Algorithms are described for generating code from interfaces with patterns to ensure the code is consistent with the synchronous reactive semantics. A case study demonstrates the usefulness of the approach.
This document presents an algorithm for converting a non-deterministic finite automaton (NFA) to a deterministic finite automaton (DFA) in C language. It discusses existing NFA to DFA conversion methods and proposes implementing the conversion algorithm using C data structures like structures, queues and linked lists. The algorithm takes the NFA transition table as input and generates the corresponding DFA transition table and final state. Pseudocode and flowcharts of the algorithm are provided. The implementation is shown to work similarly to how NFA to DFA conversion is done manually. The summary provides an overview of the key aspects and goal of the presented work.
This document describes a web-based application that allows users to create and test deterministic finite automata (DFA). The application provides a graphical user interface for constructing DFAs by adding states, transitions between states with input strings, and marking final states. Users can then test DFAs by inputting strings and seeing if they are accepted or rejected. The goals of the project are to help students and learners visualize and understand how DFAs work in a hands-on way through interactive design and testing. It reviews related work on tools for finite automata and discusses the methodology, including algorithms, for building and testing DFAs using the application. Screenshots demonstrate an example DFA constructed and test strings evaluated. Potential future work is discussed,
IMPLEMENTATION OF FRACTIONAL ORDER TRANSFER FUNCTION USING LOW COST DSPIAEME Publication
In this paper, different fractional order transfer functions are taken first and discretized them using available methods and filters (i.e. Oustaloup or modified Oustaloup). Coefficients of discretized transfer function are calculated and scaled using Q15 number system to get the coefficients in the range between -1 to 1, and converted into equivalent hexadecimal number. These coefficients are entered into the Micro C code that is generated using filter design tool of Micro C for dsPIC microcontroller. Also the simulation results are validated using EasydsPIC4 development board.
IRJET - Speech to Speech Translation using Encoder Decoder ArchitectureIRJET Journal
This document summarizes a research paper on speech-to-speech translation using an encoder-decoder architecture. It describes a system that takes speech in one language as input, recognizes the speech to generate text, translates the text to another language, and synthesizes speech in the other language as output. The system consists of three main modules: speech recognition in the source language, text translation between languages, and speech generation in the target language. It aims to enable two-way translation between spoken sentences in different languages.
IRJET- Partition Method for DFA MinimizationIRJET Journal
This document presents a partition method for minimizing deterministic finite automata (DFAs). It begins with background on DFAs and the goal of minimization. The proposed algorithm partitions the DFA states based on a formula, merges any equivalent states within each partition, and repeats until all states are processed. It applies the algorithm to a sample DFA using a tool, successfully minimizing it while preserving language recognition. The conclusion states the partition method allows merging equivalent states to minimize the DFA. Experiments showed no change to structure or accepted language after minimization.
IRJET- On-Screen Translator using NLP and Text DetectionIRJET Journal
This document describes a proposed on-screen text translator system using natural language processing (NLP) and text detection. The system would detect text from images or video frames using tools like OpenCV and Python-tesseract, extract the text as a string, and input it into an NLP model. The NLP model would analyze the string using techniques like LSTM and RNN to tokenize the words and return a translated output. Future work could include improving detection of curved text, integrating detection and recognition, and adding support for more languages. The goal is to provide translations of unfamiliar words directly on screen to aid reading comprehension.
A General Framework for Electronic Circuit VerificationIRJET Journal
This document presents a general framework for formally verifying digital electronic circuits. It discusses representing circuits as finite state machines and using Linear Temporal Logic (LTL) to specify properties to verify. Key points:
- Digital circuits and computer programs are similar in nature, so methods used to verify programs can also verify circuits.
- A circuit can be modeled as a finite state machine by creating a state for every combination of inputs to each logic gate.
- LTL allows specifying temporal properties of the circuit to verify, using operators like "Next", "Until", "Eventually", and "Always".
- The framework was tested on sample circuits, proving properties using a symbolic model checker on the LTL specifications
match the following attributes to the parts of a compilerstrips ou.pdfarpitaeron555
match the following attributes to the parts of a compiler
strips out the comments and whitespace
converts text into lexemes
generates an Abstrat Symbol Tree
recursive descent or table driven
uses BNF or EBNF definitions
a. lexer
b. parser
Solution
The Program and Portfolio Management Maturity Model is an effective tool for organizations to
decide quickly what PPM improvements they should make to enhance their organization\'s
ability to optimize investments, execute big changes and deliver value.
