The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computational Intelligence methods are widely used in a diverse range of scientific and industrial applications, including economic modeling, finance, networks and transportation, database design, design and control, scheduling and others. On the other hand, Collective Intelligence methods aim at harvesting the power of people's mobile devices for gathering and sending useful information about the...
Many of the network security protocols employed today utilize symmetric block ciphers (DES, AES and CAST etc). The majority of the symmetric block ciphers implement the crucial substitution operation using look up tables, called substitution boxes. These structures should be highly nonlinear and have bit dispersal, i.e. avalanche, properties in order to render the cipher with resistant to cryptanalysis...
In this paper, we define a new combinatorial function on the edges of complete weighted graphs. This function assigns to each edge of the graph the sum of the weights of all Hamiltonian cycles that contain the edge. Since this function involves the factorial function, whose exact calculation is intractable due to its superexponential asymptotic rate of increase, we also introduce a normalized version...
Nowadays, the majority of humans live in a world ofinterconnected cities. A contemporary city attempts to improve the quality of citizens' life and its economy by integrating digital infrastructures with the physical city (smart city). Moreover, citizens in smart cities are playing the centralrole in the majority of eBusiness models that are based onCollective Intelligent decision making applications...
In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the common...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.