首页 > 最新文献

International Journal of Computational Science and Engineering最新文献

英文 中文
The analysis of evolutionary optimisation on the TSP(1,2) problem TSP(1,2)问题的进化优化分析
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2016-01-01 DOI: 10.1504/IJCSE.2016.10007955
Xiaoyun Xia, Xinsheng Lai, Chen Yi
TSP(1,2) problem is a special case of the travelling salesperson problem which is NP-hard. Many heuristics including evolutionary algorithms (EAs) are proposed to solve the TSP(1,2) problem. However, we know little about the performance of the EAs for the TSP(1,2) problem. This paper presents an approximation analysis of the (1+1) EA on this problem. It is shown that both the (1+1) EA and (µ + λ) EA can obtain 3/2 approximation ratio for this problem in expected polynomial runtime O(n3) and O ((µ/λ)n3 + n) , respectively. Furthermore, we prove that the (1+1) EA can provide a much tighter upper bound than a simple ACO on the TSP(1,2) problem.
TSP(1,2)问题是旅行推销员问题的一种np困难的特殊情况。提出了包括进化算法在内的许多启发式算法来解决TSP(1,2)问题。然而,对于TSP(1,2)问题,我们对ea的性能知之甚少。本文对这一问题给出了(1+1)EA的近似分析。结果表明,(1+1)EA和(µ+ λ) EA分别可以在期望多项式运行时间O(n3)和O((µ/λ)n3 + n)下获得该问题的3/2近似比。进一步证明了在TSP(1,2)问题上,(1+1)蚁群算法可以提供比简单蚁群算法更紧的上界。
{"title":"The analysis of evolutionary optimisation on the TSP(1,2) problem","authors":"Xiaoyun Xia, Xinsheng Lai, Chen Yi","doi":"10.1504/IJCSE.2016.10007955","DOIUrl":"https://doi.org/10.1504/IJCSE.2016.10007955","url":null,"abstract":"TSP(1,2) problem is a special case of the travelling salesperson problem which is NP-hard. Many heuristics including evolutionary algorithms (EAs) are proposed to solve the TSP(1,2) problem. However, we know little about the performance of the EAs for the TSP(1,2) problem. This paper presents an approximation analysis of the (1+1) EA on this problem. It is shown that both the (1+1) EA and (µ + λ) EA can obtain 3/2 approximation ratio for this problem in expected polynomial runtime O(n3) and O ((µ/λ)n3 + n) , respectively. Furthermore, we prove that the (1+1) EA can provide a much tighter upper bound than a simple ACO on the TSP(1,2) problem.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"216 1","pages":"261-268"},"PeriodicalIF":2.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74959518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Literature Survey on Ambient Noise Analysis For underwater Acoustic Signals 水声信号环境噪声分析的文献综述
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-08-11 DOI: 10.26472/IJCES.V1I7.37
S. Yashaswini, Soumya Halagur, Fazil Khan, S. Rangaswamy
Transmitting data with water as the medium is called underwater communication. Electromagnetic signals are better attenuated in water than sound. Hence it is the most reliable and versatile means of communication underwater. The acoustic signals will be affected by ocean driven noise during transmission. Ambient noise is the background noise which has to be subtracted from the acoustic signal for smooth transmission. Hence the recognition and reduction of ambient noise is the essential part of underwater signal transmission. Studies and research are being carried out extensively in this area. There are many works reported and the research is still in progress. This literature survey presents the work done on the research front of ambient noise affecting acoustic signals.