Overview
Key Findings
Real project, program and portfolio management, when operating at the level of well-integrated
practices, is the key enabler that allows organizations to identify and execute strategic change.
Any meaningful undertakings to enhance or evolve the program and portfolio management
(PPM) function must pay more than lip service to organizational structure, business model and
culture to have any chance of success.
Competitive pressures and changing market conditions are forcing organizations toward Level 3,
and most organizations still aren\'t ready to make the leap.
Recommendations
At any level of PPM maturity, focus first on helping the organization make well-informed
investment choices. This will improve the odds of project success more than any other factor.
For organizations that require enterprisewide change and capabilities, it is worth the effort to
pursue Level 4, where enterprise PPM practices are built.
Identify objectives for your enterprise, and use them to identify the most salient improvement
opportunities for your enterprise.
Meticulously manage the change involved in maturing/improving your PPM capabilities.
Analysis
Project/program/portfolio management office (PMO) leaders, program managers and portfolio
managers are frequently challenged by ineffective processes, lack of stakeholder engagement and
difficult-to-quantify value. 1 Part of the problem is failure to match their processes, people and
technology approaches to the maturity level of their organizations. 2
The Gartner Program and Portfolio Management (PPM) Maturity Model assessment is designed
to help PPM leaders understand best practices around large project management, as well as PPM
to handle delivery of strategic value. This model assumes that organizations progress through a
maturity curve and that each level of organizational maturity directly affects the level of
investment and types of PPM approaches organizations choose to adopt.
arsing
A parser is an algorithm that determines whether a given input string is in a language and, as a
side-effect, usually produces a parse tree for the input. There is a procedure for generating a
parser from a given context-free grammar.
Recursive-Descent Parsing
Recursive-descent parsing is one of the simplest parsing techniques that is used in practice.
Recursive-descent parsers are also called top-down parsers, since they construct the parse tree
top down (rather than bottom up).
The basic idea of recursive-descent par.
This document proposes using parallel finite automata (PFA) to model the execution of processors and instructions. PFA allow modeling processors with long pipelines, parallelism, and out-of-order execution in a compact way compared to traditional finite state automata. The approach partitions a processor's resources into sub-automata that can execute transitions independently, while synchronization ensures coordinated execution. This partitioning reduces states while still capturing pipeline effects, hazards, and parallelism seen in modern processors.
IRJET - Low Power M-Sequence Code Generator using LFSR for Body Sensor No...IRJET Journal
The document describes a proposed low power m-sequence code generator using a linear feedback shift register (LFSR) for body sensor node applications. An LFSR generates pseudo-random binary sequences through a linear feedback function combining bits in the shift register. The document evaluates different designs for the XOR gates used in the feedback function, finding a transmission gate based design consumes significantly less power than other designs. It then proposes a 7-bit m-sequence code generator using a 3-stage LFSR with XOR gates in the feedback loop for low power consumption, suitable for use in wireless body sensor nodes.
The document describes an extended method for synthesizing distributed protocol specifications from UML-based service specifications that include timing constraints. The method first assigns timing intervals to transitions in the service specification. It then extends an existing UML-based protocol synthesis technique to consider channel delays between communicating protocol entities when deriving transition events and timing constraints. The resulting synthesized protocol specifications are guaranteed to conform to the timing constraints of the original service specification.
Synthesizing specifications for real time applications that involve distributed communication protocol
entities from a service specification, which is modeled in the UML state machine with composite states, is a
time-consuming and labor-intensive task. Existing synthesis techniques for UML-based service
specifications do not account for timing constrains and, therefore, cannot be used in real time applications
for which the timing constraints are crucial and must be considered. In this paper, we address the problem
of time assignment to the events defined in the service specification modeled in UML state machine. In
addition, we show how to extend a technique that automatically synthesizes UML-based protocol
specifications from a service specification to consider the timing constraints given in the service
specification. The resulting synthesized protocol is guaranteed to conform to the timing constraints given in
the service specification.
This document compares the accuracy of ARIMA, LSTM, and linear regression models for stock price prediction. It downloads historic stock price data for NASDAQ and NSE stocks and uses 80% for training and 20% for testing the models. For the NASDAQ stock, ARIMA and LSTM models have more accurate predictions than linear regression, with lower RMSE values. However, for the NSE stock, LSTM and linear regression predictions are more accurate than ARIMA. The results are displayed using Python plots and code, with RMSE values provided to compare prediction accuracy between the different models.
