An Alternate Way Of Implementing Heuristic Searching Technique
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
This work was carried out to explore the use of different data structure for heuristic search algorithm which can result in better performance with respect to time. The commonly used data structure Generalized Link List (GLL) and proposed use of data structure Multi Leveled Link List (MLL) schemes are presented in this paper. This scheme is more intended for better utilization of system resources. Almost all the heuristic algorithms have to maintain the list, which are to be added, updated and processed. Here different lists are maintained and operated upon simultaneously. Maintaining these lists simultaneously is not only tedious but complex too. The use of MLL will reduce this complexity. The paper aims at presenting the method for effective use of system resources without compromising on the optimality of the algorithm.
Authors and Affiliations
Mr. Girish P Potdar, Dr. R C Thool
Fuzzy Logic Based Contrast Image Enhancement Technique
Image Enhancement is one of the most important and difficult techniques in image research. Many images like satellite images, medical images, aerial images and even real life photographs may suffer from poor contrast...
An Application of Integrated Interface Schema (IIS) Over Multiple WDBS to Enhance Data Unit Annotation
The data unit’s revisits from the fundamental database are typically programmed into the result pages vigorously for human browsing. For the preset data units to be appliance process capable which is necessary for ma...
Design of Efficient DSP operation using 16×16 R-MAC Unit
As we already know that the multiplication and accumulation are the vital operations involved in DSP `applications. In DSP processor we need high speed performance for different applications. In order to increase thi...
An Advanced Anti Phishing Approach Based On Two-Tier Validation
Phishing on the web pages is an attempt by an individual or a group of hackers seeking to retrieve an individual’s personal private information such as passwords, usernames or confidential information, credit card inf...
A Novel Strategy to Maximize the modulation index Under Unbalanced DC Sources
In this paper a new NVM (Neutral modulation method) technique has been proposed to achieve balanced output in the multilevel cascaded inverter (MLCI) operating under unbalanced DC conditions. In order to examine thes...