Logic Journal of the IGPL

ISSN: 0945-9103

32 found

View year:

  1.  11
    Remarks on uniform interpolation property.Majid Alizadeh - 2024 - Logic Journal of the IGPL 32 (5):810-814.
    A logic $\mathcal{L}$ is said to satisfy the descending chain condition, DCC, if any descending chain of formulas in $\mathcal{L}$ with ordering induced by $\vdash _{\mathcal{L}};$ eventually stops. In this short note, we first establish a general theorem, which states that if a propositional logic $\mathcal{L}$ satisfies both DCC and has the Craig Interpolation Property, CIP, then it satisfies the Uniform Interpolation Property, UIP, as well. As a result, by using the Nishimura lattice, we give a new simply proof of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  12
    On the relationships between some meta-mathematical properties of arithmetical theories.Yong Cheng - 2024 - Logic Journal of the IGPL 32 (5):880-908.
    In this work, we aim at understanding incompleteness in an abstract way via metamathematical properties of formal theories. We systematically examine the relationships between the following twelve important metamathematical properties of arithmetical theories: Rosser, EI (effectively inseparable), RI (recursively inseparable), TP (Turing persistent), EHU (essentially hereditarily undecidable), EU (essentially undecidable), Creative, $\textbf{0}^{\prime }$ (theories with Turing degree $\textbf{0}^{\prime }$), REW (all RE sets are weakly representable), RFD (all recursive functions are definable), RSS (all recursive sets are strongly representable), RSW (all (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  15
    Contact semilattices.Paolo Lipparini - 2024 - Logic Journal of the IGPL 32 (5):815-826.
    We devise exact conditions under which a join semilattice with a weak contact relation can be semilattice embedded into a Boolean algebra with an overlap contact relation, equivalently, into a distributive lattice with additive contact relation. A similar characterization is proved with respect to Boolean algebras and distributive lattices with weak contact, not necessarily additive, nor overlap.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4. Correction to: Decidability of interpretability logics IL M 0 and IL W.Luka Mikec, Tin Perkov & Mladen Vukoviĉ - 2024 - Logic Journal of the IGPL 32 (5):936-937.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  36
    A probabilistic temporal epistemic logic: Decidability.Zoran Ognjanović, Angelina Ilić Stepić & Aleksandar Perović - 2024 - Logic Journal of the IGPL 32 (5):827-879.
    We study a propositional probabilistic temporal epistemic logic $\textbf {PTEL}$ with both future and past temporal operators, with non-rigid set of agents and the operators for agents’ knowledge and for common knowledge and with probabilities defined on the sets of runs and on the sets of possible worlds. A semantics is given by a class ${\scriptsize{\rm Mod}}$ of Kripke-like models with possible worlds. We prove decidability of $\textbf {PTEL}$ by showing that checking satisfiability of a formula in ${\scriptsize{\rm Mod}}$ is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  6
    Report on the exact methods for finding minimum-sized DFA.Wojciech Wieczorek, Łukasz Strąk & Arkadiusz Nowakowski - 2024 - Logic Journal of the IGPL 32 (5):909-935.
    This paper presents four state-of-art methods for the finite-state automaton inference based on a sample of labeled strings. The first algorithm is Exbar, and the next three are mathematical models based on ASP, SAT and SMT theories. The potentiality of using multiprocessor computers in the context of automata inference was our research’s primary goal. In a series of experiments, we showed that our parallelization of the exbar algorithm is the best choice when a multiprocessor system is available. Furthermore, we obtained (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  9
    Correspondence and canonicity theory of quasi-inequalities and Π 2-statements in modal subordination algebras.Zhiguang Zhao - 2024 - Logic Journal of the IGPL 32 (5):729-778.
    In the present paper, we study the correspondence and canonicity theory of modal subordination algebras and their dual Stone space with two relations, generalizing correspondence results for subordination algebras in [13–15, 25]. Due to the fact that the language of modal subordination algebras involves a binary subordination relation, we will find it convenient to use the so-called quasi-inequalities and $\varPi _{2}$-statements. We use an algorithm to transform (restricted) inductive quasi-inequalities and (restricted) inductive $\varPi _{2}$-statements to equivalent first-order correspondents on the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  16
    Predictive maintenance of vehicle fleets through hybrid deep learning-based ensemble methods for industrial IoT datasets.Arindam Chaudhuri & Soumya K. Ghosh - 2024 - Logic Journal of the IGPL 32 (4):671-687.
