• Title/Summary/Keyword: 패턴 매칭 알고리즘

Search Result 156, Processing Time 0.029 seconds

An Index Data Structure for String Search in External Memory (외부 메모리에서 문자열을 효율적으로 탐색하기 위한 인덱스 자료 구조)

  • Na, Joong-Chae;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.598-607
    • /
    • 2005
  • We propose a new external-memory index data structure, the Suffix B-tree. The Suffix B-tree is a B-tree in which the key is a string like the String B-tree. While the node in the String B-tree is implemented with a Patricia trio, the node in the Suffix B-tree is implemented with an array. So the Suffix B-tree is simpler and easier to be Implemented than the String B-tree. Nevertheless, the branching algorithm of the Suffix B-tree is as efficient as that of the String B-tree. Consequently, the Suffix B-tree takes the same worst-case disk accesses as the String B-tree to solve the string matching problem, which is fundamental and important in the area of string algorithms.

A Single Index Approach for Subsequence Matching that Supports Normalization Transform in Time-Series Databases (시계열 데이터베이스에서 단일 색인을 사용한 정규화 변환 지원 서브시퀀스 매칭)

  • Moon Yang-Sae;Kim Jin-Ho;Loh Woong-Kee
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.513-524
    • /
    • 2006
  • Normalization transform is very useful for finding the overall trend of the time-series data since it enables finding sequences with similar fluctuation patterns. The previous subsequence matching method with normalization transform, however, would incur index overhead both in storage space and in update maintenance since it should build multiple indexes for supporting arbitrary length of query sequences. To solve this problem, we propose a single index approach for the normalization transformed subsequence matching that supports arbitrary length of query sequences. For the single index approach, we first provide the notion of inclusion-normalization transform by generalizing the original definition of normalization transform. The inclusion-normalization transform normalizes a window by using the mean and the standard deviation of a subsequence that includes the window. Next, we formally prove correctness of the proposed method that uses the inclusion-normalization transform for the normalization transformed subsequence matching. We then propose subsequence matching and index building algorithms to implement the proposed method. Experimental results for real stock data show that our method improves performance by up to $2.5{\sim}2.8$ times over the previous method. Our approach has an additional advantage of being generalized to support many sorts of other transforms as well as normalization transform. Therefore, we believe our work will be widely used in many sorts of transform-based subsequence matching methods.

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Prediction of Transient Ischemia Using ECG Signals (심전도 신호를 이용한 일시적 허혈 예측)

  • Han-Go Choi;Roger G. Mark
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.3
    • /
    • pp.190-197
    • /
    • 2004
  • This paper presents automated prediction of transient ischemic episodes using neural networks(NN) based pattern matching method. The learning algorithm used to train the multilayer networks is a modified backpropagation algorithm. The algorithm updates parameters of nonlinear function in a neuron as well as connecting weights between neurons to improve learning speed. The performance of the method was evaluated using ECG signals of the MIT/BIH long-term database. Experimental results for 15 records(237 ischemic episodes) show that the average sensitivity and specificity of ischemic episode prediction are 85.71% and 71.11%, respectively. It is also found that the proposed method predicts an average of 45.53[sec] ahead real ischemia. These results indicate that the NN approach as the pattern matching classifier can be a useful tool for the prediction of transient ischemic episodes.

  • PDF

A 3D Vision Inspection Method using One Camera (1대의 카메라를 이용한 3차원 비전 검사 방법)

  • Jung Cheol-Jin;Huh Kyung Moo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.1
    • /
    • pp.19-26
    • /
    • 2004
  • In this paper, we suggest a 3D vision inspection method which use only one camera. If we have the database of pattern and can recognize the object, and also estimate the rotated shape of the parts, we can inspect the parts using only one image. We used the 3D database and the 2D geometrical pattern matching, and the rotation transition theory about the algorithm. As the results, we could have the capability of the recognition and inspection of the rotated object through the estimation of rotation an81e. We applied our suggested algorithm to the inspection of typical IC and capacitor, and compared our suggested algorithm with the conventional 2D inspection method and the feature space trajectory method.

