نتایج جستجو برای: proper binary tree

تعداد نتایج: 391121  

1983
Robert Sedgewick

Let H~ be the height of a random binary search tree on n nodes. We show that there exists constants a = 4.31107.. . and/3 = 1.95.. . such that E(H~) = c~logn / 3 1 o g l o g n + O(1), We also show that Var(H~) = O(1).

2010
Yun Qiu Guomin Zhou

A visual pests diagnosis system development tools based on binary tree (abbreviation: knowledge system development tools) was developed by techniques of computer visualization, binary tree, XML database and reasoning. This tool combined tree knowledge expression with rule-based reasoning machine, proposed the knowledge acquisition and the reasoning technique based on binary tree, and solved the...

2011
Pushpa R. Suri Madhu Goel

In this study, the focus was on the use of ternary tree over binary tree. Here, a new one pass Algorithm for Decoding adaptive Huffman ternary tree codes was implemented. To reduce the memory size and fasten the process of searching for a symbol in a Huffman tree, we exploited the property of the encoded symbols and proposed a memory efficient data structure to represent the codeword length of ...

2010
Gowtham Bellala

In this paper, we study two diverse problems from a random matrix perspective. The first one is the problem of binary testing (or object/entity identification) that arises in applications such as active learning, fault diagnosis and computer vision, and the second is the problem of zero or bounded skew clock tree construction which arises in applications such as VLSI circuit design and network ...

Journal: :caspian journal of environmental sciences 2013
r. naghdi m. nikooy m. ershadifar

economic and environmental logging is important for sustainable wood production in the caspian forests, north of iran. predetermination of the skid trail network and directional felling is a usual recommended method to reduce logging impact. the aim of this study was evaluation of directional felling and finding factors effective on felling error. totally 135 trees were selected randomly for di...

2016
Yong Wei

Through block cipher method, this paper demonstrates using preorder and post traversal sequence of a binary tree with 64 nodes to implement symmetric encryption/decryption. The different traversal sequences may determine a binary tree, so the method is vulnerable to be attacked. The paper’s further deduction involves improvement using multiple binary trees, so that more secure and efficient sym...

Journal: :Reliability Engineering & System Safety 2021

Network structures and models have been widely adopted, e.g., for Internet of Things, wireless sensor networks, smart grids, transportation communication social computer grid systems. reliability is an effective popular technique to estimate the probability that network still functioning. Networks composed binary-state (e.g., working or failed) components (arcs and/or nodes) are called networks...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید