- Full text PDF available (1)
This paper looked for previously unexplored triadic network patterns in online social networks in general and of YouTube online friendship network in particular. In order to accomplish statistically sound analysis of local micro processes acting on triadic level in social networks, we applied statistical tests of triad census, by conditioning expected… (More)
This paper proposes a means of using a multilayered feedforward neural network to identify the author of a text. The network has to be trained where multilayer feedforward neural network as a powerful scheme for learning complex input-output mapping have been used in learning of the textual descriptors in a paragraphs of an author. The resulting training… (More)
Due to the advancements in the field of quantum computing and possible compromise of existing key-exchange algorithms, it is essential to explore performance and efficiency of new key-exchange techniques, such as Quantum Key Distribution (QKD). QKD is possible over fiber cable and Free Space Optical (FSO) links. Fiber based QKD may be used if direct line of… (More)
Intrusion detection plays an important role in todays computer and communication technology. As such it is very important to design time efficient Intrusion Detection System (IDS) low in both, False Positive Rate (FPR) and False Negative Rate (FNR), but high in attack detection precision. To achieve that, this paper proposes Neural Network Committee Machine… (More)
Intrusion detection plays an important role in today's computer and communication technology. As such it is very important pattern recognition is achieved for U2R with 58.8% of success rate.