bm algorithm
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 3)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Anatoly Beletsk ◽  

The article discusses various options for constructing binary generators of pseudo-random numbers (PRN) based on the so-called generalized Galois and Fibonacci matrices. The terms "Galois matrix" and "Fibonacci matrix" are borrowed from the theory of cryptography, in which the linear feedback shift registers (LFSR) generators of the PRN according to the Galois and Fibonacci schemes are widely used. The matrix generators generate identical PRN sequences as the LFSR generators. The transition from classical to generalized matrix PRN generators (PRNG) is accompanied by expanding the variety of generators, leading to a significant increase in their cryptographic resistance. This effect is achieved both due to the rise in the number of elements forming matrices and because generalized matrices are synthesized based on primitive generating polynomials and polynomials that are not necessarily primitive. Classical LFSR generators of PRN (and their matrix equivalents) have a significant drawback: they are susceptible to Berlekamp-Messi (BM) attacks. Generalized matrix PRNG is free from BM attack. The last property is a consequence of such a feature of the BM algorithm. This algorithm for cracking classical LFSR generators of PRN solves the problem of calculating the only unknown – a primitive polynomial generating the generator. For variants of generalized matrix PRNG, it becomes necessary to determine two unknown parameters: both an irreducible polynomial and a forming element that produces a generalized matrix. This problem turns out to be unsolvable for the BM algorithm since it is designed to calculate only one unknown parameter. The research results are generalized for solving PRNG problems over a Galois field of odd characteristics.


Information ◽  
2020 ◽  
Vol 11 (5) ◽  
pp. 248
Author(s):  
Wayit Abliz ◽  
Maihemuti Maimaiti ◽  
Hao Wu ◽  
Jiamila Wushouer ◽  
Kahaerjiang Abiderexiti ◽  
...  

Pattern matching is widely used in various fields such as information retrieval, natural language processing (NLP), data mining and network security. In Uyghur (a typical agglutinative, low-resource language with complex morphology, spoken by the ethnic Uyghur group in Xinjiang, China), research on pattern matching is also ongoing. Due to the language characteristics, the pattern matching using characters and words as basic units has insufficient performance. There are two problems for pattern matching: (1) vowel weakening and (2) morphological changes caused by suffixes. In view of the above problems, this paper proposes a Boyer–Moore-U (BM-U) algorithm and a retrievable syllable coding format based on the syllable features of the Uyghur language and the improvement of the Boyer–Moore (BM) algorithm. This algorithm uses syllable features to perform pattern matching, which effectively solves the problem of weakening vowels, and it can better match words with stem shape changes. Finally, in the pattern matching experiments based on character-encoded text and syllable-encoded text for vowel-weakened words, the BM-U algorithm precision, recall, F1-measure and accuracy are improved by 4%, 55%, 33%, 25% and 10%, 52%, 38%, 38% compared to the BM algorithm.


2020 ◽  
Vol 166 ◽  
pp. 576-581
Author(s):  
Ying Duan ◽  
Hua Long ◽  
Yu Quan Qu

2015 ◽  
Vol 741 ◽  
pp. 701-704 ◽  
Author(s):  
Di Wang ◽  
Yong Jie Pang

In order to obtain the depth information of the underwater target, it’s necessary to generate the disparity map based on binocular vision stereo matching. In the circulation water channel, the stereo matching experiments with underwater target were carried out by using the BM algorithm, SGBM algorithms and SIFT algorithm respectively. Then the characteristics of the disparity maps were analyzed for the three kinds of stereo matching algorithms. Compared with the BM algorithm and SGBM algorithms, the SIFT algorithm has been proved to be more suitable for underwater stereo matching. In order to obtain more feature points of underwater image, it is necessary to improved SIFT algorithm parameter. Underwater image matching experiments were made to determine the principal curvature coefficientγ. The results illustrated that the improvedγis better than the original value for underwater disparity map generation.


2014 ◽  
Vol 599-601 ◽  
pp. 1025-1027
Author(s):  
Peng Hua Zhu ◽  
Xiao Fang Hou

Based on the traditional intrusion detection technology in BM pattern matching algorithm, solved the original algorithm in the detection of matching data string search inefficiency. Improved BM algorithm in combination with the advantages of traditional algorithm, overcomes the shortcoming of the traditional BM algorithm, reduces the mobile number in the pattern matching process in the pattern string, greatly improve the matching efficiency. Analysis and experiments show that, the efficiency of improved algorithm has been significantly improved.


Sign in / Sign up

Export Citation Format

Share Document