Compressive Sensing Pattern Matching Techniques for Synthesizing Planar Sparse Arrays

2013 ◽  
Vol 61 (9) ◽  
pp. 4577-4587 ◽  
Author(s):  
F. Viani ◽  
G. Oliveri ◽  
A. Massa
2020 ◽  
Vol 20 (10) ◽  
pp. 5554-5565
Author(s):  
Zhenwei Lin ◽  
Yaowu Chen ◽  
Xuesong Liu ◽  
Rongxin Jiang ◽  
Binjian Shen ◽  
...  

1995 ◽  
Vol 04 (03) ◽  
pp. 301-321 ◽  
Author(s):  
S.E. MICHOS ◽  
N. FAKOTAKIS ◽  
G. KOKKINAKIS

This paper deals with the problems stemming from the parsing of long sentences in quasi free word order languages. Due to the word order freedom of a large category of languages including Greek and the limitations of rule-based grammar parsers in parsing unrestricted texts of such languages, we propose a flexible and effective method for parsing long sentences of such languages that combines heuristic information and pattern-matching techniques in early processing levels. This method is deeply characterized by its simplicity and robustness. Although it has been developed and tested for the Greek language, its theoretical background, implementation algorithm and results are language independent and can be of considerable value for many practical natural language processing (NLP) applications involving parsing of unrestricted texts.


Author(s):  
Praveen Kumar . Ch ◽  
Prof.P.Vijai Bhaskar ◽  
Ravi. Ch ◽  
B.Rambhupal Reddy

In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network intrusion detection systems (IDS) rely on efficient pattern matching techniques to analyze the packet payload and make decisions on the significance of the packet body. However, matching the streaming payload bytes against thousands of patterns at multi-gigabit rates is computationally intensive. Various techniques have been proposed in past but the performance of the system is reducing because of multi-gigabit rates.Pattern matching is a significant issue in intrusion detection systems, but by no means the only one. Handling multi-content rules, reordering, and reassembling incoming packets are also significant for system performance. We present two pattern matching techniques to compare incoming packets against intrusion detection search patterns. The first approach, decoded partial CAM (DpCAM), pre-decodes incoming characters, aligns the decoded data, and performs logical AND on them to produce the match signal for each pattern. The second approach, perfect hashing memory (PHmem), uses perfect hashing to determine a unique memory location that contains the search pattern and a comparison between incoming data and memory output to determine the match. The suggested methods have implemented in vhdl coding and we use Xilinx for synthesis.


2019 ◽  
Vol 8 (3) ◽  
pp. 1298-1305

During the past years, some of the researchers are using the matching techniques for identification of the fake currency either by using the Mathematical formulation or by using the readymade simulation tools. A lot of methods namely edge detection, segmentation, feature extraction, pattern matching has been used for finding and identification of the fake currency. In the present work, Principal Component Analysis (PCA) is used to detect the feature of currency through modeling and a proposed algorithm is elaborated to recognize the fake currency in the form of note Rs 2000 of Indian currency. Graphs are also designed to justify the present approach along with the comparison of results


Sign in / Sign up

Export Citation Format

Share Document