期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Binary Tree’s Recursion Traversal Algorithm and Its Improvement
1
作者 Hua Li 《Journal of Computer and Communications》 2016年第7期42-47,共6页
Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvement... Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed. 展开更多
关键词 binary tree TRAVERSAL STACK
下载PDF
Bi-slotted Binary Tree Algorithm with Stack for Radio Frequency Identification Tag Anti-Collision 被引量:2
2
作者 田芸 陈恭亮 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第2期173-179,共7页
A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the per... A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the performance of binary tree algorithm (BTA). In BSBTA, the reader detects collisions by Manchester code and stores colliding prefixes in a stack. The query is composed of a two-bit prefix and an index value. Following every reader query, there are two timeslots for tags whose pointers and identities (IDs) match the query to respond, one for the tag whose next bit is 0 and the other for the tag with 1 as its next bit. Performance analysis and evaluation are also given. The time complexity and the communication complexity of BTA and BSBTA are derived. The simulation results compare the performance of BSBTA with several related anti-collision algorithms. It is shown that BSBTA outperforms BTA in terms of the average number of responded bits and timeslots for one tag identification. 展开更多
关键词 radio frequency identification (RFID) ANTI-COLLISION binary tree tag identification
原文传递
Science Letters:Binary tree of posterior probability support vector machines 被引量:2
3
作者 Dong-li WANG Jian-guo ZHENG Yan ZHOU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第2期83-87,共5页
Posterior probability support vector machines (PPSVMs) prove robust against noises and outliers and need fewer storage support vectors (SVs). Gonen et al. (2008) extended PPSVMs to a multiclass case by both single-mac... Posterior probability support vector machines (PPSVMs) prove robust against noises and outliers and need fewer storage support vectors (SVs). Gonen et al. (2008) extended PPSVMs to a multiclass case by both single-machine and multimachine approaches. However, these extensions suffer from low classification efficiency, high computational burden, and more importantly, unclassifiable regions. To achieve higher classification efficiency and accuracy with fewer SVs, a binary tree of PPSVMs for the multiclass classification problem is proposed in this letter. Moreover, a Fisher ratio separability measure is adopted to determine the tree structure. Several experiments on handwritten recognition datasets are included to illustrate the proposed approach. Specifically, the Fisher ratio separability accelerated binary tree of PPSVMs obtains overall test accuracy, if not higher than, at least comparable to those of other multiclass algorithms, while using significantly fewer SVs and much less test time. 展开更多
关键词 binary tree Support vector machine Handwritten recognition Classification
原文传递
Embedding Binary Tree in VLSI/WSI Processor Array
4
作者 陈宗汉 《Journal of Computer Science & Technology》 SCIE EI CSCD 1996年第3期326-336,共11页
Many reconfiguration schemes for fault-tolerant binary tree architectures have been proposed in the lite..t.re[1-6]. The VLSI layouts of most previous studies are based on the classical H-tree layout, resulting in low... Many reconfiguration schemes for fault-tolerant binary tree architectures have been proposed in the lite..t.re[1-6]. The VLSI layouts of most previous studies are based on the classical H-tree layout, resulting in low area utilization and likely an unnecessarily high manufacturing cost simply due to the waste of a significaot portion of silicon area. In this paper, we present an area-efficient approach to the reconfigurable binary tree architecture. Area utilization and interconnection complexity of our design compare favorably with the other known approaches. In the reliability analysis, we take ioto arcount the faCt that accepted chips (after fabrication) are with dmereot degrees of redundancy initially, so as to obtain results which better reflect real situations. 展开更多
关键词 PRO PI Embedding binary tree in VLSI/WSI Processor Array
原文传递
Prefix Subsection Matching Binary Algorithm in Passive RFID System
5
作者 王新锋 俞静一 +1 位作者 张绍军 周颖 《Defence Technology(防务技术)》 SCIE EI CAS 2011年第2期82-86,共5页
Identifying speed,tag average response times and reliability are the most important capabilities in passive RFID(radio frequency identification) system.QT(query tree) is a famous algorithm for lowest-cost RFID tags,bu... Identifying speed,tag average response times and reliability are the most important capabilities in passive RFID(radio frequency identification) system.QT(query tree) is a famous algorithm for lowest-cost RFID tags,but its shortcoming is high searching delay and high tag average response times.A prefix subsection matching binary(PSMB) algorithm based on QTalgorithm is proposed.The key idea of PSMB anti-collision algorithm is that,during searching phase,a given reader uses the particular tags ID,which has been searched out formerly,to shorten searching delay and depress tag average response times.The idea of PSMB algorithm can be described as follows.Usually,tag ID is composed of several subsections which have different meanings.Based on the tags ID searched out formerly,a given reader builds a prefix database.In subsequent searching phase,the reader uses its prefix database to deduce searching space of tag ID.Simulation results show that identification delay of PSMB algorithm is about 1/3 of QTalgorithm,tag average response times is about 1/4 of QTalgorithm,and system throughput rate is treble QTalgorithm. 展开更多
