suffix tree
Recently Published Documents


TOTAL DOCUMENTS

287
(FIVE YEARS 22)

H-INDEX

22
(FIVE YEARS 1)

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zhongyi Lei ◽  
Haiying Wang

The community division of bipartite networks is one frontier problem on the research of complex networks today. In this study, we propose a model of community detection of the bipartite network, which is based on the generalized suffix tree algorithm. First, extract the adjacent node sequences from the matrix of relation and use the obtained adjacent node sequences to build a generalized suffix tree; second, traverse the established generalized suffix tree to obtain the bipartite cliques; third, adjust the bipartite cliques; finally, dispose the isolated edges, get the communities, and complete the division of the bipartite network. This algorithm is different from the traditional community mining one since it uses edges as the community division medium and does not need to specify the number of the division of communities before the experiment. Furthermore, we can find overlapping communities by this new algorithm which can decrease the time complexity.


Author(s):  
Maxim Kalinin ◽  
Dmitry Zegzhda ◽  
Vasiliy Krundyshev ◽  
Daria Lavrova ◽  
Dmitry Moskvin ◽  
...  

The functionality of any system can be represented as a set of commands that lead to a change in the state of the system. The intrusion detection problem for signature-based intrusion detection systems is equivalent to matching the sequences of operational commands executed by the protected system to known attack signatures. Various mutations in attack vectors (including replacing commands with equivalent ones, rearranging the commands and their blocks, adding garbage and empty commands into the sequence) reduce the effectiveness and accuracy of the intrusion detection. The article analyzes the existing solutions in the field of bioinformatics and considers their applicability for solving the problem of identifying polymorphic attacks by signature-based intrusion detection systems. A new approach to the detection of polymorphic attacks based on the suffix tree technology applied in the assembly and verification of the similarity of genomic sequences is discussed. The use of bioinformatics technology allows us to achieve high accuracy of intrusion detection at the level of modern intrusion detection systems (more than 0.90), while surpassing them in terms of cost-effectiveness of storage resources, speed and readiness to changes in attack vectors. To improve the accuracy indicators, a number of modifications of the developed algorithm have been carried out, as a result of which the accuracy of detecting attacks increased by up to 0.95 with the level of mutations in the sequence up to 10%. The developed approach can be used for intrusion detection both in conventional computer networks and in modern reconfigurable network infrastructures with limited resources (Internet of Things, networks of cyber-physical objects, wireless sensor networks).


Algorithms ◽  
2021 ◽  
Vol 14 (6) ◽  
pp. 161
Author(s):  
Dominik Köppl

We present linear-time algorithms computing the reversed Lempel–Ziv factorization [Kolpakov and Kucherov, TCS’09] within the space bounds of two different suffix tree representations. We can adapt these algorithms to compute the longest previous non-overlapping reverse factor table [Crochemore et al., JDA’12] within the same space but pay a multiplicative logarithmic time penalty.


Algorithms ◽  
2021 ◽  
Vol 14 (2) ◽  
pp. 44
Author(s):  
Dominik Köppl

We present algorithms computing the non-overlapping Lempel–Ziv-77 factorization and the longest previous non-overlapping factor table within small space in linear or near-linear time with the help of modern suffix tree representations fitting into limited space. With similar techniques, we show how to answer substring compression queries for the Lempel–Ziv-78 factorization with a possible logarithmic multiplicative slowdown depending on the used suffix tree representation.


2021 ◽  
pp. 100525
Author(s):  
Md Safiur Rahman Mahdi ◽  
Md Momin Al Aziz ◽  
Noman Mohammed ◽  
Xiaoqian Jiang

2020 ◽  
Vol 9 (1) ◽  
pp. 97
Author(s):  
Maula Khatami

Journals are articles about research that are very useful among academics and students alike. Every time we learn a new knowledge, we certainly need a guide that is verified and also credible. Students and academics were greatly helped by this journal. With journals help students and academics get references from previous research and get more insights so that they are able to make a related research and can even be improved from previous research. However, there are still many students and academics who find it difficult to find the right journal for their needs. So here the authors make a research system of information retrieval about journal searches by querying words using the vector space model method. In the suffix tree clustering method and the Vector Space Model, each document and keyword that has been carried out by the Text Mining process is then given the weight of each word contained in each existing document with the Term Frequency - Inverse Document Frequency (TF-IDF) weighting algorithm. 


Author(s):  
Golnaz Badkobeh ◽  
Paweł Gawrychowski ◽  
Juha Kärkkäinen ◽  
Simon J. Puglisi ◽  
Bella Zhukova

2020 ◽  
Vol 814 ◽  
pp. 1-12
Author(s):  
Tshepo Kitso Gobonamang ◽  
Dimane Mpoeleng
Keyword(s):  

2020 ◽  
Vol 25 (1) ◽  
pp. 65-71
Author(s):  
Pikalov V.A. ◽  
◽  
Klymenko M.S. ◽  

This article proposes using structural description for graphical objects to solve an urgent task of trajectory analysis. A range of modern trajectory analysis approaches were analyzed and the best that is based on Graph Convolutional Neural Networks and Suffix Tree Clustering algorithm was chosen. Descripted ways to reduce computational sources for this neural network approach. This neural network was adapted to analyze structural description and advantages of this approach are shown.


Sign in / Sign up

Export Citation Format

Share Document