以水为介质传输数据称为水下通信。电磁信号在水中比在声音中衰减得好。因此,它是水下最可靠、最通用的通信手段。声信号在传输过程中会受到海洋噪声的影响。环境噪声是为了使声信号顺利传输而必须从声信号中去除的背景噪声。因此,环境噪声的识别与降噪是水下信号传输的关键环节。在这方面正在进行广泛的研究和研究。目前已有许多研究报道,研究仍在进行中。本文综述了环境噪声对声信号影响的研究进展。
{"title":"A Literature Survey on Ambient Noise Analysis For underwater Acoustic Signals","authors":"S. Yashaswini, Soumya Halagur, Fazil Khan, S. Rangaswamy","doi":"10.26472/IJCES.V1I7.37","DOIUrl":"https://doi.org/10.26472/IJCES.V1I7.37","url":null,"abstract":"Transmitting data with water as the medium is called underwater communication. Electromagnetic signals are better attenuated in water than sound. Hence it is the most reliable and versatile means of communication underwater. The acoustic signals will be affected by ocean driven noise during transmission. Ambient noise is the background noise which has to be subtracted from the acoustic signal for smooth transmission. Hence the recognition and reduction of ambient noise is the essential part of underwater signal transmission. Studies and research are being carried out extensively in this area. There are many works reported and the research is still in progress. This literature survey presents the work done on the research front of ambient noise affecting acoustic signals.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"1 1","pages":"1-9"},"PeriodicalIF":2.0,"publicationDate":"2015-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81391013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cluster Head Selection for in Wireless Sensor Networks 无线传感器网络中的簇头选择
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-03-30 DOI: 10.26472/IJCES.V1I3.32
A. S. Raval
Wireless sensor network consists of several distributed sensor nodes. It is used for several environmental applications, military applications and health related applications. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. Most of the research in energy efficient data gathering in data centric applications of wireless sensor networks is motivated by LEACH (Low Energy Adaptive Clustering Hierarchy) scheme. It allows the rotation of cluster head role among the sensor nodes and tries to distribute the energy consumption over the network. Selection of sensor node for such role rotations greatly affects the energy efficiency of the network. Some of the routing protocol has a drawback that the cluster is not evenly distributed due to its randomized rotation of local cluster head. We have surveyed several existing methods for selecting energy efficient cluster head in wireless sensor networks. We have proposed an energy efficient cluster head selection method in which the cluster head selection and replacement cost is reduced and ultimately the network lifetime is increased. Using our proposed method, network life time is increased compared to existing methods.
无线传感器网络由多个分布式传感器节点组成。它用于几种环境应用、军事应用和与健康有关的应用。为了延长传感器节点的生命周期,设计高效的路由协议至关重要。在以数据为中心的无线传感器网络应用中,对节能数据采集的研究大多是由LEACH (Low energy Adaptive Clustering Hierarchy)方案推动的。它允许在传感器节点之间轮换簇头角色,并尝试在网络上分配能量消耗。这种角色旋转的传感器节点的选择对网络的能量效率有很大影响。一些路由协议的缺点是由于其局部簇头的随机旋转而导致集群分布不均匀。本文综述了无线传感器网络中现有的几种高效簇头选择方法。提出了一种节能的簇头选择方法,该方法减少了簇头选择和替换成本,最终提高了网络的生存期。与现有方法相比,该方法可提高网络的使用寿命。
{"title":"Cluster Head Selection for in Wireless Sensor Networks","authors":"A. S. Raval","doi":"10.26472/IJCES.V1I3.32","DOIUrl":"https://doi.org/10.26472/IJCES.V1I3.32","url":null,"abstract":"Wireless sensor network consists of several distributed sensor nodes. It is used for several environmental applications, military applications and health related applications. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. Most of the research in energy efficient data gathering in data centric applications of wireless sensor networks is motivated by LEACH (Low Energy Adaptive Clustering Hierarchy) scheme. It allows the rotation of cluster head role among the sensor nodes and tries to distribute the energy consumption over the network. Selection of sensor node for such role rotations greatly affects the energy efficiency of the network. Some of the routing protocol has a drawback that the cluster is not evenly distributed due to its randomized rotation of local cluster head. We have surveyed several existing methods for selecting energy efficient cluster head in wireless sensor networks. We have proposed an energy efficient cluster head selection method in which the cluster head selection and replacement cost is reduced and ultimately the network lifetime is increased. Using our proposed method, network life time is increased compared to existing methods.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"10 1","pages":"6"},"PeriodicalIF":2.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84458571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of Image Based Steganography 基于图像的隐写技术综述
