Results 21 to 30 of about 284,765 (244)
Order-Preserving Pattern Matching with Partition
Order-preserving pattern matching, which considers the relative orders of strings, can be applied to time-series data analysis. To perform a more meaningful analysis of time-series data, approximate criteria for the order-isomorphism are necessary ...
Joong Chae Na +3 more
doaj +1 more source
An Algorithm to Compute the Character Access Count Distribution for Pattern Matching Algorithms
We propose a framework for the exact probabilistic analysis of window-based pattern matching algorithms, such as Boyer–Moore, Horspool, Backward DAWG Matching, Backward Oracle Matching, and more.
Sven Rahmann, Tobias Marschall
doaj +1 more source
Contactless Material Tensile Testing Using a High-Resolution Camera
This article deals with the use of contactless measurement with a high-resolution imaging device during tensile testing of materials in a universal tearing machine (UTM).
Jaroslav Bulava +2 more
doaj +1 more source
ANALYSIS ON DIFFERENT METHODS FOR SIGN LANGUAGE IDENTIFICATION
Sign Language (SL) is the most organized and structured type of hand/arm gesture in the communicative hand/arm gesture taxonomies. The ability of machines to comprehend human actions and meanings has numerous uses. SL identification is one area of focus.
M Prema, P M Gomathi
doaj +1 more source
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications
Trojan Detection—the process of understanding the behaviour of a suspicious file has been the talk of the town these days. Existing approaches, e.g., signature-based, have not been able to classify them accurately as Trojans.
Subhan Ullah +4 more
doaj +1 more source
3-Partition Order-Preserving Pattern Matching
Two strings of equal length are called order-isomorphic if their relative orders are identical at every position. The classical order-preserving pattern matching (OPPM) problem finds all substrings in a text T that are order-isomorphic to a pattern P ...
Joong Chae Na +2 more
doaj +1 more source
Study on Pattern Matching in Network Security
Pattern matching is the core module in network security system,it's the highest occupancy rate of system resources is more than 70%.According to problem and challenges of pattern matching in the network security system,taking 2000 as the boundary,the ...
Dongliang Xu +3 more
doaj +2 more sources
NETASPNO: Approximate Strict Pattern Matching Under Nonoverlapping Condition
In pattern matching, a gap constraint is a more flexible wildcard than traditional wildcards “?”and “*”. Pattern matching with gap constraints is more difficult to handle and fulfills user's enquiries more easily.
Youxi Wu +4 more
doaj +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
ABSTRACT Chemotherapy‐induced peripheral neuropathy remains a major complication in pediatric cancer, with disrupted somatosensory and nociceptive processing being a key aspect. This review synthesizes empirical studies on alterations in somatosensory and nociceptive processing in children and adolescents with cancer.
Julia Schweiger +4 more
wiley +1 more source

