نتایج جستجو برای: inorder traversal

تعداد نتایج: 4329  

2004
Manfred Ernst Christian Vogelgsang Günther Greiner

We present a technique that allows the implementation of a stack on programmable graphics hardware, using textures and fragment shaders. This development enables a whole new class of GPU algorithms, including recursive functions on complex data structures. Kd-tree traversal for ray tracing is demonstrated as an application. The traversal core was integrated into a purely GPU based photorealisti...

2008
Martin Eisemann Christian Woizischke Marcus A. Magnor

Bounding volume hierarchies have become a very popular way to speed up ray tracing. In this paper we present a novel traversal and approximation scheme for bounding volume hierarchies, which is comparable in speed, has a very compact traversal algorithm and uses only 25% of the memory, compared to a standard bounding volume hierarchy.

2016
Yong Wei

Through block cipher method, this paper demonstrates using preorder and post traversal sequence of a binary tree with 64 nodes to implement symmetric encryption/decryption. The different traversal sequences may determine a binary tree, so the method is vulnerable to be attacked. The paper’s further deduction involves improvement using multiple binary trees, so that more secure and efficient sym...

Journal: :Propósitos y Representaciones 2021

Results: nformational identity style has both direct and indirect effect (through the intervening role of mastery goals) on cognitive engagement (P<0.01). Normative an The path from diffuse-avoidant to performance-avoidance goals was excluded fitted model, model predicts 41% engagement. Conclusion: Inorder improve learning, (mental efforts) can be targeted using motivational variables.

2016
Marcus Pinnecke Gunter Saake Sebastian Dorok Sebastian Breß

Management of graph-shaped data gained a momentum to both industry and research. Traversal queries through a graph-shaped dataset are easy to express, and can be efficiently executed using graph databases. High-performance traversals through graphshaped data is claimed to be enabled by native graph storage (i.e., encoding data using graph data structures), and native graph processing (i.e., ope...

2015
Pooja Rai Sandeep Gurung M. K. Ghose Neil F. Johnson Stefan C. Katzenbeisser Fabien A. P. Petitcolas Chi-Kwong Chan L. M. Cheng R. Chandramouli Nasir Memon Jessica Fridrich Miroslav Goljan Dorin Hogea Mehdi Kharrazi Husrev T. Sencar Hung-Ju Lin

Steganography is the technique of hiding data in an appropriate multimedia carrier, e. g. , image, audio, and video files known as Cover. Images are mostly used as the cover medium due to their pervasiveness in different applications and representation with high redundancy. This paper provides a review and analysis of many existing methods for digital image steganography in the spatial as well ...

2011
K. DEEBA

Particle Swarm Optimization is currently employed in several optimization and search problems due its ease and ability to find solutions successfully. A variant of PSO, called as Improved PSO has been developed in this paper and is hybridized with the simulated annealing approach to achieve better solutions. The hybrid technique has been employed, inorder to improve the performance of improved ...

2013

Co-channel interference in Long Term Evolution (LTE) cellular network is caused due to usage of same frequencies between the neighboring cells at the same region. Here the term co-channel interference is otherwise known as inter-cell interference. It is important to mitigate co-channel interference at micro-cells inorder to improve the communication performance of the cellular network. In this ...

2016
S. Venkatesh M. A. Dorairangaswamy

In this paper, we present the privacy of the data protection during the transmission through a network based on stego analysis. The given text data is to be embedded on the image and audio should be encrypted. The data is divided into two parts and one part of data is stored in image and another part of data in the audio. The encryption of the data is done by Chaos Encryption method. Image wate...

2003
Attawith Sudsang Thanathorn Phoka

This paper proposes an approach for computing a sequence of finger repositioning that allows a 4fingered hand to switch from one grasping configuration to another while maintaining a force-closure grasp of a polygon during the entire process. Assuming frictional point contacts, the proposed approach is based on exploring a structure called switching graph. The connectivity of this structure cap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید