A New Look to Traversal Algorithms Using Set Construct Data Structure
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Tree traversal refers to the process of visiting or examining or updating each node in a tree data structure, exactly once, in a systematic way. Such traversals are classified by the order in which the nodes of the tree are visited. This paper presents a new and innovative technique using which raversing in trees as well as in graph becomes extremely easy and using this technique explanation & understanding of traversing in trees & graphs also becomes easy using set construct.
Authors and Affiliations
Vineet Kumar Sharma , Adesh Kumar Pandey , Dr. V. K. Srivastava
Debugging, Advanced Debugging and Runtime Analysis
Abstract—This paper discusses debugging and runtime analysis of software and outlines its enormous benefits to software developers and testers. A debugger is usually quite helpful in tracking down many logic problems. H...
Neural Network Based Forecasting of Foreign Currency Exchange Rates
The foreign currency exchange market is the highest and most liquid of the financial markets, with an estimated $1 trillion traded every day. Foreign exchange rates are the most important economic indices in the internat...
CBIR Using Kekre’s Transform over Row column Mean and Variance Vectors
We see the advancement in image acquisition technologies and storage systems which always encourages us to design a sophisticated system to retrieve the images effectively. In this paper, we describe the novel approach f...
S-boxes generated using Affine Transformation giving Maximum Avalanche Effect
The Advanced Encryption Standard (AES) was published by National Institute of Standards and Technology (NIST) in November 2001, to replace DES (Data Encryption Standard) and Triple DES. The S-box (Substitution box) used...
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS
Intrusion Prevention is first line of defense against attacks in MANET. Intrusion Detection and response presents a second line of defense. New vulnerabilities will continue to invent new attack methods so new technology...