Introduction: Language Processors, the structure of a compiler, the science of building a compiler, programming language basics.
Lexical Analysis: The Role of the Lexical Analyzer, Input Buffering, Recognition of Tokens, The Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to Automata, Design of a Lexical-Analyzer Generator, Optimization of DFA-Based Pattern Matchers
Designing A Syntax Based Retrieval System03Avelin Huo
The document proposes a syntax-based text retrieval system to support grammatical querying of tagged corpora for language learners and teachers. It describes building an index of part-of-speech tagged n-grams from a corpus, with a filter to select discriminative index terms. A regular expression query is rewritten and its positions in the index are used to find candidate matching text units efficiently. An evaluation compares the proposed index to a complete index in terms of size and query performance.
Robust fault detection for switched positive linear systems with time varying...ISA Interchange
This paper investigates the problem of robust fault detection for a class of switched positive linear systems with time-varying delays. The fault detection filter is used as the residual generator, in which the filter parameters are dependent on the system mode. Attention is focused on designing the positive filter such that, for model uncertainties, unknown inputs and the control inputs, the error between the residual and fault is minimized. The problem of robust fault detection is converted into a positive L1 filtering problem. Subsequently, by constructing an appropriate multiple co-positive type Lyapunov–Krasovskii functional, as well as using the average dwell time approach, sufficient conditions for the solvability of this problem are established in terms of linear matrix inequalities (LMIs). Two illustrative examples are provided to show the effectiveness and applicability of the proposed results.
The document discusses concepts related to sequence control and subprograms in programming languages. It covers conditional statements, loops, exception handling, subprogram definition and activation, and subprogram environments. Key points include implicit and explicit sequence control using statements, precedence and associativity rules for expressions, stack-based implementation of subprogram calls, and static versus dynamic scoping of identifiers through referencing environments.
Reflective and Refractive Variables: A Model for Effective and Maintainable A...Vincenzo De Florio
We propose a simple and effective tool for the expression of tasks such as cross-layer optimization strategies
or sensors-related applications. The approach is based
on what we refer to as “reflective and refractive variables”. Both types of variables are associated with external entities, e.g. sensors or actuators. A reflective
variable is a volatile variable, that is, a variable that
might be concurrently modified by multiple threads. A
library of threads is made available, each of which interfaces a set of sensors and continuously update the value
of a corresponding set of sensors. One such thread is
“cpu”, which exports the current level of usage of the
local CPU as an integer between 0 and 100. This integer is reflected into the integer reflective variable cpu.
A refractive variable is a reflective variable that can be
modified. Each modification is caught and interpreted
as a request to change the value of an actuator. For
instance, setting variable “tcp sendrate” would request
a cross-layer adjustment to the thread interfacing the
local TCP layer entity. This allows express in an easy
way complex operations in the application layer of any
programming language, e.g. plain old C. We describe
our translator and the work we are carrying out within
PATS to build simple and powerful libraries of scripts
based on reflective and refractive variables, including
robotics applications and RFID tags processing.
Type Conversion Elimination by Dominant Flow Analysisinventionjournals
This document presents an approach to eliminate unnecessary type conversions in programs by performing dominant flow analysis. It analyzes the flow of variable definitions and uses to determine the minimum number of type conversions needed. A dominator tree is constructed for each variable to identify dominant conversion locations. Conversions are only inserted at dominant locations, and other reachable conversions are removed. Experimental results show the approach eliminates an average of 71.5% of type conversions across various benchmarks. The reduction in conversions decreases code size and power consumption while improving performance.
This document discusses functional programming in TypeScript. It begins by defining functional programming concepts like immutability, higher order functions, and avoiding side effects. It then outlines three tenets of functional programming: taming side effects, using expressions over statements, and higher order functions. Finally, it details TypeScript features that support functional programming, including spread/rest operators, lambda expressions, union types, type inference, and tagged union types.
Synthesizing specifications for real time applications that involve distributed communication protocol
entities from a service specification, which is modeled in the UML state machine with composite states, is a
time-consuming and labor-intensive task. Existing synthesis techniques for UML-based service
specifications do not account for timing constrains and, therefore, cannot be used in real time applications
for which the timing constraints are crucial and must be considered. In this paper, we address the problem
of time assignment to the events defined in the service specification modeled in UML state machine. In
addition, we show how to extend a technique that automatically synthesizes UML-based protocol
specifications from a service specification to consider the timing constraints given in the service
specification. The resulting synthesized protocol is guaranteed to conform to the timing constraints given in
the service specification.
