A Novel Computational Method for Biomedical Binary Data Analysis: Development of a Thyroid Disease Index Using a Brute-Force Search with MLR Analysis

2017 ◽  
Vol 38 (12) ◽  
pp. 1392-1397
Author(s):  
Jin Kak Lee ◽  
Won Seok Han ◽  
Jun-Seok Lee ◽  
Chang No Yoon
2019 ◽  
Vol 8 (4) ◽  
pp. 4411-4417

Authenticating users to secure systems is a crucial task for security experts to solve a password problem, where user should able to memorize a password or secret and password should be hard to guess and crack by adversaries. In general, Most of the secure systems were designed with text passwords along with additional factors such as tokens like smart card, mobile device. Text passwords are not resistant to dictionary, brute-force and guessing attacks. This paper proposes a novel graphical password method, which solves the password problem and secure against all password vulnerabilities. Theoretically, graphical passwords are easy to memorize and recall them easily for long term and resistant to dictionary and brute-force search attacks


Author(s):  
Michael W. Bruford ◽  
Mark A. Beaumont
Keyword(s):  

2018 ◽  
Vol 10 (4) ◽  
pp. 24
Author(s):  
David L. Selke

Loops that enforce a correct output and that restart with a changed parameter may emulate a brute force search, even against the design intent. A Python program is presented analogous to Shor's Algorithm but with random number generation replacing the math. It factors integers. Shor's Algorithm devices may operate similarly to the Python program, not in being random, but in being classical.


2010 ◽  
Vol 25 (3) ◽  
pp. 281-297 ◽  
Author(s):  
Lukáš Chrpa

AbstractThere are many approaches for solving planning problems. Many of these approaches are based on ‘brute force’ search methods and they usually do not care about structures of plans previously computed in particular planning domains. By analyzing these structures, we can obtain useful knowledge that can help us find solutions to more complex planning problems. The method described in this paper is designed for gathering macro-operators by analyzing training plans. This sort of analysis is based on the investigation of action dependencies in training plans. Knowledge gained by our method can be passed directly to planning algorithms to improve their efficiency.


Author(s):  
S. Fedotova ◽  
O. Seredin ◽  
O. Kushnir

In this paper, we investigate the exact method of searching an axis of binary image symmetry, based on brute-force search among all potential symmetry axes. As a measure of symmetry, we use the set-theoretic Jaccard similarity applied to two subsets of pixels of the image which is divided by some axis. Brute-force search algorithm definitely finds the axis of approximate symmetry which could be considered as ground-truth, but it requires quite a lot of time to process each image. As a first step of our contribution we develop the parallel version of the brute-force algorithm. It allows us to process large image databases and obtain the desired axis of approximate symmetry for each shape in database. Experimental studies implemented on “Butterflies” and “Flavia” datasets have shown that the proposed algorithm takes several minutes per image to find a symmetry axis. However, in case of real-world applications we need computational efficiency which allows solving the task of symmetry axis search in real or quasi-real time. So, for the task of fast shape symmetry calculation on the common multicore PC we elaborated another parallel program, which based on the procedure suggested before in (Fedotova, 2016). That method takes as an initial axis the axis obtained by superfast comparison of two skeleton primitive sub-chains. This process takes about 0.5 sec on the common PC, it is considerably faster than any of the optimized brute-force methods including ones implemented in supercomputer. In our experiments for 70 percent of cases the found axis coincides with the ground-truth one absolutely, and for the rest of cases it is very close to the ground-truth.


Sign in / Sign up

Export Citation Format

Share Document