Syntactic analysis of arithmetic expressions for optimizing the operation of programs
Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.
Подобные документы
Improved algorithm for object tracking is for using as part of the machine vision system of image acquisition and processing capable mobile robots. Classical implementation of normalized cross-correlation for face tracking. Experimental results.
статья, добавлен 01.02.2013A new algorithm for parallel fault simulation of VLSI on multicore workstations with common memory was proposed. The results of computational experiments on ISCAS-89 benchmarks circuits, which are obtained on the 12-core workstation, were reported.
статья, добавлен 28.02.2016A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.
статья, добавлен 26.06.2016The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
статья, добавлен 23.02.2016Linear Programming is concerned with maximizing or minimizing an equation over certain criteria. Mixed Integer Linear Programming: Techniques for Solving, Contribution of the Project, Solving Using Branch. Schematic for Branch and Cut algorithm.
научная работа, добавлен 09.10.2012Знаходження користувачем існуючих програмних систем, які відповідають критеріям пошуку. Вивчення переваг та недоліків розважальних інформаційних порталів та форумів. Відновлення вимог (reverse engineering) за програмою для обраної предметної області.
лабораторная работа, добавлен 07.02.2014The issue of many public key cryptosystems and application of embedded devices for this setup. Present an algorithm that also inherently thwarts differential side-channel attacks in finite abelian groups with only limited time and storage overhead.
статья, добавлен 15.09.2012A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
книга, добавлен 08.03.2014Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
статья, добавлен 27.12.2016Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
статья, добавлен 27.05.2021Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.
дипломная работа, добавлен 30.08.2016The characteristics and features of the topic model in the form of stochastic matrices, their purpose and application. Creation and distinctive features of the new algorithm to build a Sub-hierarchy Galois, the specificity of the visualization tools.
курсовая работа, добавлен 21.06.2016Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
книга, добавлен 08.03.2014- 39. Representing Complex Data Using Localized Principal Components with Application to Astronomical Data
Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.
учебное пособие, добавлен 08.02.2013 Description of the developed energy saving algorithm for autonomous heating systems installed in heated premises. Determination of the moment of switching on for the transition to the specified nominal temperature after maintaining the set temperature.
статья, добавлен 03.12.2018The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.
статья, добавлен 18.09.2018Development of tools aimed at maximising the efficiency of the competition of Kaggle. Approbation of a new modified knn algorithm, which allows to obtain more accurate results for classification problems, to participants Of kaggle competitions.
дипломная работа, добавлен 01.12.2019Development of an algorithm for identifying potential clients of factoring services based on information from databases of Russian banks. Its implementation in the VBA programming language. Recommendations for improving the efficiency of sales staff.
дипломная работа, добавлен 01.12.2019This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.
статья, добавлен 26.10.2020The presenting online system for symbolic differentiation that calculate derivatives. The trees are used for representation of formulas. Derivatives are generated by tree transformations. Presented algorithms are part of the microsystems simulator Dero.
статья, добавлен 10.05.2018A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
книга, добавлен 08.03.2014The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.
монография, добавлен 08.03.2014The main types of noise and filters that remove them from the image and analyze the apparent differences in the distribution of the image (using the watershed algorithm). Choosing the best filter to use when working with the watershed algorithm.
статья, добавлен 14.01.2017An overview of machine learning applications for analyzing genome data. Molecular medicine and gene therapy. DNA and RNA are mobile genetic elements. Possible applications of transposons. Cross check software algorithm. Recognition of relocatable items.
дипломная работа, добавлен 10.12.2019Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.
статья, добавлен 22.12.2016