UML2SAN: Toward A New Software Performance Engineering Approachijseajournal
Software Performance Engineering (SPE) has recently considered as an important issue in the software
development process. It consists on evaluate the performance of a system during the design phase. We have
recently proposed a new methodology to generate a Stochastic Automata Network (SAN) model from a
UML model, to consequently obtain performance predications from UML specifications. In this paper, we
expand our idea to cover more complex UML models taking in advantage the modularity of SAN in
modeling large systems. A formal description of the generation process is presented. The new extension
gives rise to a serious approach in SPE that we call UML2SAN.
The document discusses Raft, a consensus algorithm that provides a simpler alternative to Paxos. It decomposes consensus into three subproblems: leader election, log replication, and safety. The algorithm elects a strong leader that clients direct requests to, and the leader replicates log entries to followers to achieve consensus. If the leader fails, followers will elect a new leader to take over log replication and continue providing consensus.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Regular Expression to Non-Deterministic Finite Automata Converter
IRJET- Partition Method for DFA MinimizationIRJET Journal
This document presents a partition method for minimizing deterministic finite automata (DFAs). It begins with background on DFAs and the goal of minimization. The proposed algorithm partitions the DFA states based on a formula, merges any equivalent states within each partition, and repeats until all states are processed. It applies the algorithm to a sample DFA using a tool, successfully minimizing it while preserving language recognition. The conclusion states the partition method allows merging equivalent states to minimize the DFA. Experiments showed no change to structure or accepted language after minimization.
IRJET- On-Screen Translator using NLP and Text DetectionIRJET Journal
This document describes a proposed on-screen text translator system using natural language processing (NLP) and text detection. The system would detect text from images or video frames using tools like OpenCV and Python-tesseract, extract the text as a string, and input it into an NLP model. The NLP model would analyze the string using techniques like LSTM and RNN to tokenize the words and return a translated output. Future work could include improving detection of curved text, integrating detection and recognition, and adding support for more languages. The goal is to provide translations of unfamiliar words directly on screen to aid reading comprehension.
A General Framework for Electronic Circuit VerificationIRJET Journal
This document presents a general framework for formally verifying digital electronic circuits. It discusses representing circuits as finite state machines and using Linear Temporal Logic (LTL) to specify properties to verify. Key points:
- Digital circuits and computer programs are similar in nature, so methods used to verify programs can also verify circuits.
- A circuit can be modeled as a finite state machine by creating a state for every combination of inputs to each logic gate.
- LTL allows specifying temporal properties of the circuit to verify, using operators like "Next", "Until", "Eventually", and "Always".
- The framework was tested on sample circuits, proving properties using a symbolic model checker on the LTL specifications
match the following attributes to the parts of a compilerstrips ou.pdfarpitaeron555
match the following attributes to the parts of a compiler
strips out the comments and whitespace
converts text into lexemes
generates an Abstrat Symbol Tree
recursive descent or table driven
uses BNF or EBNF definitions
a. lexer
b. parser
Solution
The Program and Portfolio Management Maturity Model is an effective tool for organizations to
decide quickly what PPM improvements they should make to enhance their organization\'s
ability to optimize investments, execute big changes and deliver value.
Overview
Key Findings
Real project, program and portfolio management, when operating at the level of well-integrated
practices, is the key enabler that allows organizations to identify and execute strategic change.
Any meaningful undertakings to enhance or evolve the program and portfolio management
(PPM) function must pay more than lip service to organizational structure, business model and
culture to have any chance of success.
Competitive pressures and changing market conditions are forcing organizations toward Level 3,
and most organizations still aren\'t ready to make the leap.
Recommendations
At any level of PPM maturity, focus first on helping the organization make well-informed
investment choices. This will improve the odds of project success more than any other factor.
For organizations that require enterprisewide change and capabilities, it is worth the effort to
pursue Level 4, where enterprise PPM practices are built.
Identify objectives for your enterprise, and use them to identify the most salient improvement
opportunities for your enterprise.
Meticulously manage the change involved in maturing/improving your PPM capabilities.
