SlideShare une entreprise Scribd logo
1  sur  21
String Matching Algorithms:
Knuth–Morris–Pratt algorithm
Introduction
• The algorithm was conceived in 1974 by
Donald Knuth and Vaughan Pratt, and
independently by James H. Morris. The
three published it jointly in 1977
2
Problem Defination
Given a string ‘S’, the problem of string matching deals with finding
whether a pattern ‘p’ occurs in ‘S’ and if ‘p’ does occur then returning
position in ‘S’ where ‘p’ occurs.
Drawbacks of the O(mn) Approach
• if ‘m’ is the length of pattern ‘p’ and ‘n’ the length of string ‘S’, the
matching time is of the order O(mn). This is a certainly a very slow running
algorithm.
• What makes this approach so slow is the fact that elements of ‘S’ with
which comparisons had been performed earlier are involved again and
again in comparisons in some future iterations. For example: when
mismatch is detected for the first time in comparison of p[3] with S[3],
pattern ‘p’ would be moved one position to the right and matching
procedure would resume from here. Here the first comparison that would
take place would be between p[0]=‘a’ and S[1]=‘b’. It should be noted here
that S[1]=‘b’ had been previously involved in a comparison in step 2. this is
a repetitive use of S[1] in another comparison.
• It is these repetitive comparisons that lead to the runtime of O(mn).
4
5
The Algorithm
• Knuth-Morris-Pratt’s algorithm
compares the pattern to the text in
left-to-right, but shifts the pattern
more intelligently than the brute-
force algorithm.
• When a mismatch occurs, what is
the most we can shift the pattern
so as to avoid redundant
comparisons?
• Answer: the largest prefix of P[0..j]
that is a suffix of P[1..j]
x
j
. . a b a a b . . . . .
a b a a b a
a b a a b a
No need to
repeat these
comparisons
Resume
comparing
here
Components of KMP algorithm
• The prefix function, π
The prefix function,π for a pattern encapsulates knowledge about how
the pattern matches against shifts of itself. This information can be
used to avoid useless shifts of the pattern ‘p’. In other words, this
enables avoiding backtracking on the string ‘S’.
• The KMP Matcher
With string ‘S’, pattern ‘p’ and prefix function ‘Π’ as inputs, finds the
occurrence of ‘p’ in ‘S’ and returns the number of shifts of ‘p’ after
which occurrence is found.
The prefix function, π
Compute_Prefix_Function (p)
1 m  length[p] //’p’ pattern to be matched
2 π[1]  0
3 k  0
4 for q  2 to m
5 do while k > 0 and p[k+1] != p[q]
6 do k  π[k]
7 If p[k+1] = p[q]
8 then k  k +1
9 π[q]  k
10 return π
Example: compute π for the pattern ‘p’ below:
p a b a b a c a
q 1 2 3 4 5 6 7
p a b a b a c a
π 0 0
Initially: m = length[p] = 7
π[1] = 0
k = 0
Step 1: q = 2, k=0
π[2] = 0
Step 2: q = 3, k = 0,
π[3] = 1
Step 3: q = 4, k = 1
π[4] = 2
q 1 2 3 4 5 6 7
p a b a b a c a
π 0 0 1
q 1 2 3 4 5 6 7
p a b a b a c A
π 0 0 1 2
Step 4: q = 5, k =2
π[5] = 3
Step 5: q = 6, k = 3
π[6] = 0
Step 6: q = 7, k = 0
π[7] = 1
After iterating 6 times, the prefix
function computation is complete:

