Syntactic analysis of arithmetic expressions for optimizing the operation of programs
Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.
Подобные документы
The adaptive learning algorithm for "extended neo-fuzzy neuron" is proposed, that has both following and smoothing properties and allows to solve problems of prediction, filtering and smoothing of non-stationary disturbed stochastic and chaotic signals.
статья, добавлен 29.07.2016Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
книга, добавлен 08.03.2014Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.
статья, добавлен 25.12.2016- 55. Algorithms of selection of essential features of signals, which are invariant to move and rotation
Development of the mathematical model of invariant image processing in the visual system. The principles of constructing a functional that reaches a maximum when the values of the transformations are equal to the hidden transformations of the signal.
статья, добавлен 22.12.2016 Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.
дипломная работа, добавлен 01.12.2019Higher-level programming language (commonly C, C++, or java) and familiarity with the fundamentals of data structures and algorithms. The study of the theory of computation. A hierarchy of formal language and automata. Limits of algorithmic computation.
книга, добавлен 08.03.2014Особенности создания приложения Windows Foundation Presentation. Разработка приложения-презентации, оперирующего страницами XAML как "слайдами". Анализ модификации приложения Windows Foundation Presentation: работа с решением в Expression Blend.
лабораторная работа, добавлен 24.04.2017Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
книга, добавлен 04.10.2014Method for automated digital image processing. The specialties of the synthesis of automaton, the defining of channels management class of objects. Construction regular expressions to defining a plurality of channels management of software objects class.
статья, добавлен 27.06.2016Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
книга, добавлен 08.03.2014Построение абстрактных машин и определения их характеристик с использованием структур B метода. Проблема детализации и завершимости моделей. Программное обеспечение, с помощью которого создаются абстрактные машины в нотации Abstract Machine Notation.
статья, добавлен 28.02.2016A technique for singular value decomposition of blocks of a cover matrix. Possible results of singular value decomposition operation. Mean values of separatenesses belonging to blocks singular values, received as a result of computing experiment.
статья, добавлен 28.08.2016New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.
статья, добавлен 26.06.2016The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.
статья, добавлен 01.02.2019Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.
книга, добавлен 13.03.2014Development of an algorithm for obtaining a video depth map using the method of image division. Using web cameras to determine the object and calculate the distance to it. Development of software code for streaming video of the experimental setup.
статья, добавлен 13.07.2022Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.
статья, добавлен 08.02.2013The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.
статья, добавлен 04.09.2022Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
книга, добавлен 08.03.2014У даній науковій роботі авторами розглядається задача розробки власного криптографічного метода шифрування шляхом використання допоміжних та вже існуючих засобів розробок. Процес захисту даних відбуватиметься шляхом зміни внутрішньої структури даних.
статья, добавлен 07.04.2023Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation
учебное пособие, добавлен 08.03.2014The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
книга, добавлен 08.03.2014Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.
статья, добавлен 09.08.2022