query string
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 1)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Snehal Bobhate

During this Project, we study string similarity search based on edit distance that is supported by many database management systems like Oracle and PostgreSQL. Given the edit distance, ed(s, t), between two strings, s and t, the string similarity search is to search out each string t in a string database D which is almost like a query string s such that ed(s, t) = t for a given threshold t. Within the literature, most existing work takes a filter-and-verify approach, where the filter step is introduced to reduce the high verification cost of 2 strings by utilizing an index engineered offline for D. The two up-to-date approaches are prefix filtering and native filtering. We have a tendency to propose 2 new hash- primarily based labeling techniques, named OX label and XX label, for string similarity search. We have a tendency to assign a hash-label, H s , to a string s, and prune the dissimilar strings by comparing 2 hash-labels, H s and H t , for two strings s and t within the filter step. The key idea is to take the dissimilar bit- patterns between 2 hash-labels.Our hash-based mostly approaches achieve high efficiency, and keep its index size and index construction time one order of magnitude smaller than the present approaches in our experiment at the same time.


JAMIA Open ◽  
2020 ◽  
Author(s):  
Elizabeth S Gromisch ◽  
Aaron P Turner ◽  
Jodie K Haselkorn ◽  
Albert C Lo ◽  
Thomas Agresta

Abstract Objectives Persons with multiple sclerosis (MS) can face a number of potential healthcare-related barriers, for which mobile health (mHealth) technology can be potentially beneficial. This review aimed to understand the frequency, current uses, and potential barriers with mHealth usage among persons with MS. Methods A query string was used to identify articles on PubMed, MEDLINE, CINAHL, and IEEE Xplore that were published in English between January 2010 and December 2019. Abstracts were reviewed and selected based on a priori inclusion and exclusion criteria. Fifty-nine peer-reviewed research studies related to the study questions are summarized. Results The majority of persons with MS were reported as using smartphones, although rates of mHealth utilization varied widely. mHealth usage was grouped into 3 broad categories: (1) disability and symptom measurement; (2) interventions and symptom management; and (3) tracking and promoting adherence. While there have been an increasing number of mHealth options, certain limitations associated with MS (eg, poor dexterity, memory problems) may affect usage, although including persons with MS in the design process can address some of these issues. Discussion Given the increased attention to mHealth in this population and the current need for telehealth and at home devices, it is important that persons with MS and healthcare providers are involved in the development of new mHealth tools to ensure that the end product meets their needs. Considerations for addressing the potential mHealth use barriers in persons with MS are discussed.


MENDEL ◽  
2019 ◽  
Vol 25 (1) ◽  
pp. 23-30
Author(s):  
Marina Volkova ◽  
Petr Chmelar ◽  
Lukas Sobotka

SQL injection is one of the most popular and serious information security threats. By exploiting database vulnerabilities, attackers may get access to sensitive data or enable compromised computers to conduct further network attacks. Our research is focused on applying machine learning approaches for identication of injection characteristics in the HTTP query string. We compare results from Rule-based Intrusion Detection System, Support Vector Machines, Multilayer Perceptron, Neural Network with Dropout layers, and Deep Sequential Models (Long Short-Term Memory, and Gated Recurrent Units) using multiple string analysis, bag-of-word techniques, and word embedding for query string vectorization. Results proved benets of applying machine learning approach for detection malicious pattern in HTTP query string.


Algorithms ◽  
2018 ◽  
Vol 11 (8) ◽  
pp. 118 ◽  
Author(s):  
Andrej Brodnik ◽  
Matevž Jekovec

We consider a sliding window W over a stream of characters from some alphabet of constant size. We want to look up a pattern in the current sliding window content and obtain all positions of the matches. We present an indexed version of the sliding window, based on a suffix tree. The data structure of size Θ(|W|) has optimal time queries Θ(m+occ) and amortized constant time updates, where m is the length of the query string and occ is its number of occurrences.


2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Marcelo Antonio de Carvalho Junior ◽  
Paulo Bandiera-Paiva

Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: “Role-Based Access Control” OR “RBAC” AND “Health information System” OR “EHR” AND “Trends” OR “Challenges” OR “Security” OR “Authorization” OR “Attacks” OR “Permission Assignment” OR “Permission Relation” OR “Permission Mapping” OR “Constraint”. We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. Results. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Conclusion. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.


2015 ◽  
Vol 14 (6) ◽  
pp. 561-581 ◽  
Author(s):  
Alice Kozakevicius ◽  
Cristian Cappo ◽  
Bruno A. Mozzaquatro ◽  
Raul Ceretta Nunes ◽  
Christian E. Schaerer

2014 ◽  
Vol 668-669 ◽  
pp. 1138-1142 ◽  
Author(s):  
Hui Wang ◽  
Xiao Hong Ji ◽  
Jun Ma

In order to automatically expand high quality polarity adjectives as much as possible by using the WordNet, three types of query strings are used in this study. Among them, the third type of query string is the most important. Besides ‘synonym’ and ‘antonym’ relations, we also use ‘similar to’ and ‘also see’ relations of the WordNet. In fact, the last two relations are more important than the first two ones. With the help of the newly proposed method, we can calculate the sentiment intensity of those expanded adjectives exactly. Abundant experiments demonstrate that our improved POAE algorithm is very effective in expanding and ranking adjective seed list in the sentiment analysis.


Sign in / Sign up

Export Citation Format

Share Document