Learn More
The column subset selection problem is a well-known hard optimization problem of selecting an optimal subset of k columns from the matrix A<sup>m&#x00D7;n</sup>, k&lt;; n, so that the cost function is minimized. The problem is of practical importance for data mining and processing since it can be used for unsupervised feature selection, dimension reduction,(More)
In this article we discuss a simple hash function based upon properties of a well-known combinatorial design called quasigroups. The quasigroups are equivalent to the more familiar Latin squares and one of their most important properties is that all possible element of certain quasigroup occurs with equal probability. Actual implementations are based on(More)
Computer security is very important in these days. Computers are used probably in any industry and their protection against attacks is very important task. The protection usually consist in several levels. The first level is preventions. Intrusion detection system (IDS) may be used as next level. IDS is useful in detection of intrusions, but also in(More)
Graphic processing units (GPUs) emerged recently as an exciting new hardware environment for a truly parallel implementation and execution of Nature and Bio-inspired Algorithms with excellent price-to-power ratio. In contrast to common multicore CPUs that contain up to tens of independent cores, the GPUs represent a massively parallel single-instruction(More)
Differential evolution is an efficient populational meta -- heuristic optimization algorithm successful in solving difficult real world problems. Due to the simplicity of its operations and data structures, it is suitable for a parallel implementation on multicore systems and on the GPU. In this paper, we design a simple yet highly parallel implementation(More)
The analysis of social networks is concentrated mainly on uncovering hidden relations and properties of network nodes (vertices). Most of the current approaches are focused on different network types and different network coefficients. This article introduces a social network analysis based on the so-called Forgetting Curve and Swarm Intelligence inspired(More)
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything) to the detection process. The purpose of this research is to identify important input features in building an IDS that is computationally efficient and effective. This paper(More)