منابع مشابه
AC-BM-GA Pattern Matching Algorithm Approach for Intrusion Detection
In network security, Intrusion Detection System plays a reasonable supplementary role for the firewall. It improves the security and reliability of the computer and helps protect computers from network attacks. At present intrusion detection system analysis module uses the pattern matching technology. In this article, through analyzing the advantages and disadvantages of the main pattern matchi...
متن کاملCounting (1, Β)-bm Relations and Classifying (2, 2)-bm Groups
In the first part, we prove that the number of (1, β)-BM relations is 3 ·5 · . . . · (2β+1), which was conjectured by Jason Kimberley. In the second part, we construct two isomorphisms between certain (2, 2)-BM groups. This completes the classification of (2, 2)-BM groups initiated in [4].
متن کاملReply to Collignon and
TO THE EDITOR—We read with interest the correspondence from Collignon and Kennedy [1] regarding the duration of carriage of resistant bacteria after travelers return from tropical regions. The authors discussed the divergence in duration using a study they published in 2010 [2] and the VOYAG-R study [3]. While the overall design of both studies is similar, some key points are not. Importantly, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The American Journal of Clinical Nutrition
سال: 1999
ISSN: 0002-9165,1938-3207
DOI: 10.1093/ajcn/70.4.573