We introduce a family of simple and fast algorithms for solving the classical string matching problem, string matching with don't care symbols and complement symbols, and multiple patterns. In addition we solve th...
ISBN:
(纸本)0897913213
We introduce a family of simple and fast algorithms for solving the classical string matching problem, string matching with don't care symbols and complement symbols, and multiple patterns. In addition we solve the same problems allowing up to k mismatches. Among the features of these algorithms are that they are real time algorithms, they don't need to buffer the input, and they are suitable to be implemented in hardware.
- This paper presents an adaptive QoS management scheme to accommodate dynamic variations in network resources, due to the mobility of the users and location-dependent errors. The scheme ensures that satisfactory leve...
详细信息
Senior citizens consider the most significant part of aging to be the changes that occur to their bodies. For this reason, they avoid doing body exercises and therefore often prone to heart diseases, muscle disorders ...
详细信息
Autonomous Vehicle (AV) decision-making in ur-ban environments is inherently challenging due to the dynamic interactions with surrounding vehicles. For safe planning, AV/ego must understand the weightage of various sp...
详细信息
Al-Qur'an is a source of life guidance for Muslims. The digital version of the Qur'an is already available on the android platform. The Indonesian Ministry of Religion provides an official application called t...
详细信息
We present a highly adaptive hierarchical representation of the topology of functions defined over two-manifold domains. Guided by the theory of Morse–Smale complexes, we encode dependencies between cancellations of ...
详细信息
With fast development of Cyber Physical System, the variety and volume of data generated from different edge servers are fairly considerable. Mining and exploiting the data would definitely bring huge advantages. Howe...
详细信息
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious...
详细信息
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious issues during network management,including identifying malicious traffic,which is a *** remains an open contest over how to learn features in IDS since current approaches use deep learning *** learning,which combines swarm intelligence and evolution,is gaining attention for further improvement against cyber *** this study,we employed a PSO-GA(fusion of particle swarm optimization(PSO)and genetic algorithm(GA))for feature selection on the CICIDS-2017 *** achieve better accuracy,we proposed a hybrid model called LSTM-GRU of deep learning that fused the GRU(gated recurrent unit)and LSTM(long short-term memory).The results show considerable improvement,detecting several network attacks with 98.86%accuracy.A comparative study with other current methods confirms the efficacy of our proposed IDS scheme.
There is an abundance of existing systems that focus on driver behaviour analysis. The existing driver behaviour analysis is based on average star ratings, driving quality data, customer complaints, and other feedback...
详细信息
The increasing adoption of the Linked data format, RDF, over the last two decades has brought new opportunities. It has also raised new challenges though, especially when it comes to managing and processing large amou...
详细信息
暂无评论