signature library is key factor for performance of anti-virus programs considering accuracy and scanning *** ensure coverage of various emerging viruses,the scale of signature library grows larger and the consequence ...
详细信息
ISBN:
(纸本)9781612848372
signature library is key factor for performance of anti-virus programs considering accuracy and scanning *** ensure coverage of various emerging viruses,the scale of signature library grows larger and the consequence is lower efficiency because of the need of matching against more *** paper's target is to decrease the signature mapping cost by optimizing signature *** advantage of common conduct characteristics of viruses such as self replica and seasoning,this paper proposed optimization policy against this scalable issue with help of data *** data simulation shows significant potential performance improvement using the proposed optimization policy.
Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g.;banner ads,navigation bars,copy right and privacy notices,advertisements which are not related to the ...
详细信息
ISBN:
(纸本)9781612848396
Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g.;banner ads,navigation bars,copy right and privacy notices,advertisements which are not related to the main content(relevant information).In this paper,an algorithm is proposed that extract the main content from the web *** algorithm based on Content Structure Tree (CST).Firstly,the proposed system use HTML Parser to construct DOM(Document Object Model)tree from which construct Content Structure Tree(CST)which can easily separate the main content blocks from the other *** proposed system then introduce cosine similarity measure to evaluate which parts of the CST tree represent the less important and which parts represent the more important of the *** proposed system can define the ranking of the documents using similarity values and also extracts the top ranked documents as more relevant to the query.
This paper analyzed the sustainable tendency of the grain production of Henan Province since reform and opening up, and then used the main composition analysis of 8 or 9 main influencing factors correspondingly to val...
详细信息
Based on the analysis and introduction of blind source separation, it analyzes the signal sorting of the maximum kurtosis natural logarithm, compares the signal model forms of the narrowband blind beam forming and ins...
详细信息
Natural Language processing (NLP) is a field of computer science and linguistics concerned with the interactions between computers and human (natural) *** is one of these problems which have been a great challenge for...
详细信息
ISBN:
(纸本)9781612848396
Natural Language processing (NLP) is a field of computer science and linguistics concerned with the interactions between computers and human (natural) *** is one of these problems which have been a great challenge for computational *** paper concentrates on the problem of target word selection in Myanmar to English machine translation,for which the approach is directly *** this system can only solve the ambiguities of verbs in Myanmar-English *** paper presents a corpus-based approach to word sense disambiguation that builds an ensemble of Na ve Bayesian classifiers,each of which based on lexical *** nouns are detail classified in our *** this paper,we propose a framework to solve ambiguous verb *** system will support to improve the accuracy of the Myanmar to English translation.
The paper Puts forward a novel feedback chaotic block cipher algorithm based on external key control. The prominent advantage of the algorithm is that the cipherkey of the system is composed of 128-bit external keys. ...
详细信息
This paper is proposing a novel idea for text transformation based on mapping single letters form the standard alphabetical order into the same set of single letters reordered by their relative frequencies. This metho...
详细信息
In the process of achieving enterprise value maximization, agricultural enterprises will face external and internal risks of uncertainty. The premise of risk control is to conduct a risk assessment. The key of risk as...
详细信息
Delay Tolerant Networks (DTNs) are wireless networks in which at any given time instance, the probability of having a complete path from a source to destination is low due to the intermittent connectivity between node...
详细信息
This paper presents an multiscale image retrieval algorithm which uses a new class of image features as the image descriptors, from the DTCWT(Dual-Tree complex wavelet transform). It uses DTCWT to detect keypoints, ma...
详细信息
暂无评论