Context-Awareness Modeling Method using Timed Petri-nets (시간 페트리 넷을 이용한 상황인지 모델링 기법)

  • Park, Byung-Sung;Kim, Hag-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.354-361
    • /
    • 2011
  • Increasing interest and technological advances in smart home has led to active research on context-awareness service and prediction algorithms such as Bayesian Networks, Tree-Dimensional Structures and Genetic prediction algorithms. Context-awareness service presents that providing automatic customized service regarding individual user's pattern surely helps users improve the quality of life. However, it is difficult to implement context-awareness service because the problems are that handling coincidence with context information and exceptional cases have to consider. To overcome this problem, we proposes an Intelligent Sequential Matching Algorithm(ISMA), models context-awareness service using Timed Petri-net(TPN) which is petri-net to have time factor. The example scenario illustrates the effectiveness of the Timed Petri-net model and our proposed algorithm improves average 4~6% than traditional in the accuracy and reliability of prediction.

A Study on Speaker Recognition using the Peak and valley pitch detection and the Fuzzy (국부 봉우리와 골에 의한 피치 검출과 퍼지를 이용한 화자 인식에 관한 연구)

  • 김연숙;김희주;김경재
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.213-219
    • /
    • 2004
  • This paper proposes speaker recognition algorithm which includes the pitch parameter for the peak and valley. The time-frequency hybrid method for pitch extraction is valuable in that it can improve resolution in the time domain and accuracy in the frequency domain at the same time. It makes reference pattern using membership function and performs vocal track recognition of common character using fuzzy pattern matching in order to include time variation width for non-linear utterance for proposed method, speaker recognition experiments are carried out using vowels and number sounds.

State Transition Algorithm for Penetration Scenarios Detection using Association Mining Technique (연관마이닝 기법을 이용한 침입 시나리오 탐지를 위한 상태전이 알고리즘)

  • 김창수;황현숙
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.720-723
    • /
    • 2001
  • 현재 인터넷 환경에서 크래킹은 보편화되어 있다. 이러한 크래킹을 탐지하거나 방어하기 위한 기법들은 대부분 기존의 불법 침입 유형을 분석하여 대응 알고리즘을 개발하는 것이 대부분이다. 현재 알려진 침입 탐지 기법은 비정상 탐지(Anomaly Detection)와 오용 탐지(Misuse Detection)로 분류할 수 있는데, 전자는 통계적 방법, 특징 추출 등을 이용하며, 후자는 조건부 화률, 전문가 시스템, 상태 전이 분석, 패턴 매칭 둥을 적용한다. 본 연구에서는 상태전이 기반의 연관 마이닝 기법을 이용한 침입 시나리오 탐지 알고리즘을 제안한다. 이를 위해 본 연구에서는 의사결정지원시스템에서 많이 적용한 연관 마이닝 기법을 여러 가지 불법 침입과 연관된 상태 정보를 분석할 수 있는 수정된 상태전이 알고리즘을 제시한다.

  • PDF

3D Vision Inspection Algorithm Using the Geometrical Pattern Matching (기하학적 패턴 매칭을 이용한 3차원 비전 검사 알고리즘)

  • 정철진;허경무
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2533-2536
    • /
    • 2003
  • In this paper, we suggest the 3D Vision Inspection Algorithm which is based on the external shape feature, and is able to recognize the object. Because many objects made by human have the regular shape, if we posses the database of pattern and we recognize the object using the database of the object's pattern, we could inspect the objects of many fields. Thus, this paper suggest the 3D Vision inspection Algorithm using the Geometrical Pattern Matching by making the 3D database.

  • PDF

Platform-independent Implementation of Anti-Virus Engine with Enhanced Features for Execution Efficiency (효율적 실행을 위한 개선 기능을 갖춘 안티바이러스 엔진의 플랫폼 독립적 구현에 관한 연구)

  • 김미애;박유미;최주영;유주영;박은옥;최은정;김윤정;김명주
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.660-664
    • /
    • 2003
  • 본 논문에서는 현재 공개되어 있는 ClamAV 안티바이러스 엔진의 소스를 분석하여 플랫폼 독립적인 구현을 시도했다. 구체적으로 유닉스 기반에서 Java 프로그래밍 언어를 사용했으며, 사용자의 편의를 위한 GUI 환경을 SWING을 사용하여 구축했다 아울러 공개된 안티바이러스 엔진보다 효율성을 높이기 위하여 효율적인 매칭 알고리즘 선택 및 바이러스 패턴 데이터베이스의 재구성에 관하여 제안한다.

  • PDF