Finding Multiplier nodes without graph analysis
This article provides an overview of statistical indicators to find users that have a significant high impact of other users. In the past, this was mostly done by graph analysis. This approach uses indicators that need no graph analysis for their results.
Multiplier nodes are users in social networks that have a significant number of friends and produce a high amount of network traffic. They communicate with other users or their posts were seen by a lot of people. Finding these users... continue reading
Introduction to Random Forests
This text is a short extract of my research activities and can be seen as a brief introduction to the topic. If you have any questions or suggestions don’t hesitate to contact me.
Random Forests are an ensemble of separately trained binary deci...
How NBDS learns to learn
After a long period of absence, I’m back to announce the 0.2.5 version of the neuron-based data structure called NBDS. This project was introduced in december 2010 as a concept. After that, the development of NBDS still continued, so I wrote abo...
Theta8 – Next step website analysis
I’m proudly present a new release of a project, that I’ve developed at the cip-labs. It’s named Theta8. This smart web application analyzes the response of a given URL and collects some data about it. It gives advices, tricks and ti...
Neuron based data structure – An implementation
Exactly one year ago, I came out with an idea of a neuron based data structure. In the first article about this idea, I tried to give an overview about, how this data model should work. In the article below, I introduce you to the implementation of th...
Ipsum – The PHP formula parser
Some time ago, I thought about that it would nice to have a smart piece of code, that calculates the result of a given formula. The next step, I thought about, was to integrate customized functions into the code. So, I wrote a parser, that is able to ...
Benford Calculation in PHP
Some month ago, I came out with an article about Benfords Law. This article deals with the summation and product formula based implementation in C. The algorithm is indeed cool for small statistical games, but not nice to use, when you have a set of n...
MySQL Schema Performance Considerations
The most optimization tricks for MySQL focus on query performance or server tuning. But the optimization starts with the design of the database schema. When you forget to optimize the base of your database (the structure), then you will pay the price ...
Ideas to bypass the frequency analysis
In the history of encryption article, I even dealt with mono alphabetic substitution. This means, that every letter from the source alphabet will be substituted with exactly one letter from the target alphabet. It is simple to understand as it is easy...
The history of encryption part 1
This article deals with the history of encryption and is the first part of two articles about this topic. All techniques were described in a chronological order. In this part of the article I deal with:
Scytale and transposition cipher
Nondeterministic Finite Automata in PHP
A few weeks ago, I wrote an article about an implementation of a DFA (deterministic finite automaton) in PHP. Today, I present a implementation for an automaton, that is not deterministic. It means, that the automaton have no, one or more than one edg...