A New Look to Traversal Algorithms Using Set Construct Data Structure

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5

Abstract

Tree traversal refers to the process of visiting or examining or updating each node in a tree data structure, exactly once, in a systematic way. Such traversals are classified by the order in which the nodes of the tree are visited. This paper presents a new and innovative technique using which raversing in trees as well as in graph becomes extremely easy and using this technique explanation & understanding of traversing in trees & graphs also becomes easy using set construct.

Authors and Affiliations

Vineet Kumar Sharma , Adesh Kumar Pandey , Dr. V. K. Srivastava

Keywords

Related Articles

Debugging, Advanced Debugging and Runtime Analysis

Abstract—This paper discusses debugging and runtime analysis of software and outlines its enormous benefits to software developers and testers. A debugger is usually quite helpful in tracking down many logic problems. H...

Neural Network Based Forecasting of Foreign Currency Exchange Rates

The foreign currency exchange market is the highest and most liquid of the financial markets, with an estimated $1 trillion traded every day. Foreign exchange rates are the most important economic indices in the internat...

CBIR Using Kekre’s Transform over Row column Mean and Variance Vectors

We see the advancement in image acquisition technologies and storage systems which always encourages us to design a sophisticated system to retrieve the images effectively. In this paper, we describe the novel approach f...

S-boxes generated using Affine Transformation giving Maximum Avalanche Effect

The Advanced Encryption Standard (AES) was published by National Institute of Standards and Technology (NIST) in November 2001, to replace DES (Data Encryption Standard) and Triple DES. The S-box (Substitution box) used...

COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS

Intrusion Prevention is first line of defense against attacks in MANET. Intrusion Detection and response presents a second line of defense. New vulnerabilities will continue to invent new attack methods so new technology...

Download PDF file
  • EP ID EP144990
  • DOI -
  • Views 126
  • Downloads 0

How To Cite

Vineet Kumar Sharma, Adesh Kumar Pandey, Dr. V. K. Srivastava (2010). A New Look to Traversal Algorithms Using Set Construct Data Structure. International Journal on Computer Science and Engineering, 2(5), 1445-1448. https://europub.co.uk/articles/-A-144990