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-02-28 DOI: 10.26472/IJCES.V1I2.11
V. Rabara, Aditya Goswami
{"title":"A Survey of Image Based Steganography","authors":"V. Rabara, Aditya Goswami","doi":"10.26472/IJCES.V1I2.11","DOIUrl":"https://doi.org/10.26472/IJCES.V1I2.11","url":null,"abstract":"","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"114 1","pages":"1"},"PeriodicalIF":2.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77143487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Steganography Techniques 图像隐写技术
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-02-28 DOI: 10.26472/IJCES.V1I2.13
R. Sheth, Rashmi M. Tank
{"title":"Image Steganography Techniques","authors":"R. Sheth, Rashmi M. Tank","doi":"10.26472/IJCES.V1I2.13","DOIUrl":"https://doi.org/10.26472/IJCES.V1I2.13","url":null,"abstract":"","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"10 1","pages":"10"},"PeriodicalIF":2.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87241492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Survey of Brain Chip with Functionality and Benefits 脑芯片的功能与效益综述
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-02-28 DOI: 10.26472/IJCES.V1I2.12
Kalsariya Pradip
{"title":"A Survey of Brain Chip with Functionality and Benefits","authors":"Kalsariya Pradip","doi":"10.26472/IJCES.V1I2.12","DOIUrl":"https://doi.org/10.26472/IJCES.V1I2.12","url":null,"abstract":"","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"68 1","pages":"5"},"PeriodicalIF":2.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76336197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Basic Knowledge of Image Morphing 图像变形的基本知识
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-02-18 DOI: 10.26472/ijces.v1i2.21
Aakanksha Patel
The term "morphing" is used to describe the combination of generalized image warping with a crossdissolve between image elements. The term is derived from "image metamorphosis". Morphing is an image processing technique typically used as an animation tool for the metamorphosis from one image to another. The idea is to specify a warp that distorts the first image into the second. Its inverse will distort the second image into the first..The morph process consists of warping two images so that they have the same "shape", and then cross dissolving the resulting images. Cross- dissolving is the major problem as how to warp an image. In this paper I have concentrated on one of the methodology of image morphing named “Mesh Warping”.
“变形”一词用于描述广义图像变形与图像元素间交叉溶解的结合。这个词来源于“形象变形”。变形是一种图像处理技术,通常用作从一个图像到另一个图像变形的动画工具。这个想法是指定一种扭曲,将第一幅图像扭曲成第二幅图像。变形过程包括扭曲两幅图像,使它们具有相同的“形状”,然后交叉溶解生成的图像。交叉溶解是图像变形的主要问题。在本文中,我集中讨论了一种名为“网格变形”的图像变形方法。
{"title":"A Basic Knowledge of Image Morphing","authors":"Aakanksha Patel","doi":"10.26472/ijces.v1i2.21","DOIUrl":"https://doi.org/10.26472/ijces.v1i2.21","url":null,"abstract":"The term \"morphing\" is used to describe the combination of generalized image warping with a crossdissolve between image elements. The term is derived from \"image metamorphosis\". Morphing is an image processing technique typically used as an animation tool for the metamorphosis from one image to another. The idea is to specify a warp that distorts the first image into the second. Its inverse will distort the second image into the first..The morph process consists of warping two images so that they have the same \"shape\", and then cross dissolving the resulting images. Cross- dissolving is the major problem as how to warp an image. In this paper I have concentrated on one of the methodology of image morphing named “Mesh Warping”.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"21 1","pages":"4"},"PeriodicalIF":2.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87357166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Fingerprint (biometrics) Recognition 指纹(生物特征)识别技术研究
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-02-18 DOI: 10.26472/IJCES.V1I2.22
Urvik Patel
Till now many algorithms are published for fingerprint recognition and these algorithms has different accuracy rate. This paper consists of information of about fingerprint (biometrics) recognition. The novel algorithm is considered for thinning process. Whole process of recognition is explained from image capturing to verification. The image captured is first converted to gray scale then image enrichment is done then thinning process take over charge which is main process then last process which is also equally important as thinning process is feature extraction which extracts ridge ending, bifurcation, and dot. The accuracy depends on the result of the three main process namely pre-processing, thinning process and feature extraction.
