-
161
PERFORMANCE EVALUATION OF TRANSMITTER SYSTEM THROUGH IMPROVING THE SEPARATE SMART ANTI-COLLISION
Published 2018-11-01“…Suggest "the Enhanced Slotted Binary Tree Algorithm along with Intelligent Separation (IS-ESBT)". …”
Get full text
Article -
162
Blockchain-based multi-authority revocable data sharing scheme in smart grid
Published 2023-05-01“…Using online/offline encryption technology with hybrid encryption technology enhances the encryption performance for the data owner. The use of user binary tree technology enables the traceability and revocability of malicious users. …”
Get full text
Article -
163
Worst-Case Optimal Tree Layout in External Memory
Published 2014“…Consider laying out a fixed-topology binary tree of N nodes into external memory with block size B so as to minimize the worst-case number of block memory transfers required to traverse a path from the root to a node of depth D. …”
Get full text
Get full text
Article -
164
FUNCTIONAL PEARLS Maximum marking problems
Published 2001“…First, consider the binary tree in figure 1. Take a pencil (I am assuming that this is your personal copy of JFP!) …”
Journal article -
165
An energy saving scheme for key management protocol in IEEE802.16e
Published 2013“…This paper proposes an Efficient Key Management Scheme (EKMS) using complete binary tree structure to mitigate this issue, this is done by reducing energy consumption of MSs needed to execute key management process. …”
Get full text
Conference or Workshop Item -
166
An extension of Tamari lattices
Published 2015-01-01“…In particular this solves the problem of extending the $m$-Tamari lattice to any pair $(a; b)$ of relatively prime numbers in the context of the so-called rational Catalan combinatorics.For that purpose we introduce the notion of canopy of a binary tree and explicit a bijection between pairs $(u; v)$ of paths in Tam$(v)$ and binary trees with canopy $v$. …”
Get full text
Article -
167
Ship Collaborative Path Planning Method Based on CS-STHA
Published 2022-10-01“…Secondly, the space-time conflict constraint is introduced into the multi-ship cooperative CA scheme, and the binary tree is used to search for an optimal navigation path with no conflict and low cost. …”
Get full text
Article -
168
An Algorithm for Linearizing the Collatz Convergence
Published 2021-08-01“…We further simulate these rules to gain insight into their quiver geometry and computational properties and observe that they linearize the proof of convergence of the full rows of the binary tree over odd numbers in their natural order, a result which, along with the full description of the basin of any odd number, has never been achieved before. …”
Get full text
Article -
169
Vertex order with optimal number of adjacent predecessors
Published 2020-01-01“…DDGPs constitute a class of graph realization problems where the vertices can be ordered in such a way that the search space of possible positions becomes discrete, usually represented by a binary tree. In particular, it is useful to find discretization orders that minimize an indicator of the size of the search tree. …”
Get full text
Article -
170
Classification of Plank Techniques Using Wearable Sensors
Published 2022-06-01“…The random forest method was employed to perform the classification. The proposed binary tree classification model achieved an accuracy of more than 86%. …”
Get full text
Article -
171
OmniMerge: A Systematic Approach to Constrained Conformational Search
Published 2003“…However, instead of using a binary tree for straightforward divide-and-conquer, OmniMerge defines a sub-problem for every possible subchain of the molecule. …”
Get full text
Article -
172
Scalable and efficient key management for mobile WiMAX networks
Published 2013“…This paper proposes a new key management scheme called Scalable and Efficient Key Management Protocol, which uses a binary tree structure together with a B-tree of order 2 structure. …”
Get full text
Get full text
Journal Article -
173
A novel energy efficient key distribution scheme for mobile WiMAX networks
Published 2017“…This paper proposes an Efficient Key Distribution scheme to decrease the number of exchanged keys which results in minimizing energy consumption of the network by grouping the MSs into the different subgroups based on their speeds using complete binary tree. Analysis shows that the proposed scheme reduces energy consumption during key updating process.…”
Get full text
Article -
174
Activity-Based Block Partitioning Decision Method for Versatile Video Coding
Published 2022-03-01“…The multi-type tree (MTT) block structure offers more advanced flexible block partitioning by allowing the binary tree (BT) and ternary tree (TT) structures, as well as the quadtree (QT) structure. …”
Get full text
Article -
175
Follow-Up Control and Image Recognition of Neck Level for Standard Metal Gauge
Published 2020-09-01“…A characteristic edge detection model was used to identify centimeter-scale lines corresponding to the meniscus. A binary tree multiclass support vector machine (MCSVM) classifier was then used to identify scale numbers corresponding to scale lines and determine the optimal neck level for standard metal gauges. …”
Get full text
Article -
176
Machine-Learning-Based Carbon Footprint Management in the Frozen Vegetable Processing Industry
Published 2021-11-01“…Hence, they are validated by classification methods (k-nearest neighbors (kNN), multilayer perceptron (MLP), binary tree C4.5, random forest (RF), and support vector machine (SVM)) that identify the optimal clusterization method. …”
Get full text
Article -
177
Decision-Making Conflict Measurement of Old Neighborhoods Renovation Based on Mixed Integer Programming DEA-Discriminant Analysis (MIP DEA–DA) Models
Published 2024-03-01“…Based on the preferences of decision-making experts, a MIP DEA–DA (Mixed Integer Programming Data Envelopment Analysis–Discriminant Analysis) based partial binary tree cyclic clustering model is constructed for clustering experts, and an aggregated group conflict indicator and an aggregated conflict vector are computed, allowing for the quantification of conflict during the renovation process of the old neighborhood based on actual situations. …”
Get full text
Article -
178
A Constant Round Write-Only ORAM
Published 2020-08-01“…The second level employs a binary tree to store the position map of data blocks. …”
Get full text
Article -
179
Scalable and High-Fidelity Quantum Random Access Memory in Spin-Photon Networks
Published 2022“…Proposed implementations include the use of neutral atoms and superconducting circuits to construct a binary tree but these systems still require demonstrations of the elementary components. …”
Get full text
Article -
180
The performance study of two genetic algorithm approaches for VLSI macro-cell layout area optimization
Published 2008“…Thus, this paper addresses the performance comparisons of two different types of Genetic Algorithm (GA) techniques for VLSI macrocell layout area optimization by utilizing the adopted method of cell placement that is binary tree method. Two GA approaches which are Simple Genetic Algorithm (SGA) and Steady-State Genetic Algorithm (SSGA) have been implemented and their performances in converging to their global minimums are examined and discussed. …”
Book Section