Learn More
The column subset selection problem is a well-known hard optimization problem of selecting an optimal subset of k columns from the matrix A<sup>m&#x00D7;n</sup>, k&lt;; n, so that the cost function is minimized. The problem is of practical importance for data mining and processing since it can be used for unsupervised feature selection, dimension reduction,(More)
In this article we discuss a simple hash function based upon properties of a well-known combinatorial design called quasigroups. The quasigroups are equivalent to the more familiar Latin squares and one of their most important properties is that all possible element of certain quasigroup occurs with equal probability. Actual implementations are based on(More)
Computer security is very important in these days. Computers are used probably in any industry and their protection against attacks is very important task. The protection usually consist in several levels. The first level is preventions. Intrusion detection system (IDS) may be used as next level. IDS is useful in detection of intrusions, but also in(More)
Differential evolution is an efficient populational meta -- heuristic optimization algorithm successful in solving difficult real world problems. Due to the simplicity of its operations and data structures, it is suitable for a parallel implementation on multicore systems and on the GPU. In this paper, we design a simple yet highly parallel implementation(More)
—Searching of similar pictures was in the past based mainly on searching of similar picture names. We try to find an effective method how to search pictures by searching of similar information in the picture (histograms, shapes, blocks,). There already are some methods but still not effective enough. In this paper we describe a method where we combine(More)
Attacks on the computer infrastructures are becoming an increasingly serious problem. Whether it is banking, e-commerce businesses, health care, law enforcement, air transportation, or education, we are all becoming increasingly reliant upon the networked computers. The possibilities and opportunities are limitless; unfortunately, so too are the risks and(More)
The analysis of social networks is concentrated mainly on uncovering hidden relations and properties of network nodes (vertices). Most of the current approaches are focused on different network types and different network coefficients. This article introduces a social network analysis based on the so-called Forgetting Curve and Swarm Intelligence inspired(More)