关键词 information processing radio frequency identification ANTI-COLLISION binary tree prefix matching
下载PDF
An Improved Treed Gaussian Process
6
作者 John Guenther Herbert K. H Lee 《Applied Mathematics》 2020年第7期613-638,共26页
Many black box functions and datasets have regions of different variability. Models such as the Gaussian process may fall short in giving the best representation of these complex functions. One successful approach for... Many black box functions and datasets have regions of different variability. Models such as the Gaussian process may fall short in giving the best representation of these complex functions. One successful approach for modeling this type of nonstationarity is the Treed Gaussian process <span style="font-family:Verdana;">[1]</span><span></span><span><span></span></span><span style="font-family:Verdana;">, which extended the Gaussian process by dividing the input space into different regions using a binary tree algorithm. Each region became its own Gaussian process. This iterative inference process formed many different trees and thus, many different Gaussian processes. In the end these were combined to get a posterior predictive distribution at each point. The idea was that when the iterations were combined, smoothing would take place for the surface of the predicted points near tree boundaries. We introduce the Improved Treed Gaussian process, which divides the input space into a single main binary tree where the different tree regions have different variability. The parameters for the Gaussian process for each tree region are then determined. These parameters are then smoothed at the region boundaries. This smoothing leads to a set of parameters for each point in the input space that specify the covariance matrix used to predict the point. The advantage is that the prediction and actual errors are estimated better since the standard deviation and range parameters of each point are related to the variation of the region it is in. Further, smoothing between regions is better since each point prediction uses its parameters over the whole input space. Examples are given in this paper which show these advantages for lower-dimensional problems.</span> 展开更多
关键词 Bayesian Statistics treed Gaussian Process Gaussian Process EMULATOR binary tree
下载PDF
Fast,Exact and Robust Set Operations on Polyhedrons Using Localized Constructive Solid Geometry Trees
7
作者 Ping Lu Xudong Jiang +2 位作者 Wei Lu Ran Wei Bin Sheng 《ZTE Communications》 2015年第3期57-66,共10页
Regularized Boolean operations have been widely used in 3D modeling systems. However, evaluating Boolean operations may be quite numerically unstable and time consuming, especially for iterated set operations. A novel... Regularized Boolean operations have been widely used in 3D modeling systems. However, evaluating Boolean operations may be quite numerically unstable and time consuming, especially for iterated set operations. A novel and unified technique is proposed in this paper for computing single and iterated set operations efficiently, robustly and exactly. An adaptive octree is combined with a nested constructive solid geometry (CSG) tree by this technique. The intersection handling is restricted to the cells in the octree where intersection actually occurs. Within those cells, a CSG tree template is instanced by the surfaces and the tree is converted to planebased binary space partitioning (BSP) for set evaluation; Moreover, the surface classification is restricted to the ceils in the octree where the surfaces only come from a model and are within the bounding-boxes of other polyhedrons. These two ways bring about the efficiency and scalability of the operations, in terms of runtime and memory. As all surfaces in such a cell have the same classification relation, they are classified as a whole. Robustness and exactness are achieved by integrating plane-based geometry representation with adaptive geometry predicate technique in intersection handling, and by applying divide-and-conquer arithmetic on surface classification. Experimental results demonstrate that the proposed approach can guarantee the robustness of Boolean computations and runs faster than other existing approaches. 展开更多
关键词 Boolean operations polyhedrons constructive solid geometry binary space partitioning tree
下载PDF
New multi-pattern matching algorithm 被引量:2
8
作者 Liu Gongshen Li Jianhua Li Shenghong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期437-442,共6页
The traditional multiple pattern matching algorithm, deterministic finite state automata, is implemented by tree structure. A new algorithm is proposed by substituting sequential binary tree for traditional tree. It i... The traditional multiple pattern matching algorithm, deterministic finite state automata, is implemented by tree structure. A new algorithm is proposed by substituting sequential binary tree for traditional tree. It is proved by experiment that the algorithm has three features, its construction process is quick, its cost of memory is small. At the same time, its searching process is as quick as the traditional algorithm. The algorithm is suitable for the application which requires preprocessing the patterns dynamically. 展开更多
关键词 multiple pattern matching finite state automata sequential binary tree.