    Connected vehicle fleets have formed significant component of industrial internet of things scenarios as part of Industry 4.0 worldwide. The number of vehicles in these fleets has grown at a steady pace. The vehicles monitoring with machine learning algorithms has significantly improved maintenance activities. Predictive maintenance potential has increased where machines are controlled through networked smart devices. Here, benefits are accrued considering uptimes optimization. This has resulted in reduction of associated time and labor costs. It has also provided significant increase (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  11
    Sign-based image criteria for social interaction visual question answering.Anfisa A. Chuganskaya, Alexey K. Kovalev & Aleksandr I. Panov - 2024 - Logic Journal of the IGPL 32 (4):656-670.
    The multi-modal tasks have started to play a significant role in the research on artificial intelligence. A particular example of that domain is visual–linguistic tasks, such as visual question answering. The progress of modern machine learning systems is determined, among other things, by the data on which these systems are trained. Most modern visual question answering data sets contain limited type questions that can be answered either by directly accessing the image itself or by using external data. At the same (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  22
    A novel memetic algorithm for solving the generalized traveling salesman problem.Ovidiu Cosma, Petrică C. Pop & Laura Cosma - 2024 - Logic Journal of the IGPL 32 (4):576-588.
    This paper investigates the Generalized Traveling Salesman Problem (GTSP), which is an extension of the well-known Traveling Salesman Problem (TSP), and it searches for an optimal tour in a clustered graph, such that every cluster is visited exactly once. In this paper, we describe a novel Memetic Algorithm (MA) for solving efficiently the GTSP. Our proposed MA has at its core a genetic algorithm (GA), completed by a Chromosome Enhancement Procedure (CEP), which is based on a TSP solver and the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  18
    Recurrent variational autoencoder approach for remaining useful life estimation.Nahuel Costa & Luciano Sánchez - 2024 - Logic Journal of the IGPL 32 (4):605-623.
    A new method for evaluating aircraft engine monitoring data is proposed. Commonly, prognostics and health management systems use knowledge of the degradation processes of certain engine components together with professional expert opinion to predict the Remaining Useful Life (RUL). New data-driven approaches have emerged to provide accurate diagnostics without relying on such costly processes. However, most of them lack an explanatory component to understand model learning and/or the nature of the data. A solution based on a novel recurrent version of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  13
    A variable neighbourhood search for minimization of operation times through warehouse layout optimization.Jon Díaz, Haizea Rodriguez, Jenny Fajardo-Calderín, Ignacio Angulo & Enrique Onieva - 2024 - Logic Journal of the IGPL 32 (4):688-699.
    For companies involved in the supply chain, proper warehousing management is crucial. Warehouse layout arrangement and operation play a critical role in a company’s ability to maintain and improve its competitiveness. Reducing costs and increasing efficiency are two of the most crucial warehousing goals. Deciding on the best warehouse layout is a remarkable optimization problem. This paper uses an optimization method to set bin allocations within an automated warehouse with particular characteristics. The warehouse’s initial layout and the automated platforms limit (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  16
    An innovative framework for supporting content-based authorship identification and analysis in social media networks.José Gaviria de la Puerta, Iker Pastor-López, Alberto Tellaeche, Borja Sanz, Hugo Sanjurjo-González, Alfredo Cuzzocrea & Pablo G. Bringas - 2024 - Logic Journal of the IGPL 32 (4):589-604.
    Content-based authorship identification is an emerging research problem in online social media networks, due to a wide collection of issues ranging from security to privacy preservation, from radicalization to defamation detection, and so forth. Indeed, this research has attracted a relevant amount of attention from the research community during the past years. The general problem becomes harder when we consider the additional constraint of identifying the same false profile over different social media networks, under obvious considerations. Inspired by this emerging (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  11
    Gaussian process-based analysis of the nitrogen dioxide at Madrid Central Low Emission Zone.Juan Luis Gómez-González & Miguel Cárdenas-Montes - 2024 - Logic Journal of the IGPL 32 (4):700-711.