Analysis
Project/program/portfolio management office (PMO) leaders, program managers and portfolio
managers are frequently challenged by ineffective processes, lack of stakeholder engagement and
difficult-to-quantify value. 1 Part of the problem is failure to match their processes, people and
technology approaches to the maturity level of their organizations. 2
The Gartner Program and Portfolio Management (PPM) Maturity Model assessment is designed
to help PPM leaders understand best practices around large project management, as well as PPM
to handle delivery of strategic value. This model assumes that organizations progress through a
maturity curve and that each level of organizational maturity directly affects the level of
investment and types of PPM approaches organizations choose to adopt.
arsing
A parser is an algorithm that determines whether a given input string is in a language and, as a
side-effect, usually produces a parse tree for the input. There is a procedure for generating a
parser from a given context-free grammar.
Recursive-Descent Parsing
Recursive-descent parsing is one of the simplest parsing techniques that is used in practice.
Recursive-descent parsers are also called top-down parsers, since they construct the parse tree
top down (rather than bottom up).
The basic idea of recursive-descent par.
This document proposes using parallel finite automata (PFA) to model the execution of processors and instructions. PFA allow modeling processors with long pipelines, parallelism, and out-of-order execution in a compact way compared to traditional finite state automata. The approach partitions a processor's resources into sub-automata that can execute transitions independently, while synchronization ensures coordinated execution. This partitioning reduces states while still capturing pipeline effects, hazards, and parallelism seen in modern processors.
IRJET - Low Power M-Sequence Code Generator using LFSR for Body Sensor No...IRJET Journal
The document describes a proposed low power m-sequence code generator using a linear feedback shift register (LFSR) for body sensor node applications. An LFSR generates pseudo-random binary sequences through a linear feedback function combining bits in the shift register. The document evaluates different designs for the XOR gates used in the feedback function, finding a transmission gate based design consumes significantly less power than other designs. It then proposes a 7-bit m-sequence code generator using a 3-stage LFSR with XOR gates in the feedback loop for low power consumption, suitable for use in wireless body sensor nodes.
The document describes an extended method for synthesizing distributed protocol specifications from UML-based service specifications that include timing constraints. The method first assigns timing intervals to transitions in the service specification. It then extends an existing UML-based protocol synthesis technique to consider channel delays between communicating protocol entities when deriving transition events and timing constraints. The resulting synthesized protocol specifications are guaranteed to conform to the timing constraints of the original service specification.
Synthesizing specifications for real time applications that involve distributed communication protocol
entities from a service specification, which is modeled in the UML state machine with composite states, is a
time-consuming and labor-intensive task. Existing synthesis techniques for UML-based service
specifications do not account for timing constrains and, therefore, cannot be used in real time applications
for which the timing constraints are crucial and must be considered. In this paper, we address the problem
of time assignment to the events defined in the service specification modeled in UML state machine. In
addition, we show how to extend a technique that automatically synthesizes UML-based protocol
specifications from a service specification to consider the timing constraints given in the service
specification. The resulting synthesized protocol is guaranteed to conform to the timing constraints given in
the service specification.
This document compares the accuracy of ARIMA, LSTM, and linear regression models for stock price prediction. It downloads historic stock price data for NASDAQ and NSE stocks and uses 80% for training and 20% for testing the models. For the NASDAQ stock, ARIMA and LSTM models have more accurate predictions than linear regression, with lower RMSE values. However, for the NSE stock, LSTM and linear regression predictions are more accurate than ARIMA. The results are displayed using Python plots and code, with RMSE values provided to compare prediction accuracy between the different models.
Introduction: Language Processors, the structure of a compiler, the science of building a compiler, programming language basics.
Lexical Analysis: The Role of the Lexical Analyzer, Input Buffering, Recognition of Tokens, The Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to Automata, Design of a Lexical-Analyzer Generator, Optimization of DFA-Based Pattern Matchers
Designing A Syntax Based Retrieval System03Avelin Huo
The document proposes a syntax-based text retrieval system to support grammatical querying of tagged corpora for language learners and teachers. It describes building an index of part-of-speech tagged n-grams from a corpus, with a filter to select discriminative index terms. A regular expression query is rewritten and its positions in the index are used to find candidate matching text units efficiently. An evaluation compares the proposed index to a complete index in terms of size and query performance.