下载PDF
Novel load balancing DHT scheme for the heterogeneous system
9
作者 Li Yujun Lu Xianliang Hou Mengshu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期835-842,共8页
The capacities of the nodes in the peer-to-peer system are strongly heterogeneous, hence one can benefit from distributing the load, based on the capacity of the nodes. At first a model is discussed to evaluate the lo... The capacities of the nodes in the peer-to-peer system are strongly heterogeneous, hence one can benefit from distributing the load, based on the capacity of the nodes. At first a model is discussed to evaluate the load balancing of the heterogeneous system, and then a novel load balancing scheme is proposed based on the concept of logical servers and the randomized binary tree, and theoretical guarantees are given. Finally, the feasibility of the scheme using extensive simulations is proven. 展开更多
关键词 distributed hash table HETEROGENEITY randomized binary tree load balancing
下载PDF
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
10
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 Radio frequency identification(RFID) tag anti-collision algorithm physical layer network coding binary search tree algorithm
下载PDF
A novel binary image representation algorithm by using NAM and coordinate encoding procedure and its application to area calculation 被引量:2
11
作者 Yunping ZHENG Mudar SAREM 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第5期763-772,共10页
We propose a novel binary image representation algorithm using the non-symmetry and anti-packing model and the coordinate encoding procedure (NAMCEP). By tak- ing some idiomatic standard binary images in the field o... We propose a novel binary image representation algorithm using the non-symmetry and anti-packing model and the coordinate encoding procedure (NAMCEP). By tak- ing some idiomatic standard binary images in the field of image processing as typical test objects, and by comparing our proposed NAMCEP representation with linear quadtree (LQT), binary tree (Bintree), non-symmetry and anti-packing model (NAM) with K-lines (NAMK), and NAM representa- tions, we show that NAMCEP can not only reduce the aver- age node, but also simultaneously improve the average com- pression. We also present a novel NAMCEP-based algorithm for area calculation and show experimentally that our algo- rithm offers significant improvements. 展开更多
关键词 image representation binary image linearquadtree (LQT) binary tree (Bintree non-symmetry andanti-packing model (NAM) coordinate encoding procedure area calculation
原文传递
Framed slotted ALOHA with grouping tactic and binary selection for anti-collision in RFID systems 被引量:2
12
作者 WANG Ya-qi JIANG Guo-ping WANG Jing 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第4期47-52,共6页
In radio frequency identification (RFID) systems, tag collision arbitration is a significant issue for fast tag identification. This article proposes a novel tag anti-collision algorithm called framed slotted ALOHA ... In radio frequency identification (RFID) systems, tag collision arbitration is a significant issue for fast tag identification. This article proposes a novel tag anti-collision algorithm called framed slotted ALOHA with grouping tactic and binary selection (GB-FSA). The novelty of GB-FSA algorithm is that the reader uses binary tree algorithm to identify the tags according to the collided slot counters information. Furthermore, to save slots, tags are randomly divided into several groups based on the number of collided binary bits in the identification codes (IDs) of tags, and then only the number of the first group of tags is estimated. Performance analysis and simulation results show that the GB-FSA algorithm improves the identification efficiency by 9.9%-16.3% compared to other ALOHA-based tag anti-collision algorithms when the number of tags is 1000. 展开更多
关键词 RFID ANTI-COLLISION binary tree identification efficiency
原文传递
The General Facility Location Problem with Connectivity on Trees
13
作者 Er Fang SHAN Li Ying KANG 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2016年第9期1106-1112,共7页
In this note we study the general facility location problem with connectivity. We present an O(np2)-time algorithm for the general facility location problem with connectivity on trees. Furthermore,we present an O(n... In this note we study the general facility location problem with connectivity. We present an O(np2)-time algorithm for the general facility location problem with connectivity on trees. Furthermore,we present an O(np)-time algorithm for the general facility location problem with connectivity on equivalent binary trees. 展开更多
关键词 Connected p-center connected p-median tree equivalent binary tree
原文传递
Concurrent Manipulation of Expanded AVL Trees
14
