With the advancement in the Internet of Medical Things (IoMT) infrastructure, network security issues have become a serious concern for hospitals and medical facilities. For this …
Abstract The Holy Quran and Hadith are the two main sources of legislation and guidelines for Muslims to shape their lives. The daily activities, sayings, and deeds of the Holy Prophet …
Digital Watermarking is required in multimedia applications where access to sensitive information has to be protected against malicious attacks. Since the digital text is one of the …
P Niroula, Y Nam - npj Quantum Information, 2021 - nature.com
Algorithms that search for a pattern within a larger data-set appear ubiquitously in text and image processing. Here, we present an explicit, circuit-level implementation of a quantum …
Matching approaches based on the exact match are popular and commonly utilized in various applications such as texting, intrusion detection network systems, web-based search …
The data generated from social media is very large, while the use of data from social media has not been fully utilized to become new knowledge. One of the things that can become …
AM Al-Ssulami, AM Azmi, H Mathkour… - Information Processing & …, 2022 - Elsevier
String matching is a classical computer science problem where we search for all the occurrences of a text string of size m, typically called pattern, in a string of size n, where both …
The remarkable growth of biological data is a motivation to accelerate the discovery of solutions in many domains of computational bioinformatics. In different phases of the …
BA Hamed, OAS Ibrahim… - … Practice and Experience, 2022 - Wiley Online Library
Pattern matching is a highly useful procedure in several stages of the computational pipelines. Furthermore, some research trends in this research domain contributed to …