Using FPGA-based content-addressable memory for mnemonics instruction searching in assembler design

H Öztekin, A Lazzem, İ Pehlivan - The Journal of Supercomputing, 2023 - Springer
Memories play an essential role in computer systems as they store and retrieve data that
may include instructions required for system operation. In the case of an assembler, the …

An improved frequent pattern tree: the child structured frequent pattern tree CSFP-tree

O Jamsheela, G Raju - Pattern Analysis and Applications, 2023 - Springer
Frequent itemsets are itemsets that occur frequently in a dataset. Frequent itemset mining
extracts specific itemsets with supports higher than or equal to a minimum support threshold …

Automatic retrieval and analysis of high availability scenarios from system execution traces: A case study on hot standby router protocol

M Sheghdara, J Hassine - Journal of Systems and Software, 2020 - Elsevier
High availability (HA) is becoming an increasingly important requirement in a growing
number of domains. It is even mandatory for critical systems, such as networking and …

[PDF][PDF] Paw search–a searching approach for unsorted data combining with binary search and merge sort algorithm

MHO Rashid, A Imtiaz - … Journal of Advanced Computer Science and …, 2023 - academia.edu
Searching is one of the oldest core mechanism of nature. Nature is changing gradually
along with searching approaches too. Data Mining is one of the most important industrials …

Network intrusion detection using meta-heuristic feature selection and cost-sensitive learning

R Kaur, N Gupta - International Journal of Internet …, 2023 - inderscienceonline.com
In contemporary society, networked computers are playing a pivotal role in dissemination of
knowledge and critical data in information systems; ensuring its security has become a …

Distributed Protocol for Maximizing Sampling Frequency of Spectrum Reconnaissance UAV Clusters

J Wu, C Dong, X Zhu, Z Qin - 2024 IEEE Wireless …, 2024 - ieeexplore.ieee.org
Nowadays, unmanned aerial vehicle (UAV) clusters are widely used in military and civil
scenarios to perform spectrum reconnaissance. In this task, a high sampling frequency is …

A Systematic Approach for Analyzing Log Files Based on String Matching Regular Expressions

K Kaushik, G Sharma, G Goyal, AK Sharma… - Cyber Security and …, 2022 - Springer
In the past few years, there has been a tremendous increase in cyberattacks and
cybercrimes. Technology is changing at a very fast pace, thus inviting more advanced …

CFS-MHA: A Two-Stage Network Intrusion Detection Framework

R Kaur, N Gupta - International Journal of Information Security and …, 2022 - igi-global.com
With the increasing modernism in our society, networked computers are playing a pivotal
role in dispersion of knowledge, and the protection of critical data in information systems has …

Analysis of Accelerated Problem Solutions of Word Search in Texts

S Zaiceva, O Barkovska - COMPUTER AND INFORMATION …, 2020 - scholar.archive.org
The work is devoted to the topical problem of word search in texts, the implementation of
which is essential in such tasks as electronic dictionaries formation, digital libraries creation …

KLP's search algorithm-a new approach to reduce the average search time in binary search

GM Vuyyuru - 2019 4th International Conference on Electrical …, 2019 - ieeexplore.ieee.org
There are various issues in different fields of Computers, Database Management Systems,
Networks, Data Mining, and Artificial intelligence. But, the common problem in any field is …