q 1 2 3 4 5 6 7
p a b a b a c a
π 0 0 1 2 3
q 1 2 3 4 5 6 7
p a b a b a c a
π 0 0 1 2 3 0
q 1 2 3 4 5 6 7
p a b a b a c a
π 0 0 1 2 3 0 1
q 1 2 3 4 5 6 7
p a b A b a c a
π 0 0 1 2 3 0 1
The KMP Matcher
KMP_Matcher(S,p)
1 n  length[S]
2 m  length[p]
3 π  Compute-Prefix-Function(p)
4 q  0 //number of characters matched
5 for i  1 to n //scan S from left to right
6 do while q > 0 and p[q+1] != S[i]
7 do q  π[q] //next character does not match
8 if p[q+1] = S[i]
9 then q  q + 1 //next character matches
10 if q = m //is all of p matched?
11 then print “Pattern occurs with shift” i – m
12 q  π[ q] // look for the next match
Note: KMP finds every occurrence of a ‘p’ in ‘S’. That is why KMP does not terminate in step 12, rather it
searches remainder of ‘S’ for any more occurrences of ‘p’.
Illustration: given a String ‘S’ and pattern ‘p’ as follows:
S
b a c b a b a b a b a c a c a
a b a b a c ap
Let us execute the KMP algorithm to find
whether ‘p’ occurs in ‘S’.
For ‘p’ the prefix function, π was computed previously and is as follows:
q 1 2 3 4 5 6 7
p a b A b a c a
π 0 0 1 2 3 1 1
b a c b a b a b a b a c a a b
b a c b a b a b a b a c a a b
a b a b a c a
a b a b a c a
Initially: n = size of S = 15;
m = size of p = 7
Step 1: i = 1, q = 0
comparing p[1] with S[1]
S
p
P[1] does not match with S[1]. ‘p’ will be shifted one position to the right.
S
p
Step 2: i = 2, q = 0
comparing p[1] with S[2]
P[1] matches S[2]. Since there is a match, p is not shifted.
Step 3: i = 3, q = 1
b a c b a b a b a b a c a a b
a b a b a c a
Comparing p[2] with S[3]
S
b a c b a b a b a b a c a a b
b a c b a b a b a b a c a a b
a b a b a c a
a b a b a c ap
S
p
S
p
p[2] does not match with S[3]
Backtracking on p, comparing p[1] and S[3]
Step 4: i = 4, q = 0
comparing p[1] with S[4] p[1] does not match with S[4]
Step 5: i = 5, q = 0
comparing p[1] with S[5]p[1] matches with S[5]
b a c b a b a b a b a c a a b
b a c b a b a b a b a c a a b
b a c b a b a b a b a c a a b
a b a b a c a
a b a b a c a
a b a b a c a
Step 6: i = 6, q = 1
S
p
Comparing p[2] with S[6] p[2] matches with S[6]
S
p
Step 7: i = 7, q = 2
Comparing p[3] with S[7] p[3] matches with S[7]
Step 8: i = 8, q = 3
Comparing p[4] with S[8] p[4] matches with S[8]
S
p
Step 9: i = 9, q = 4
Comparing p[5] with S[9]
Comparing p[6] with S[10]
Comparing p[5] with S[11]
Step 10: i = 10, q = 5
Step 11: i = 11, q = 4
S
S
S
p
p
p
b a c b a b a b a b a c a a b
b a c b a b a b a b a c a a b
b a c b a b a b a b a c a a b
a b a b a c a
a b a b a c a
a b a b a c a
p[6] doesn’t match with S[10]
Backtracking on p, comparing p[4] with S[10] because after mismatch q = π[5] = 3
p[5] matches with S[9]
p[5] matches with S[11]
b a c b a b a b a b a c a a b
b a c b a b a b a b a c a a b
a b a b a c a
a b a b a c a
Step 12: i = 12, q = 5
Comparing p[6] with S[12]
Comparing p[7] with S[13]
S
S
p
p
Step 13: i = 13, q = 6
p[6] matches with S[12]
p[7] matches with S[13]
Pattern ‘p’ has been found to completely occur in string ‘S’. The total number of shifts
that took place for the match to be found are: i – m = 13 – 7 = 6 shifts.
Analysis
• Compute_Prefix_Function (π)
1 m  length[p] //’p’ pattern to be matched
2 π[1]  0
3 k  0
4 for q  2 to m
5 do while k > 0 and p[k+1] != p[q]
6 do k  π[k]
7 If p[k+1] = p[q]
8 then k  k +1
π[q]  k
10 return π
In the above pseudo code for computing the prefix function, the
for loop from step 4 to step 10 runs ‘m’ times. Step 1 to
step 3 take constant time. Hence the running time of
compute prefix function is Θ(m).
• KMP_Matcher
1 n  length[S]
2 m  length[p]
3 π  Compute-Prefix-Function(p)
4 q  0
5 for i  1 to n
6 do while q > 0 and p[q+1] != S[i]
7 do q  π[q]
8 if p[q+1] = S[i]
9 then q  q + 1
10 if q = m
11 then print “Pattern occurs with shift” i – m
12 q  π[ q]
The for loop beginning in step 5 runs ‘n’ times, i.e., as long as the length of the
string ‘S’. Since step 1 to step 4 take constant time, the running time is
dominated by this for loop. Thus running time of matching function is Θ(n).
• The running time of Knuth-Morris-Pratt algorithm is
proportional to the time needed to read the
characters in text and pattern. In other words, the
worst-case running time of the algorithm
is Θ(m + n) and it requires O(m) extra space.
Time Complexity
• finds its applications in many core Digital Systems and
processes e.g.
Applications
 Digital libraries
 Screen scrapers
 Word processors
 Web search engines
 Spam filters
 Natural language processing
References
20
• Knuth, Donald; Morris, James H.; Pratt,
Vaughan (1977). "Fast pattern matching
in strings". SIAM Journal on Computing 6
(2): 323–350. doi:10.1137/0206024
• Introduction to Algorithms, Thomas H.
Cormen, Charles E. Leiserson, Ronald L.
Rivest and Clifford Stein, PHI
String matching algorithms(knuth morris-pratt)

