Results 91 to 100 of about 7,287,958 (273)

Combining globally search for a regular expression and print matching lines with bibliographic monitoring of genomic database improves diagnosis. [PDF]

open access: yesFront Genet, 2023
Tran Mau-Them F   +40 more
europepmc   +1 more source

Low-power TCAM for regular expression matching

open access: yesTongxin xuebao, 2014
A character-indexed regular expression matching algorithm was presented to address the limitations of TCAM power consumption. This algorithm used the idea of separating the alphabet table from the states in deterministic finite automaton (DFA) for ...
Lin-xuan DING, Kun HUANG, Da-fang ZHANG
doaj   +2 more sources

Understanding Regular Expressions

open access: yesProgramming Historian, 2013
In this lesson, we will use advanced find-and-replace capabilities in a word processing application in order to make use of structure in a brief historical document that is essentially a table in the form of prose.
openaire   +3 more sources

Novel NFA engine construction method of regular expressions

open access: yesTongxin xuebao, 2014
A novel method for constructing smaller non-deterministic finite automata (NFA) engine from given regular expressions named PFA was proposed.There are three main algorithms in PFA,the pretreatment algorithm,the coding parser tree algorithm and the NFA ...
Mao-hua JING   +3 more
doaj  

Improved space protocol identification algorithm

open access: yesTongxin xuebao, 2012
An improved boyer-moore (BM) algorithm for space protocol identification was proposed.First,a space data preprocessing technique based on bit distance was used to increase the size of data set.A decimal jumping technique was introduced to enhance the ...
Tian-ming ZHENG   +4 more
doaj  

Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication

open access: yes天地一体化信息网络, 2021
Facing the demand of multi-domain security control in the integrated network of air and ground, to solve the problem that singleprocess regular matching restricts the performance of interconnected security gateway, the method of high-performance ...
Bo LU, Yueming LU
doaj   +2 more sources

NUWT: JAWI-SPECIFIC BUCKWALTER CORPUS FOR MALAY WORD TOKENIZATION

open access: yesJournal of ICT, 2016
This paper describes the design and creation of a monolingual parallel corpus for the Malay language written in Jawi. This paper proposes a new corpus called the National University of Malaysia Word Tokenization (NUWT) corpora To the best of our ...
Juhaida Abu Bakar   +3 more
doaj  

Regular expressions into finite automata

open access: yesTheoretical Computer Science, 1993
It is well-known that the regular expressions can be translated into non- deterministic finite automata \((NFA)\) with or without \(\lambda\)- transitions. The standard method first translate a regular expression, in linear time, into an NFA with \(\lambda\)-transitions and then the \(\lambda\)-transitions are eliminated in quadratic time.
openaire   +3 more sources

Home - About - Disclaimer - Privacy