Search
Search Results
-
From Substitution Box to Threshold
With the escalating demand for lightweight ciphers as well as side channel protected implementation of those ciphers in recent times, this work... -
Computation on Structures
Over the last decades the field of computer science has changed a lot. In practice we are now dealing with very complex systems, but it seems that... -
On the Existence of Consensus Converging Organized Groups in Large Social Networks
In this paper we investigate the emergence of highly organized communities in graphs modeling social networks and interactions among their members.... -
Imbalance factor: a simple new scale for measuring inter-class imbalance extent in classification problems
Learning from datasets that suffer from differences in absolute frequency of classes is one of the most challenging tasks in the machine learning...
-
Q-Learning Based Adaptive Scheduling Method for Hospital Outpatient Clinics
Proper selection of the number of Service Providers (SPs) such as doctors, registration windows, and examination equipments in outpatient clinics can... -
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA
We consider a transform, called Derive-then-Derandomize, that hardens a given signature scheme against randomness failure and implementation error.... -
Towards True Decentralization: Development, Testing and Evaluation of a Novel Blockchain Consensus Protocol
The blockchain technology that powers the Bitcoin network was unveiled to the world in 2008. After more than a decade of research and development, a... -
Quality Control Model of Value Extraction of Residual Silk Reuse Based on Improved Genetic Algorithm
The recovery and reuse of residual silk in the tobacco industry is a normal work, but the efficiency of this work has always been a weak link in... -
Model-Based Indirect RL: Dynamic Programming
Many distinct communities have actively worked on solving sequential decision processes, in which multistage decisions are made to optimize the... -
Distribution Estimation for Probabilistic Loops
We present an algorithmic approach to estimate the value distributions of random variables of probabilistic loops whose statistical moments are... -
Two High-Performance Antenna Selection Schemes for Secure SSK Modulation in Intelligent Industrial Wireless Sensing Systems
Industrial wireless sensor networks (IWSNs) provide intelligent factory management with a new dimension. Reliable intelligent industrial wireless... -
Design and Application of Music Assisted Teaching System Based on ARM and SA Algorithm
In music teaching, there are some tasks that cannot be completed or done well by humans, so it is necessary to develop an auxiliary teaching system... -
Lattice-Based Proof-of-Work for Post-Quantum Blockchains
Proof of Work (PoW) protocols, originally proposed to circumvent DoS and email spam attacks, are now at the heart of the majority of recent... -
A free mind cannot be digitally transferred
The digital transfer of the mind to a computer system (i.e., mind uploading ) requires representing the mind as a finite sequence of bits (1s and 0s)....
-
Seeing like an algorithm: operative images and emergent subjects
Algorithmic vision, the computational process of making meaning from digital images or visual information, has changed the relationship between the...
-
Po-Miner: A Web Mining Poem Generator and its Security Model
The growing importance of data science and analytics has led to innovative applications spread across various fields and genres over a short period...
-
Introducing the Book
This book has two principal goals: to enlighten and to engage. 1. Most obviously, the book is designed as an introduction to Computation Theory for... -
Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation
Since NIST has recently selected FALCON as one of quantum–resistant digital signatures which uses the hash-and-sign paradigm in the style of... -
DDSC-SMOTE: an imbalanced data oversampling algorithm based on data distribution and spectral clustering
Imbalanced data poses a significant challenge in machine learning, as conventional classification algorithms often prioritize majority class samples,...
-
True Turing: A Bird’s-Eye View
Alan Turing is often portrayed as a materialist in secondary literature. In the present article, I suggest that Turing was instead an idealist,...