Contenu connexe

Tendances

Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
Ehtisham Ali
 

Tendances (20)

Kmp
KmpKmp
Kmp
 
KMP Pattern Matching algorithm
KMP Pattern Matching algorithmKMP Pattern Matching algorithm
KMP Pattern Matching algorithm
 
Naive string matching
Naive string matchingNaive string matching
Naive string matching
 
KMP String Matching Algorithm
KMP String Matching AlgorithmKMP String Matching Algorithm
KMP String Matching Algorithm
 
String matching Algorithm by Foysal
String matching Algorithm by FoysalString matching Algorithm by Foysal
String matching Algorithm by Foysal
 
String matching algorithms
String matching algorithmsString matching algorithms
String matching algorithms
 
String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)
 
Bruteforce algorithm
Bruteforce algorithmBruteforce algorithm
Bruteforce algorithm
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
 
Rabin karp string matching algorithm
Rabin karp string matching algorithmRabin karp string matching algorithm
Rabin karp string matching algorithm
 
String matching algorithms-pattern matching.
String matching algorithms-pattern matching.String matching algorithms-pattern matching.
String matching algorithms-pattern matching.
 
Boyer moore algorithm
Boyer moore algorithmBoyer moore algorithm
Boyer moore algorithm
 
Rabin Carp String Matching algorithm
Rabin Carp String Matching  algorithmRabin Carp String Matching  algorithm
Rabin Carp String Matching algorithm
 
Daa unit 5
Daa unit 5Daa unit 5
Daa unit 5
 
Merge sort algorithm
Merge sort algorithmMerge sort algorithm
Merge sort algorithm
 
Push Down Automata (PDA) | TOC (Theory of Computation) | NPDA | DPDA
Push Down Automata (PDA) | TOC  (Theory of Computation) | NPDA | DPDAPush Down Automata (PDA) | TOC  (Theory of Computation) | NPDA | DPDA
Push Down Automata (PDA) | TOC (Theory of Computation) | NPDA | DPDA
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
Boyer more algorithm
Boyer more algorithmBoyer more algorithm
Boyer more algorithm
 
0 1 knapsack using branch and bound
0 1 knapsack using branch and bound0 1 knapsack using branch and bound
0 1 knapsack using branch and bound
 
Rabin karp string matcher
Rabin karp string matcherRabin karp string matcher
Rabin karp string matcher
 

En vedette

String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,
8neutron8
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controller
Tech_MX
 

En vedette (20)

Algoritmo de Rabin-Karp
Algoritmo de Rabin-KarpAlgoritmo de Rabin-Karp
Algoritmo de Rabin-Karp
 
String Matching Finite Automata & KMP Algorithm.
String Matching Finite Automata & KMP Algorithm.String Matching Finite Automata & KMP Algorithm.
String Matching Finite Automata & KMP Algorithm.
 
String kmp
String kmpString kmp
String kmp
 
Pattern matching in ds by m anoj vasava=mca
Pattern matching in ds by m anoj vasava=mcaPattern matching in ds by m anoj vasava=mca
Pattern matching in ds by m anoj vasava=mca
 
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
 
String matching algorithms
String matching algorithmsString matching algorithms
String matching algorithms
 
Algoritma Pencarian String matching
Algoritma Pencarian String matching Algoritma Pencarian String matching
Algoritma Pencarian String matching
 
Naive String Matching Algorithm | Computer Science
Naive String Matching Algorithm | Computer ScienceNaive String Matching Algorithm | Computer Science
Naive String Matching Algorithm | Computer Science
 
String Match | Computer Science
String Match | Computer ScienceString Match | Computer Science
String Match | Computer Science
 
