The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A significant number of Moroccans use cybercafes on a regular basis for work and leisure. Unfortunately, if these cybercafe machines are infected with malware, such malware can steal users' passwords and other sensitive information. Assessing cybercafe security in Morocco can help assess the risk that users encounter when using cybercafes. However, to the best of our knowledge, there is no academic...
Structural analysis of networks has attracted a lot of attention from researchers. While previous studies have devised structural indices for quantitatively describing network structures, they mostly focus on specific structural characteristics and the structural information provided by them is often fragmental. This paper proposes methods for representing and analyzing structural characteristics...
In connection with investigations related to mathability and to applications of computer assisted methods for studying mathematical problems, an animation of the m-convex hull of finite sets of points on the Cartesian plane is presented.
Active semi-supervised learning can play an important role in classification scenarios in which labeled data are difficult to obtain, while unlabeled data can be easily acquired. This paper focuses on an active semi-supervised algorithm that can be driven by multiple clustering hierarchies. If there is one or more hierarchies that can reasonably align clusters with class labels, then a few queries...
In this work, a serious game is presented to sensitize young people to stigma in mental health. This a video game, developed by a multidisciplinary team (computer scientists, psychologists, psychiatrists and educators), features characters that have different mental disorders. It provides different information about what mental illness is while the player interacts with the characters in different...
The construction of large-scale, low-latency networks becomes difficult as the number of nodes increases. In general, the way to construct a theoretically optimal solution is unknown. However, it is known that some methods can construct suboptimal networks with low-latency. One such method is to construct large-scale networks from optimal or suboptimal small networks, using the product of graphs....
By considering the fuzzy collaborative clustering, in this paper we investigate the ranking problem of factor granules, where the factor granule is composed by the patterns, the factors and the factor-induced information. Since the ideology of TOPSIS method is applied to obtain the finial ranking result, a referential factor granule is pre-provided. The collaborative information, i.e., the partition...
Statistical anomaly detection is emerging as an important complement to signature-based methods for enterprise network defence. In this paper, we isolate a persistent structure in two different enterprise network data sources. This structure provides the basis of a regression-based anomaly detection method. The procedure is demonstrated on a large public domain data set.
Computers cause an impact in almost every single aspect of our lives, however, unfortunately, schools have not been able to keep up with this irreversible evolution. The simple use of technological apparatuses in the classroom does not guarantee the improvement of the learning process, however it can be the medium through which the students find the alternatives for the solution of complex problems...
In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich...
Segmentation of manually written record photos into content material traces and words is a crucial undertaking for optical character acknowledgment. However, for the reason that elements of written by hand record are abnormal and various depending at the character, so far it is considered as a challenging issue. A good way to deal with the hassle, we formulate the word segmentation problem as a binary...
This article explores the illumination dependent on the distance between the elements of the LED array. Study the illumination depending on the distance was made between the LED array elements at different distances from the source. For this experiment scheme and laboratory equipment has been developed. A mathematical model of illumination from different types of LEDs using the computer system Origin...
Usually nearest-neighbor density estimator methods suffer from problems such as high time complexity of O(n2) and high memory requirement especially when indexing is used. These problems produce limitations on applying them for small datasets. In this paper a new method is proposed that calculates distances to nearest and farthest neighbor nodes to make dataset subgroups; therefore, computational...
Turn-based strategy games are interesting testbeds for developing artificial players because their rules present developers with several challenges. Currently, Monte-Carlo tree search variants are often utilized to address these challenges. However, we consider it worthwhile introducing minimax search variants with pruning techniques because a turn-based strategy is in some points similar to the games...
Today Peer-To-Peer (P2P) networks are becoming more important from high scalability and low cost point of view, and these networks are popular platform for video streaming. With burgeoning of P2P networks, one of the interesting areas of research is confronting to various attacks and threats against these networks. Since, video streaming is a popular application of P2P networks, some attacks like...
Finding quantitative measures for describing and characterizing the structural properties of networks is a research topic with ongoing interest. These measures are called graph invariants and are usually referred to as topological indices. The oldest topological index is the Wiener index, it has been extensively studied in many applications such as chemical graph theory, complex network, social networks,...
Hybrid sets are generalizations of sets and multisets, in which the multiplicities of elements can take any integers. This construction was proposed by Whitney in 1933 in terms of characteristic functions. Hybrid sets have been used by combinatorists to give combinatorial interpretationsfor several generalizations of binomial coefficients and Stirling numbers and by computer scientists to design fast...
Cylindrical Algebraic Decomposition (CAD) is a key tool in computational algebraic geometry, particularly for quantifier elimination over real-closed fields. However, it can be expensive, with worst case complexity doubly exponential in the size of the input. Hence it is important to formulate the problem in the best manner for the CAD algorithm. One possibility is to precondition the input polynomials...
A novel fiber-to-chip edge coupler with two tapered tips and a multimode interference combiner is demonstrated on a silicon-on-insulator platform. It has advantages over a single-tip edge coupler on coupling loss, bandwidth and misalignment tolerance.
Recent works address the problem of estimating agents' behaviors in complex networks, of which social networks are a prominent example. Many of the proposed techniques work but at the cost of a substantial computational complexity, which is not permitted when dealing with big data real-time analysis. This raises the question of whether a very simple nonparametric counting estimator works in practical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.