Comparative Study of RBFS & ARBFS Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 5
Abstract
RBFS is a best-first search that runs in space that is linear with respect to the maximum search depth, regardless of the cost function used. This algorithm allows the use of all available memory. One major flaw of this algorithm is that it can visit the same node several times. This makes the computational cost may be unaffordable for some accuracy. This problem can be much solved by using various extension of Heuristic Search. By using anytime approach in our simple RBFS will improve solution by saving the current solution & continues the search.Anytime RBFS algorithm will optimize the memory & time resources and are considered best for RBFS algorithm. When the time available to solve a search problem is limited or uncertain, this creates an anytime heuristic search algorithm that allows a flexible substitution between search time and solution quality. Some applications like Real Time Strategy (RTS) games have applied these algorithms to find a fast solution that will help the algorithm prune some paths during the subsequent computation.
Authors and Affiliations
Disha Sharma
Application Newton methods in the reduction of the problem of optimal control of a boundary value problem.
The article presents a generalized continuation of the parameter and Newton methods for solving nonlinear equations . It describes and explores one approach to the application of the continuation method for solving...
A Step-Wise Procedure to Develop an Algorithm for Image Brightness Using Edge Detection Principles
Abstract: This paper uses the technique of edge detection to make the image of an oil pipeline toappear bright and clear for further investigations after applying Mathematical morphology for curve error detection....
DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase...
Detecting Intruders and Packet Modifiers in Wireless Sensor Networks
The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication o...
Analysis of Alignment of TEM Image using ECC
Abstract: TEM images are rapidly gaining prominence in various sectors like life sciences, pathology, medical science, semiconductors, forensics, etc. Hence, it is important to analyse the methods which are availab...