    Concern about air-quality in urban areas has led to the implementation of Low Emission Zones as one of many other initiatives to control it. Recently in Spain, the enactment of a law made this mandatory for cities with a population larger than 50k inhabitants. The delimitation of these areas is not without controversy because of possible negative economic and social impacts. Therefore, clear assessments of how these initiatives decrease pollutant concentrations are to be provided. Madrid Central is a major initiative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  7
    Clustering techniques performance comparison for predicting the battery state of charge: A hybrid model approach.María Teresa Ordás, David Yeregui Marcos del Blanco, José Aveleira-Mata, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, José Luis Calvo-Rolle & Héctor Alaiz-Moreton - 2024 - Logic Journal of the IGPL 32 (4):712-728.
    Batteries are a fundamental storage component due to its various applications in mobility, renewable energies and consumer electronics among others. Regardless of the battery typology, one key variable from a user’s perspective is the remaining energy in the battery. It is usually presented as the percentage of remaining energy compared to the total energy that can be stored and is labeled State Of Charge (SOC). This work addresses the development of a hybrid model based on a Lithium Iron Phosphate (LiFePO4) (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  7
    Optimized network for detecting burr-breakage in images of milling workpieces.Virginia Riego del Castillo, Lidia Sánchez-González & Nicola Strisciuglio - 2024 - Logic Journal of the IGPL 32 (4):624-633.
    Quality standards fulfilment is an essential task in manufacturing processes that involves high costs. One target is to avoid the presence of burrs in the edge of machine workpieces, which reduce the quality of the products. Furthermore, they are not easily removed since the part can even be damaged. In this paper, we propose an optimized Convolutional Neural Network, to detect the presence of burrs in images of milling parts. Its design is focused on the optimization of classification (accuracy) and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  15
    Adaptive graph Laplacian MTL L1, L2 and LS-SVMs.Carlos Ruiz, Carlos M. Alaíz & José R. Dorronsoro - 2024 - Logic Journal of the IGPL 32 (4):634-655.
    Multi-Task Learning tries to improve the learning process of different tasks by solving them simultaneously. A popular Multi-Task Learning formulation for SVM is to combine common and task-specific parts. Other approaches rely on using a Graph Laplacian regularizer. Here we propose a combination of these two approaches that can be applied to L1, L2 and LS-SVMs. We also propose an algorithm to iteratively learn the graph adjacency matrix used in the Laplacian regularization. We test our proposal with synthetic and real (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  18
    The lattice of all 4-valued implicative expansions of Belnap–Dunn logic containing Routley and Meyer’s basic logic Bd.Gemma Robles & José M. Méndez - 2024 - Logic Journal of the IGPL 32 (3):493-516.
    The well-known logic first degree entailment logic (FDE), introduced by Belnap and Dunn, is defined with |$\wedge $|⁠, |$\vee $| and |$\sim $| as the sole primitive connectives. The aim of this paper is to establish the lattice formed by the class of all 4-valued C-extending implicative expansions of FDE verifying the axioms and rules of Routley and Meyer’s basic logic B and its useful disjunctive extension B|$^{\textrm {d}}$|⁠. It is to be noted that Boolean negation (so, classical propositional logic) (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  7
    Correction to: A note on functional relations in a certain class of implicative expansions of FDE related to Brady’s 4-valued logic BN4.Gemma Robles & José M. Méndez - 2024 - Logic Journal of the IGPL 32 (3):572-572.
    This is a correction to: Gemma Robles, José M. Méndez, A note on functional relations in a certain class of implicative expansions of FDE related to Brady’.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  17
    FCA-based reasoning for privacy.Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz & Juan Galán-Páez - 2024 - Logic Journal of the IGPL 32 (2):224-242.
    Notwithstanding the potential danger to security and privacy, sharing and publishing data has become usual in Data Science. To preserve privacy, de-identification methodologies guided by risk estimation have been designed. Two issues associated with classical risk metrics are, on the one hand, the adequacy of the metric and, on the other hand, its static nature. In this paper, we present metrics for estimating risk based on the emerging semantics provided by Formal Concept Analysis. The metrics are designed to estimate the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  36
    Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families.Nuño Basurto, Diego García-Prieto, Héctor Quintián, Daniel Urda, José Luis Calvo-Rolle & Emilio Corchado - 2024 - Logic Journal of the IGPL 32 (2):306-320.
    As it is well known, mobile phones have become a basic gadget for any individual that usually stores sensitive information. This mainly motivates the increase in the number of attacks aimed at jeopardizing smartphones, being an extreme concern above all on Android OS, which is the most popular platform in the market. Consequently, a strong effort has been devoted for mitigating mentioned incidents in recent years, even though few researchers have addressed the application of visualization techniques for the analysis of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  18
    Towards enhanced monitoring framework with smart predictions.Antonello Calabrò, Said Daoudagh & Eda Marchetti - 2024 - Logic Journal of the IGPL 32 (2):321-333.
    Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions is by using a smart monitoring framework to continuously verify functional and non-functional property violations during the executions of the systems and their components. Method: This paper presents a set of guidelines for the Smart Monitoring Framework definition and its application process. Results and Conclusion: The paper provides the reference (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  11
    Good practices in designing a communication channel architecture for secure async flexible distributed collaboration.Rudolf Erdei, Daniela Delinschi, Oliviu Matei & Laura Andreica - 2024 - Logic Journal of the IGPL 32 (2):334-351.
    In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of Things (IoT). The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  23
    Accountability as a service for robotics: Performance assessment of different accountability strategies for autonomous robots.Laura Fernández-Becerra, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera & Vicente Matellán - 2024 - Logic Journal of the IGPL 32 (2):243-262.
    An essential requirement for increasing human confidence in computer systems is knowing an event’s origin. Therefore, it is necessary to have an efficient method to record such information. It is especially challenging in robotics, where unexpected behaviours can have unpredictable consequences, endangering the interests of people or even their safety. Furthermore, to analyse an incident’s cause or anticipate future behaviours, we must identify the events that cause a specific action. Although it is common to use logging systems for such purposes, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  25
    Realtime polymorphic malicious behavior detection in blockchain-based smart contracts.Darius GaliŞ, Ciprian PungilĂ & Viorel Negru - 2024 - Logic Journal of the IGPL 32 (2):210-223.
    This paper proposes an innovative approach to achieving real-time polymorphic behavior detection, and its direct application to blockchain-focused smart-contracts. We devise a method based on a non-deterministic finite state machine to perform approximate pattern-matching, using a look-ahead mechanism implemented through a concept similar to that of a sliding window, and using threshold-based similarity checking at every state in the automaton. We introduce and formalize our approach, discuss the challenges we faced and then test it in a real-world environment. The experimental (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  21
    Exploiting multimodal biometrics for enhancing password security.Konstantinos Karampidis - 2024 - Logic Journal of the IGPL 32 (2):293-305.
    Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to their convenience (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  56
    Detection, exploitation and mitigation of memory errors.Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez & Pablo Garcia Bringas - 2024 - Logic Journal of the IGPL 32 (2):281-292.
    Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense methods. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  14
    Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming network traffic raw (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  37
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  48
    A probabilistic temporal epistemic logic: Strong completeness.Zoran Ognjanović, Angelina Ilić Stepić & Aleksandar Perović - 2024 - Logic Journal of the IGPL 32 (1):94-138.
    The paper offers a formalization of reasoning about distributed multi-agent systems. The presented propositional probabilistic temporal epistemic logic $\textbf {PTEL}$ is developed in full detail: syntax, semantics, soundness and strong completeness theorems. As an example, we prove consistency of the blockchain protocol with respect to the given set of axioms expressed in the formal language of the logic. We explain how to extend $\textbf {PTEL}$ to axiomatize the corresponding first-order logic.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  31.  16
    On algebraic and topological semantics of the modal logic of common knowledge S4CI.Daniyar Shamkanov - 2024 - Logic Journal of the IGPL 32 (1):164-179.
    For the modal logic $\textsf {S4}^{C}_{I}$, we identify the class of completable $\textsf {S4}^{C}_{I}$-algebras and prove for them a Stone-type representation theorem. As a consequence, we obtain strong algebraic and topological completeness of the logic $\textsf {S4}^{C}_{I}$ in the case of local semantic consequence relations. In addition, we consider an extension of the logic $\textsf {S4}^{C}_{I}$ with certain infinitary derivations and establish the corresponding strong completeness results for the enriched system in the case of global semantic consequence relations.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Functional completeness and primitive positive decomposition of relations on finite domains.Sergiy Koshkin - 2024 - Logic Journal of the IGPL 32.
    We give a new and elementary construction of primitive positive decomposition of higher arity relations into binary relations on finite domains. Such decompositions come up in applications to constraint satisfaction problems, clone theory and relational databases. The construction exploits functional completeness of 2-input functions in many-valued logic by interpreting relations as graphs of partially defined multivalued ‘functions’. The ‘functions’ are then composed from ordinary functions in the usual sense. The construction is computationally effective and relies on well-developed methods of functional (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
 Previous issues
  
Next issues