作者 章寅 许卓群 《Journal of Computer Science & Technology》 SCIE EI CSCD 1998年第4期325-336,共12页
The concurrent manipulation of an expanded AVL tree (EAVL tree) is considered in this paper. The presented system can support any number of concurrent processes which perform searching, insertion and deletion on the t... The concurrent manipulation of an expanded AVL tree (EAVL tree) is considered in this paper. The presented system can support any number of concurrent processes which perform searching, insertion and deletion on the tree. Simulation results indicate the high performance of the system. Elaborate techniques are used to achieve such a system unawilable based on any known algorithms. Methods developed in this paper may provide new insights into other problems in the area of concurrent search structure manipulation. 展开更多
关键词 AVL tree data structure binary search tree concurrent algorithm concurrency control locking protocol
原文传递
Multi-class Classification Methods of Enhanced LS-TWSVM for Strip Steel Surface Defects 被引量:3
15
作者 Mao-xiang CHU An-na WANG +1 位作者 Rong-fen GONG Mo SHA 《Journal of Iron and Steel Research(International)》 SCIE EI CAS CSCD 2014年第2期174-180,共7页
Considering strip steel surface defect samples, a multi-class classification method was proposed based on enhanced least squares twin support vector machines (ELS-TWSVMs) and binary tree. Firstly, pruning region sam... Considering strip steel surface defect samples, a multi-class classification method was proposed based on enhanced least squares twin support vector machines (ELS-TWSVMs) and binary tree. Firstly, pruning region samples center method with adjustable pruning scale was used to prune data samples. This method could reduce classifierr s training time and testing time. Secondly, ELS-TWSVM was proposed to classify the data samples. By introducing error variable contribution parameter and weight parameter, ELS-TWSVM could restrain the impact of noise sam- ples and have better classification accuracy. Finally, multi-class classification algorithms of ELS-TWSVM were pro- posed by combining ELS-TWSVM and complete binary tree. Some experiments were made on two-dimensional data- sets and strip steel surface defect datasets. The experiments showed that the multi-class classification methods of ELS-TWSVM had higher classification speed and accuracy for the datasets with large-scale, unbalanced and noise samples. 展开更多
关键词 multi-class classification least squares twin support vector machine error variable contribution WEIGHT binary tree strip steel surface
原文传递
High order modulation format identification based on compressed sensing in optical fiber communication system 被引量:1
16
作者 惠柄翔 唐先锋 +2 位作者 高娜 张文博 张晓光 《Chinese Optics Letters》 SCIE EI CAS CSCD 2016年第11期14-18,共5页
We propose a method of modulation format identification based on compressed sensing using a high-order cyclic cumulant combined with a binary tree classifier.Through computing the fourth-order cyclic cumulant of the p... We propose a method of modulation format identification based on compressed sensing using a high-order cyclic cumulant combined with a binary tree classifier.Through computing the fourth-order cyclic cumulant of the pretreated band signal,which is obtained by compressed sensing with the sampling rate much less than the Nyquist sampling value,the feature vector for classification is extracted.Simulations are carried out in the optical coherent fiber communication system with different modulation formats of multiple phase-shift keying and multiple quadrature amplitude modulation.The results indicate that this method can identify these modulation formats correctly and efficiently.Meanwhile,the proposed method is insensitive to laser phase noise and signal noise. 展开更多
关键词 binary trees Compressed sensing Face recognition GEARS MODULATION Optical communication Optical fibers Phase noise Phase shift Phase shift keying Signal reconstruction
原文传递
Adaptive TDMA slot assignment protocol for vehicular ad-hoc networks 被引量:1
17
作者 YANG Wei-dong LI Pan +1 位作者 LIU yan ZHU Hong-song 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第1期11-18,25,共9页
This paper proposes a novel adaptive time division vehicular ad-hoc networks. ATSA divides different sets multiple access (TDMA) slot assignment protocol (ATSA) for of time slots according to vehicles moving in op... This paper proposes a novel adaptive time division vehicular ad-hoc networks. ATSA divides different sets multiple access (TDMA) slot assignment protocol (ATSA) for of time slots according to vehicles moving in opposite directions. When a node accesses the networks, it choices a frame length and competes a slot based on its direction and location to communication with the other nodes. Based on the binary tree algorithm, the frame length is dynamically doubled or shortened, and the ratio of two slot sets is adjusted to decrease the probability of transmission collisions. The theoretical analysis proves ATSA protocol can reduce the time delay at least 20% than the media access control protocol for vehicular ad-hoc networks (VeMAC) and 30% than the ad-hoc. The simulation experiment shows that ATSA has a good scalability and the collisions would be reduced about 50% than VeMAC, channel utilization is significantly improved than several existing protocols. 展开更多