Robust fault detection for switched positive linear systems with time varying...ISA Interchange
This paper investigates the problem of robust fault detection for a class of switched positive linear systems with time-varying delays. The fault detection filter is used as the residual generator, in which the filter parameters are dependent on the system mode. Attention is focused on designing the positive filter such that, for model uncertainties, unknown inputs and the control inputs, the error between the residual and fault is minimized. The problem of robust fault detection is converted into a positive L1 filtering problem. Subsequently, by constructing an appropriate multiple co-positive type Lyapunov–Krasovskii functional, as well as using the average dwell time approach, sufficient conditions for the solvability of this problem are established in terms of linear matrix inequalities (LMIs). Two illustrative examples are provided to show the effectiveness and applicability of the proposed results.
The document discusses concepts related to sequence control and subprograms in programming languages. It covers conditional statements, loops, exception handling, subprogram definition and activation, and subprogram environments. Key points include implicit and explicit sequence control using statements, precedence and associativity rules for expressions, stack-based implementation of subprogram calls, and static versus dynamic scoping of identifiers through referencing environments.
Reflective and Refractive Variables: A Model for Effective and Maintainable A...Vincenzo De Florio
We propose a simple and effective tool for the expression of tasks such as cross-layer optimization strategies
or sensors-related applications. The approach is based
on what we refer to as “reflective and refractive variables”. Both types of variables are associated with external entities, e.g. sensors or actuators. A reflective
variable is a volatile variable, that is, a variable that
might be concurrently modified by multiple threads. A
library of threads is made available, each of which interfaces a set of sensors and continuously update the value
of a corresponding set of sensors. One such thread is
“cpu”, which exports the current level of usage of the
local CPU as an integer between 0 and 100. This integer is reflected into the integer reflective variable cpu.
A refractive variable is a reflective variable that can be
modified. Each modification is caught and interpreted
as a request to change the value of an actuator. For
instance, setting variable “tcp sendrate” would request
a cross-layer adjustment to the thread interfacing the
local TCP layer entity. This allows express in an easy
way complex operations in the application layer of any
programming language, e.g. plain old C. We describe
our translator and the work we are carrying out within
PATS to build simple and powerful libraries of scripts
based on reflective and refractive variables, including
robotics applications and RFID tags processing.
Type Conversion Elimination by Dominant Flow Analysisinventionjournals
This document presents an approach to eliminate unnecessary type conversions in programs by performing dominant flow analysis. It analyzes the flow of variable definitions and uses to determine the minimum number of type conversions needed. A dominator tree is constructed for each variable to identify dominant conversion locations. Conversions are only inserted at dominant locations, and other reachable conversions are removed. Experimental results show the approach eliminates an average of 71.5% of type conversions across various benchmarks. The reduction in conversions decreases code size and power consumption while improving performance.
This document discusses functional programming in TypeScript. It begins by defining functional programming concepts like immutability, higher order functions, and avoiding side effects. It then outlines three tenets of functional programming: taming side effects, using expressions over statements, and higher order functions. Finally, it details TypeScript features that support functional programming, including spread/rest operators, lambda expressions, union types, type inference, and tagged union types.
Synthesizing specifications for real time applications that involve distributed communication protocol
entities from a service specification, which is modeled in the UML state machine with composite states, is a
time-consuming and labor-intensive task. Existing synthesis techniques for UML-based service
specifications do not account for timing constrains and, therefore, cannot be used in real time applications
for which the timing constraints are crucial and must be considered. In this paper, we address the problem
of time assignment to the events defined in the service specification modeled in UML state machine. In
addition, we show how to extend a technique that automatically synthesizes UML-based protocol
specifications from a service specification to consider the timing constraints given in the service
specification. The resulting synthesized protocol is guaranteed to conform to the timing constraints given in
the service specification.
UML2SAN: Toward A New Software Performance Engineering Approachijseajournal
Software Performance Engineering (SPE) has recently considered as an important issue in the software
development process. It consists on evaluate the performance of a system during the design phase. We have
recently proposed a new methodology to generate a Stochastic Automata Network (SAN) model from a
UML model, to consequently obtain performance predications from UML specifications. In this paper, we
expand our idea to cover more complex UML models taking in advantage the modularity of SAN in
modeling large systems. A formal description of the generation process is presented. The new extension
gives rise to a serious approach in SPE that we call UML2SAN.
The document discusses Raft, a consensus algorithm that provides a simpler alternative to Paxos. It decomposes consensus into three subproblems: leader election, log replication, and safety. The algorithm elects a strong leader that clients direct requests to, and the leader replicates log entries to followers to achieve consensus. If the leader fails, followers will elect a new leader to take over log replication and continue providing consensus.
Similar to Regular Expression to Non-Deterministic Finite Automata Converter (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.