6 research outputs found

    Asynchronous simulation of Boolean networks by monotone Boolean networks

    Get PDF
    International audienceWe prove that the fully asynchronous dynamics of a Boolean network f : {0, 1}^n → {0, 1}^n without negative loop can be simulated, in a very specific way, by a monotone Boolean network with 2n components. We then use this result to prove that, for every even n, there exists a monotone Boolean network f : {0, 1}^n → {0, 1}^n , an initial configuration x and a fixed point y of f such that: (i) y can be reached from x with a fully asynchronous updating strategy, and (ii) all such strategies contains at least 2^{n/2} updates. This contrasts with the following known property: if f : {0, 1}^n → {0, 1}^n is monotone, then, for every initial configuration x, there exists a fixed point y such that y can be reached from x with a fully asynchronous strategy that contains at most n updates

    On the typology and the worship status of sacred trees with a special reference to the Middle East

    Get PDF
    This article contains the reasons for the establishment of sacred trees in Israel based on a field study. It includes 97 interviews with Muslim and Druze informants. While Muslims (Arabs and Bedouins) consider sacred trees especially as an abode of righteous figures' (Wellis') souls or as having a connection to their graves, the Druze relate sacred trees especially to the events or deeds in the lives of prophets and religious leaders. A literary review shows the existence of 24 known reasons for the establishment of sacred trees worldwide, 11 of which are known in Israel one of these is reported here for the first time. We found different trends in monotheistic and polytheistic religions concerning their current worship of sacred trees

    Review: machine learning techniques applied to cybersecurity

    No full text
    Machine learning techniques are a set of mathematical models to solve high non-linearity problems of different topics: prediction, classification, data association, data conceptualization. In this work, the authors review the applications of machine learning techniques in the field of cybersecurity describing before the different classifications of the models based on (1) their structure, network-based or not, (2) their learning process, supervised or unsupervised and (3) their complexity. All the capabilities of machine learning techniques are to be regarded, but authors focus on prediction and classification, highlighting the possibilities of improving the models in order to minimize the error rates in the applications developed and available in the literature. This work presents the importance of different error criteria as the confusion matrix or mean absolute error in classification problems, and relative error in regression problems. Furthermore, special attention is paid to the application of the models in this review work. There are a wide variety of possibilities, applying these models to intrusion detection, or to detection and classification of attacks, to name a few. However, other important and innovative applications in the field of cybersecurity are presented. This work should serve as a guide for new researchers and those who want to immerse themselves in the field of machine learning techniques within cybersecurity
    corecore