共查询到20条相似文献,搜索用时 78 毫秒
1.
随着计算机技术和网络技术的发展,电子政务在我国开始全面实施。但是其中存在着诸如对信息时效性不能很好地处理等问题,这使其推广受到阻碍。通过分析目前电子政务中信息处理方法的不足,结合时态数据库的理论和方法,提出了一个解决电子政务中信息有效性的处理模型。 相似文献
2.
3.
4.
基于特征值的多模式匹配算法 总被引:3,自引:0,他引:3
高速网是当今网络发展的必然趋势,采用现行匹配算法的入侵检测系统(IDS)很难在高速网中有效地运行。本文主要从特征值的多模式匹配算法、模式库的组织和逻辑实现这三个方面来大幅度地提高系统检测速率,完全适应于高速网络的入侵检测。 相似文献
5.
6.
7.
8.
归纳了频繁子图挖掘方法的处理流程,分析评价了频繁子图挖掘的典型算法:广度优先搜索和深度优先搜索的频繁子图挖掘算法,概述了频繁子图挖掘研究的平台--图模型及其产生器,并对频繁子图挖掘方法未来研究方向进行了展望. 相似文献
9.
10.
串的模式匹配是一种重要的串运算。本文首先对朴素的模式匹配BF算法与KMP算法进行了分析,在此基础上寻求出一种简单实用、易于理解的字符串模式匹配改进算法。结果表明改进算法能减少模式匹配中字符的比较次数和尝试次数,提高模式匹配的效率。 相似文献
11.
A universal predictor based on pattern matching 总被引:2,自引:0,他引:2
Jacquet P. Szpankowski W. Apostol I. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2002,48(6):1462-1472
We consider a universal predictor based on pattern matching. Given a sequence X1, ..., Xn drawn from a stationary mixing source, it predicts the next symbol Xn+1 based on selecting a context of Xn+1. The predictor, called the sampled pattern matching (SPM), is a modification of the Ehrenfeucht-Mycielski (1992) pseudorandom generator algorithm. It predicts the value of the most frequent symbol appearing at the so-called sampled positions. These positions follow the occurrences of a fraction of the longest suffix of the original sequence that has another copy inside X1X2···Xn ; that is, in SPM, the context selection consists of taking certain fraction of the longest match. The study of the longest match for lossless data compression was initiated by Wyner and Ziv in their 1989 seminal paper. Here, we estimate the redundancy of the SPM universal predictor, that is, we prove that the probability the SPM predictor makes worse decisions than the optimal predictor is O(n-ν) for some 0<ν<½ as n→∞. As a matter of fact, we show that we can predict K=O(1) symbols with the same probability of error 相似文献
12.
13.
针对协同问答模式下无线电信号配对关系分析的需求,提出了一种基于信号时间序列匹配的询问应答信号配对方法。该方法提取侦察传感器获取的信号模式、到达时间、节点位置等参数,反向推算信号发射时间序列,通过时序匹配算法对询问和应答信号进行准确配对,从而提取节点间问答关系。计算机仿真验证了方法的有效性,在一定的条件下配对正确率超过95%。 相似文献
14.
Halaas A. Svingen B. Nedland M. Saetrom P. Snove O. Jr. Birkeland O.R. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2004,12(7):727-734
Many applications require searching for multiple patterns in large data streams for which there is no preprocessed index to rely on for efficient lookups. An multiple instruction stream-single data stream (MISD) VLSI architecture that is based on a recursive divide and conquer approach to pattern matching is proposed. This architecture allows searching for multiple patterns simultaneously. The patterns can be constructed much like regular expressions, and add features such as requiring subpatterns to match in a specific order with some fuzzy distance between them, and the ability to allow errors according to prescribed thresholds, or ranges of such. The current implementation permits up to 127 simultaneous patterns at a clock frequency of 100 MHz, and does 1.024/spl times/10/sup 11/ character comparisons per second. 相似文献
15.
Blind pattern matching attack on watermarking systems 总被引:4,自引:0,他引:4
Billions of dollars allegedly lost to piracy of multimedia content have triggered the industry to rethink the way music and films are distributed on the Internet. As encryption is vulnerable to digital or analog re-recording, currently almost all copyright protection mechanisms rely to a certain extent on watermarking. A watermark is an imperceptive secret hidden into a host signal. We analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical blind pattern matching attack relies on the observation that multimedia content is often highly repetitive. Thus, the attack procedure identifies subsets of signal blocks that are similar and permutes these blocks. Assuming the permuted blocks are marked with distinct secrets, it can be shown that any watermark detector is facing a task of exponential complexity to reverse the permutations as a preprocessing step for watermark detection. We describe the logistics of the attack and an implementation against a spread-spectrum and a quantization index modulation data hiding technology for audio signals. 相似文献
16.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1986,74(10):1465-1466
This letter presents the design and analysis of a bit-sequential array for pattern matching applications. The architecture makes multiple use of each data sample, has built-in concurrency and pipelining, and is based on a highly modular design with only nearest neighbor connections between array modules. The array computes all occurrences of a pattern of length m, in the string of length n, in O(m + n) time and O(m) hardware. The pattern and the string are fed in sequentially and the match indicators come out in the same fashion, leading to a significant reduction in silicon area. 相似文献
17.
Vincent Menger Floor Scheepers Lisette Maria van Wijk Marco Spruit 《Telematics and Informatics》2018,35(4):727-736
In order to use medical text for research purposes, it is necessary to de-identify the text for legal and privacy reasons. We report on a pattern matching method to automatically de-identify medical text written in Dutch, which requires a low amount of effort to be hand tailored. First, a selection of Protected Health Information (PHI) categories is determined in cooperation with medical staff. Then, we devise a method for de-identifying all information in one of these PHI categories, that relies on lookup tables, decision rules and fuzzy string matching. Our de-identification method DEDUCE is validated on a test corpus of 200 nursing notes and 200 treatment plans obtained from the University Medical Center Utrecht (UMCU) in the Netherlands, achieving a total micro-averaged precision of 0.814, a recall of 0.916 and a F1-score of 0.862. For person names, a recall of 0.964 was achieved, while no names of patients were missed. 相似文献
18.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1972,60(10):1200-1215
Starting with the era of learning machines, reasons are presented for the current emergence of graphics-oriented interactive pattern analysis and classification systems (IPACS) as a general approach to practical pattern-recognition problems. A number of representative systems and their application to a wide variety of patterns are surveyed. Various aspects of alternative hardware and software implementations are commented upon and computational algorithms and mappings relevant to interactive analysis and classification of patterns are discussed. 相似文献
19.
非制冷红外焦平面阵列的固定图案噪声具有与条带噪声相类似的特性.通过对矩匹配算法和时域高通滤波算法的研究, 提出了一种多尺度时域矩匹配非均匀性校正算法.首先利用高斯金字塔对相邻帧待校正图像进行全局运动估计, 然后对各尺度的高斯金字塔和拉普拉斯金字塔分别进行时域矩匹配.对真实红外图像序列的实验结果表明, 该算法在提高收敛速度的同时可有效减少鬼影现象的出现. 相似文献