关键词 media access control (MAC) protocol TDMA slot assignment adaptive frame length binary tree
原文传递
Multi-QoS Aware Automatic Service Composition
18
作者 WU Xiaoming WANG Tian +1 位作者 QIAN Xi ZENG Cheng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第4期307-314,共8页
Almost all current automatic service composition (ASC) algorithms consider only single nonfunctional requirements, namely quality of service (QoS), which cannot satisfy the real application. This paper proposes M... Almost all current automatic service composition (ASC) algorithms consider only single nonfunctional requirements, namely quality of service (QoS), which cannot satisfy the real application. This paper proposes MAT (multi-QoS aware top-K ASC) algorithm to realize the high-efficiency exploring and rank- ing of composition scheme by synthesizing more nonfunctional goals. MAT algorithm explores composition schemes by the sky- line technique based on tape model and ranks these schemes by a modified binary tree. Using Web service challenge (WSC) 2009 dataset, we verify the performance of MAT algorithm and the experimental result is even close to the current fastest ASC algo- rithm considering only single QoS. 展开更多
关键词 automatic service composition multi-QoS aware SKYLINE tape model heuristic pruning binary tree
原文传递
Extending STL with Efficient Data Structures
19
作者 吴虹 聂旭民 《Journal of Computer Science & Technology》 SCIE EI CSCD 1998年第4期317-324,共8页
The Standard Template Library (STL) is a C++ library that provides a set of wellstructured generic C++ components that work together. Based on its well-structured design, STL can be extended by adding new generic algo... The Standard Template Library (STL) is a C++ library that provides a set of wellstructured generic C++ components that work together. Based on its well-structured design, STL can be extended by adding new generic algorithms or new generic containers. In this paper, the work on extending STL by adding several efficient cofitainer classes for threaded binary search trees is discussed. It is shown that the addition of threads signilicantly increases the efficiency of some important access operations on the binary tree containers. In general, significant gain in efficiency can be expected in situations where the data structures are relatively stable, that is, the data structures are looked up often but modified little. 展开更多
关键词 C++ Standard Template Library (STL) binary tree
原文传递
New method in information processing for maintaining an efficient dynamic ordered set
20
作者 XIN ShiQing WANG GuoJin 《Science in China(Series F)》 2009年第8期1292-1301,共10页
This paper investigates how to maintain an efficient dynamic ordered set of bit strings, which is an important problem in the field of information search and information processing. Generally, a dynamic ordered set is... This paper investigates how to maintain an efficient dynamic ordered set of bit strings, which is an important problem in the field of information search and information processing. Generally, a dynamic ordered set is required to support 5 essential operations including search, insertion, deletion, max-value retrieval and next-larger-value retrieval. Based on previous research fruits, we present an advanced data structure named rich binary tree (RBT), which follows both the binary-search-tree property and the digital-search-tree property. Also, every key K keeps the most significant difference bit (MSDB) between itself and the next larger value among K's ancestors, as well as that between itself and the next smaller one among its ancestors. With the new data structure, we can maintain a dynamic ordered set in O(L) time. Since computers represent objects in binary mode, our method has a big potential in application. In fact, RBT can be viewed as a general-purpose data structure for problems concerning order, such as search, sorting and maintaining a priority queue. For example, when RBT is applied in sorting, we get a linear-time algorithm with regard to the key number and its performance is far better than quick-sort. What is more powerful than quick-sort is that RBT supports constant-time dynamic insertion/deletion. 展开更多
关键词 information processing dynamic ordered set algorithms and data structures rich binary tree
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部