06. string matching
06. string matching06. string matching
06. string matching
 
Rabin Karp - String Matching Algorithm
Rabin Karp - String Matching AlgorithmRabin Karp - String Matching Algorithm
Rabin Karp - String Matching Algorithm
 
A system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user wallsA system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user walls
 
String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,String Matching with Finite Automata,Aho corasick,
String Matching with Finite Automata,Aho corasick,
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Vertex cover Problem
Vertex cover ProblemVertex cover Problem
Vertex cover Problem
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controller
 
Boyer–Moore string search algorithm
Boyer–Moore string search algorithmBoyer–Moore string search algorithm
Boyer–Moore string search algorithm
 
Direct Memory Access(DMA)
Direct Memory Access(DMA)Direct Memory Access(DMA)
Direct Memory Access(DMA)
 
Density Function | Statistics
Density Function | StatisticsDensity Function | Statistics
Density Function | Statistics
 
Boyre Moore Algorithm | Computer Science
Boyre Moore Algorithm | Computer ScienceBoyre Moore Algorithm | Computer Science
Boyre Moore Algorithm | Computer Science
 

Similaire à String matching algorithms(knuth morris-pratt)

Skiena algorithm 2007 lecture17 edit distance
Skiena algorithm 2007 lecture17 edit distanceSkiena algorithm 2007 lecture17 edit distance
Skiena algorithm 2007 lecture17 edit distance
zukun
 

Similaire à String matching algorithms(knuth morris-pratt) (18)

W9Presentation.ppt
W9Presentation.pptW9Presentation.ppt
W9Presentation.ppt
 
module6_stringmatchingalgorithm_2022.pdf
module6_stringmatchingalgorithm_2022.pdfmodule6_stringmatchingalgorithm_2022.pdf
module6_stringmatchingalgorithm_2022.pdf
 
5 Understanding Page Rank
5 Understanding Page Rank5 Understanding Page Rank
5 Understanding Page Rank
 
Knutt Morris Pratt Algorithm by Dr. Rose.ppt
Knutt Morris Pratt Algorithm by Dr. Rose.pptKnutt Morris Pratt Algorithm by Dr. Rose.ppt
Knutt Morris Pratt Algorithm by Dr. Rose.ppt
 
String-Matching Algorithms Advance algorithm
String-Matching  Algorithms Advance algorithmString-Matching  Algorithms Advance algorithm
String-Matching Algorithms Advance algorithm
 
Lec17
Lec17Lec17
Lec17
 
Logic
LogicLogic
Logic
 
lec17.ppt
lec17.pptlec17.ppt
lec17.ppt
 
Skiena algorithm 2007 lecture17 edit distance
Skiena algorithm 2007 lecture17 edit distanceSkiena algorithm 2007 lecture17 edit distance
Skiena algorithm 2007 lecture17 edit distance
 
String searching
String searching String searching
String searching
 
Boyer more algorithm
Boyer more algorithmBoyer more algorithm
Boyer more algorithm
 
Gp 27[string matching].pptx
Gp 27[string matching].pptxGp 27[string matching].pptx
Gp 27[string matching].pptx
 
14th Athens Colloquium on Algorithms and Complexity (ACAC19)
14th Athens Colloquium on Algorithms and Complexity (ACAC19)14th Athens Colloquium on Algorithms and Complexity (ACAC19)
14th Athens Colloquium on Algorithms and Complexity (ACAC19)
 
StringMatching-Rabikarp algorithmddd.pdf
StringMatching-Rabikarp algorithmddd.pdfStringMatching-Rabikarp algorithmddd.pdf
StringMatching-Rabikarp algorithmddd.pdf
 
KMP Pattern Search
KMP Pattern SearchKMP Pattern Search
KMP Pattern Search
 
Class 14 3D HermiteInterpolation.pptx
Class 14 3D HermiteInterpolation.pptxClass 14 3D HermiteInterpolation.pptx
Class 14 3D HermiteInterpolation.pptx
 
09_nrps.pdf
09_nrps.pdf09_nrps.pdf
09_nrps.pdf
 
#6 formal methods – loop proof using induction method
#6 formal methods – loop proof using induction method#6 formal methods – loop proof using induction method
#6 formal methods – loop proof using induction method
 

Dernier

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Dernier (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 

String matching algorithms(knuth morris-pratt)

