Exploring efficient grouping algorithms in regular expression matching. [PDF]
BACKGROUND:Regular expression matching (REM) is widely employed as the major tool for deep packet inspection (DPI) applications. For automatic processing, the regular expression patterns need to be converted to a deterministic finite automata (DFA ...
Chengcheng Xu, Jinshu Su, Shuhui Chen
doaj +2 more sources
Combining globally search for a regular expression and print matching lines with bibliographic monitoring of genomic database improves diagnosis. [PDF]
Tran Mau-Them F +40 more
europepmc +3 more sources
Improved Script Identification Algorithm Using Unicode-Based Regular Expression Matching Strategy [PDF]
While script identification is the first step in many natural language processing and text mining tasks, at present, there is no open-source script identification algorithm for text. For this reason, we analyze the Unicode encoding of each type of script
Mamtimin Qasim, Wushour Silamu
doaj +2 more sources
Synchronized Regular Expressions [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
DELLA PENNA, GIUSEPPE +3 more
openaire +3 more sources
HEDEA: A Python Tool for Extracting and Analysing Semi-structured Information from Medical Records [PDF]
ObjectivesOne of the most important functions for a medical practitioner while treating a patient is to study the patient's complete medical history by going through all records, from test results to doctor's notes.
Anshul Aggarwal +2 more
doaj +1 more source
Regular transducer expressions for regular transformations [PDF]
Functional MSO transductions, deterministic two-way transducers, as well as streaming string transducers are all equivalent models for regular functions. In this paper, we show that every regular function, either on finite words or on infinite words, captured by a deterministic two-way transducer, can be described with a regular transducer expression ...
Dave, Vrunda +2 more
openaire +3 more sources
Effective Filter for Common Injection Attacks in Online Web Applications
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos +5 more
doaj +1 more source
Scientific reference style using rule-based machine learning
Regular Expressions (RegEx) can be employed as a technique for supervised learning to define and search for specific patterns inside text. This work devised a method that utilizes regular expressions to convert the reference style of academic papers into
Afrida Helen +2 more
doaj +1 more source
Derivatives of Regular Expressions [PDF]
Janusz Brzozowski
openaire +2 more sources
The use of syntax trees in order to automate the correction of LaTeX documents [PDF]
The problem is to automate the correction of LaTeX documents. Each document is represented as a parse tree. The modified Zhang-Shasha algorithm is used to construct a mapping of tree vertices of the original document to the tree vertices of the edited ...
Kirill Vladimirovich Chuvilin
doaj +1 more source