目前已经发表的指纹识别算法很多,但准确率参差不齐。本文包含了指纹(生物特征)识别的相关信息。该算法被用于细化过程。说明了从图像采集到验证的整个识别过程。首先将捕获的图像转换为灰度,然后对图像进行富集,然后进行细化处理,细化处理是主要的处理步骤,最后一个与细化处理同样重要的步骤是特征提取,提取脊末、分叉和点。其精度取决于预处理、细化和特征提取三个主要过程的结果。
{"title":"A Study on Fingerprint (biometrics) Recognition","authors":"Urvik Patel","doi":"10.26472/IJCES.V1I2.22","DOIUrl":"https://doi.org/10.26472/IJCES.V1I2.22","url":null,"abstract":"Till now many algorithms are published for fingerprint recognition and these algorithms has different accuracy rate. This paper consists of information of about fingerprint (biometrics) recognition. The novel algorithm is considered for thinning process. Whole process of recognition is explained from image capturing to verification. The image captured is first converted to gray scale then image enrichment is done then thinning process take over charge which is main process then last process which is also equally important as thinning process is feature extraction which extracts ridge ending, bifurcation, and dot. The accuracy depends on the result of the three main process namely pre-processing, thinning process and feature extraction.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"20 1","pages":"6"},"PeriodicalIF":2.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86071903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms 密码算法与高级密码算法的比较分析
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-01-30 DOI: 10.26472/IJCES.V1I1.20
Meghna H. Vekariya
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
今天是互联网和网络应用的时代。因此,在当今的技术世界中,信息安全是一个具有挑战性的问题。人们需要一种更强的加密技术,这种技术很难破解。密码学在网络安全领域中发挥着至关重要的作用。用于保护网络安全的加密算法种类繁多,目前对新加密算法的研究正在不断进行,以发展更先进的通信安全技术。本文主要对AES、DES、RSA、blowfish等加密算法进行了比较和性能评价。此外,还描述了一些增强算法,并与增强算法进行了比较。
{"title":"Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms","authors":"Meghna H. Vekariya","doi":"10.26472/IJCES.V1I1.20","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.20","url":null,"abstract":"Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"102 1","pages":"1-8"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87661219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Efficient String Matching Algorithm for Intrusion Detection 一种高效的字符串匹配入侵检测算法
IF 2 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-01-30 DOI: 10.26472/IJCES.V1I1.17
Bhargav B. Patel
Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting malicious attacks over the network. Intrusion detection systems (IDSs) are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems. . The attacks can come from outsider attackers on the Internet, authorized insiders who misuse the privileges that have been given them and unauthorized insiders who attempt to gain unauthorized privileges. IDSs cannot be used in isolation, but must be part of a larger framework of IT security measures. Essential to almost every intrusion detection system is the ability to search through packets and identify content that matches known attacks. Space and time efficient string matching algorithms are therefore important for identifying these packets at line rate. In this paper we examine string matching algorithm and their use for Intrusion Detection.
入侵检测系统(ids)作为识别、阻止和转移网络恶意攻击的强大工具已被广泛认可。入侵检测系统(ids)的设计和安装是为了帮助阻止或减轻黑客攻击或闯入敏感的IT系统所造成的损害。攻击可能来自Internet上的外部攻击者、滥用授予他们的特权的授权内部人员以及试图获得未授权特权的未授权内部人员。不能孤立地使用入侵防御系统,而必须作为更大的IT安全措施框架的一部分。几乎每个入侵检测系统都必须能够搜索数据包并识别与已知攻击相匹配的内容。因此,空间和时间有效的字符串匹配算法对于以线速率识别这些数据包非常重要。本文研究了字符串匹配算法及其在入侵检测中的应用。
{"title":"Efficient String Matching Algorithm for Intrusion Detection","authors":"Bhargav B. Patel","doi":"10.26472/IJCES.V1I1.17","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.17","url":null,"abstract":"Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting malicious attacks over the network. Intrusion detection systems (IDSs) are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems. . The attacks can come from outsider attackers on the Internet, authorized insiders who misuse the privileges that have been given them and unauthorized insiders who attempt to gain unauthorized privileges. IDSs cannot be used in isolation, but must be part of a larger framework of IT security measures. Essential to almost every intrusion detection system is the ability to search through packets and identify content that matches known attacks. Space and time efficient string matching algorithms are therefore important for identifying these packets at line rate. In this paper we examine string matching algorithm and their use for Intrusion Detection.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"21 1","pages":"18-26"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86576814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Computational Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1