  • 2. Introduction • The algorithm was conceived in 1974 by Donald Knuth and Vaughan Pratt, and independently by James H. Morris. The three published it jointly in 1977 2
  • 3. Problem Defination Given a string ‘S’, the problem of string matching deals with finding whether a pattern ‘p’ occurs in ‘S’ and if ‘p’ does occur then returning position in ‘S’ where ‘p’ occurs.
  • 4. Drawbacks of the O(mn) Approach • if ‘m’ is the length of pattern ‘p’ and ‘n’ the length of string ‘S’, the matching time is of the order O(mn). This is a certainly a very slow running algorithm. • What makes this approach so slow is the fact that elements of ‘S’ with which comparisons had been performed earlier are involved again and again in comparisons in some future iterations. For example: when mismatch is detected for the first time in comparison of p[3] with S[3], pattern ‘p’ would be moved one position to the right and matching procedure would resume from here. Here the first comparison that would take place would be between p[0]=‘a’ and S[1]=‘b’. It should be noted here that S[1]=‘b’ had been previously involved in a comparison in step 2. this is a repetitive use of S[1] in another comparison. • It is these repetitive comparisons that lead to the runtime of O(mn). 4
  • 5. 5 The Algorithm • Knuth-Morris-Pratt’s algorithm compares the pattern to the text in left-to-right, but shifts the pattern more intelligently than the brute- force algorithm. • When a mismatch occurs, what is the most we can shift the pattern so as to avoid redundant comparisons? • Answer: the largest prefix of P[0..j] that is a suffix of P[1..j] x j . . a b a a b . . . . . a b a a b a a b a a b a No need to repeat these comparisons Resume comparing here
  • 6. Components of KMP algorithm • The prefix function, π The prefix function,π for a pattern encapsulates knowledge about how the pattern matches against shifts of itself. This information can be used to avoid useless shifts of the pattern ‘p’. In other words, this enables avoiding backtracking on the string ‘S’. • The KMP Matcher With string ‘S’, pattern ‘p’ and prefix function ‘Π’ as inputs, finds the occurrence of ‘p’ in ‘S’ and returns the number of shifts of ‘p’ after which occurrence is found.
  • 7. The prefix function, π Compute_Prefix_Function (p) 1 m  length[p] //’p’ pattern to be matched 2 π[1]  0 3 k  0 4 for q  2 to m 5 do while k > 0 and p[k+1] != p[q] 6 do k  π[k] 7 If p[k+1] = p[q] 8 then k  k +1 9 π[q]  k 10 return π
  • 8. Example: compute π for the pattern ‘p’ below: p a b a b a c a q 1 2 3 4 5 6 7 p a b a b a c a π 0 0 Initially: m = length[p] = 7 π[1] = 0 k = 0 Step 1: q = 2, k=0 π[2] = 0 Step 2: q = 3, k = 0, π[3] = 1 Step 3: q = 4, k = 1 π[4] = 2 q 1 2 3 4 5 6 7 p a b a b a c a π 0 0 1 q 1 2 3 4 5 6 7 p a b a b a c A π 0 0 1 2
  • 9. Step 4: q = 5, k =2 π[5] = 3 Step 5: q = 6, k = 3 π[6] = 0 Step 6: q = 7, k = 0 π[7] = 1 After iterating 6 times, the prefix function computation is complete:  q 1 2 3 4 5 6 7 p a b a b a c a π 0 0 1 2 3 q 1 2 3 4 5 6 7 p a b a b a c a π 0 0 1 2 3 0 q 1 2 3 4 5 6 7 p a b a b a c a π 0 0 1 2 3 0 1 q 1 2 3 4 5 6 7 p a b A b a c a π 0 0 1 2 3 0 1
  • 10. The KMP Matcher KMP_Matcher(S,p) 1 n  length[S] 2 m  length[p] 3 π  Compute-Prefix-Function(p) 4 q  0 //number of characters matched 5 for i  1 to n //scan S from left to right 6 do while q > 0 and p[q+1] != S[i] 7 do q  π[q] //next character does not match 8 if p[q+1] = S[i] 9 then q  q + 1 //next character matches 10 if q = m //is all of p matched? 11 then print “Pattern occurs with shift” i – m 12 q  π[ q] // look for the next match Note: KMP finds every occurrence of a ‘p’ in ‘S’. That is why KMP does not terminate in step 12, rather it searches remainder of ‘S’ for any more occurrences of ‘p’.
  • 11. Illustration: given a String ‘S’ and pattern ‘p’ as follows: S b a c b a b a b a b a c a c a a b a b a c ap Let us execute the KMP algorithm to find whether ‘p’ occurs in ‘S’. For ‘p’ the prefix function, π was computed previously and is as follows: q 1 2 3 4 5 6 7 p a b A b a c a π 0 0 1 2 3 1 1
  • 12. b a c b a b a b a b a c a a b b a c b a b a b a b a c a a b a b a b a c a a b a b a c a Initially: n = size of S = 15; m = size of p = 7 Step 1: i = 1, q = 0 comparing p[1] with S[1] S p P[1] does not match with S[1]. ‘p’ will be shifted one position to the right. S p Step 2: i = 2, q = 0 comparing p[1] with S[2] P[1] matches S[2]. Since there is a match, p is not shifted.
  • 13. Step 3: i = 3, q = 1 b a c b a b a b a b a c a a b a b a b a c a Comparing p[2] with S[3] S b a c b a b a b a b a c a a b b a c b a b a b a b a c a a b a b a b a c a a b a b a c ap S p S p p[2] does not match with S[3] Backtracking on p, comparing p[1] and S[3] Step 4: i = 4, q = 0 comparing p[1] with S[4] p[1] does not match with S[4] Step 5: i = 5, q = 0 comparing p[1] with S[5]p[1] matches with S[5]
  • 14. b a c b a b a b a b a c a a b b a c b a b a b a b a c a a b b a c b a b a b a b a c a a b a b a b a c a a b a b a c a a b a b a c a Step 6: i = 6, q = 1 S p Comparing p[2] with S[6] p[2] matches with S[6] S p Step 7: i = 7, q = 2 Comparing p[3] with S[7] p[3] matches with S[7] Step 8: i = 8, q = 3 Comparing p[4] with S[8] p[4] matches with S[8] S p
  • 15. Step 9: i = 9, q = 4 Comparing p[5] with S[9] Comparing p[6] with S[10] Comparing p[5] with S[11] Step 10: i = 10, q = 5 Step 11: i = 11, q = 4 S S S p p p b a c b a b a b a b a c a a b b a c b a b a b a b a c a a b b a c b a b a b a b a c a a b a b a b a c a a b a b a c a a b a b a c a p[6] doesn’t match with S[10] Backtracking on p, comparing p[4] with S[10] because after mismatch q = π[5] = 3 p[5] matches with S[9] p[5] matches with S[11]
  • 16. b a c b a b a b a b a c a a b b a c b a b a b a b a c a a b a b a b a c a a b a b a c a Step 12: i = 12, q = 5 Comparing p[6] with S[12] Comparing p[7] with S[13] S S p p Step 13: i = 13, q = 6 p[6] matches with S[12] p[7] matches with S[13] Pattern ‘p’ has been found to completely occur in string ‘S’. The total number of shifts that took place for the match to be found are: i – m = 13 – 7 = 6 shifts.
  • 17. Analysis • Compute_Prefix_Function (π) 1 m  length[p] //’p’ pattern to be matched 2 π[1]  0 3 k  0 4 for q  2 to m 5 do while k > 0 and p[k+1] != p[q] 6 do k  π[k] 7 If p[k+1] = p[q] 8 then k  k +1 π[q]  k 10 return π In the above pseudo code for computing the prefix function, the for loop from step 4 to step 10 runs ‘m’ times. Step 1 to step 3 take constant time. Hence the running time of compute prefix function is Θ(m). • KMP_Matcher 1 n  length[S] 2 m  length[p] 3 π  Compute-Prefix-Function(p) 4 q  0 5 for i  1 to n 6 do while q > 0 and p[q+1] != S[i] 7 do q  π[q] 8 if p[q+1] = S[i] 9 then q  q + 1 10 if q = m 11 then print “Pattern occurs with shift” i – m 12 q  π[ q] The for loop beginning in step 5 runs ‘n’ times, i.e., as long as the length of the string ‘S’. Since step 1 to step 4 take constant time, the running time is dominated by this for loop. Thus running time of matching function is Θ(n).
  • 18. • The running time of Knuth-Morris-Pratt algorithm is proportional to the time needed to read the characters in text and pattern. In other words, the worst-case running time of the algorithm is Θ(m + n) and it requires O(m) extra space. Time Complexity
  • 19. • finds its applications in many core Digital Systems and processes e.g. Applications  Digital libraries  Screen scrapers  Word processors  Web search engines  Spam filters  Natural language processing
  • 20. References 20 • Knuth, Donald; Morris, James H.; Pratt, Vaughan (1977). "Fast pattern matching in strings". SIAM Journal on Computing 6 (2): 323–350. doi:10.1137/0206024 • Introduction to Algorithms, Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, PHI