Syntactic analysis of arithmetic expressions for optimizing the operation of programs
Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.
Подобные документы
Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.
книга, добавлен 15.09.2012The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.
статья, добавлен 06.06.2023The design of a von Neumann architecture machine. A stored-program digital computer. Development of the stored-program concept. Early von Neumann-architecture computers. Von Neumann bottleneck. Features of Von Neumann Architecture. Arithmetic Logic Unit.
презентация, добавлен 25.10.2017- 79. Bioinformatics
Biological Data in Digital Symbol Sequences. Machine-Learning Foundations: The Probabilistic Framework. Probabilistic Modeling and Inference. Machine Learning Algorithms. Hidden Markov Models and probabilistic Models of Evolution: Phylogenetic Trees.
учебное пособие, добавлен 25.11.2013 Изучение основ работы с Genetic Algorithm в MatLAB, исследование экстремумов функций с помощью генетических алгоритмов без включения операции мутации и кроссовера с установлением параметров Crossover fraction из вкладки Reproduction в 1.0 и в 0.
лабораторная работа, добавлен 28.12.2016A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
статья, добавлен 28.10.2020Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
курс лекций, добавлен 08.03.2014Systolic tree structure. Pattern mining operations. Throughput and cost effective performance are the highlights of the systolic tree based reconfigurable architecture. Frequently occurring item sets in databases. Weighted Association Rule Mining.
статья, добавлен 30.08.2016Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.
статья, добавлен 30.04.2018Программы векторной графики, их характеристика: Corel Draw 8-9, Adobe Illustrator 6, Micrografx Designer 7, Macromedia FreeHand 7, Corel Xara 1.5, Canvas. Fractal Design Expression. Принципы построения графических объектов. Векторная графика в интернете.
курсовая работа, добавлен 09.03.2012A structured language as one of a variety of programming possibilities. Unions, enumerations, and user-defined types systems the standard function library. Exception handling and miscellaneous classes. An object-oriented expression parser in program.
учебное пособие, добавлен 08.03.2014The replacement of the distribution of probable landmark locations, obtained from each local detector, with simpler parametric forms. Extensions to handle partial occlusions and reduce computational complexity. Algorithm regularized landmark mean-shift.
статья, добавлен 24.12.2016A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.
дипломная работа, добавлен 28.08.2016Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.
статья, добавлен 26.10.2016The goal of the paper is to obtain a system of target operation indicators, which provide unique identification of the system process with the ability to solve structural and parametric optimization problems in the framework of the controlled system.
статья, добавлен 30.10.2016Ассоциативные правила. Алгоритм Apriori. The FP-Growth Algorithm. Обобщенные ассоциативные правила. Определение и применение таксономии. Алгоритм вычисления обобщенных ассоциативных правил. Обработка данных в Python. Поиск артикула товара и запись в файл.
дипломная работа, добавлен 30.08.2016Creating a new table structure with the table wizard. Changing a table design from the relationships window. Using the spelling checker and autocorrect. Getting help from the expression builder. Assigning or changing permissions and ownerships.
книга, добавлен 19.03.2014Alan Mathison Turning - an English computer scientist, mathematician, cryptanalyst. He was highly influential in the development of theoretical computer science, providing a formalisation of the concepts of algorithm, computation with the Turing machine.
презентация, добавлен 29.03.2016Общий обзор программ векторной графики. Принципы работы Corel Draw 8-9, Adobe Illustrator 6, Micrografx Designer 7, Macromedia FreeHand 7, Corel Xara 1.5, Canvas 5, Fractal Design Expression. Сравнения характеристик программ. Применение векторной графики.
курсовая работа, добавлен 10.03.2010Исследование методов, использующих оптимальность по Парето на основе генетических алгоритмов. Описание преимуществ метода SPEA (Strength Pareto Evolutionary Algorithm) и SPEA2 по отношению к другим наиболее часто применяемым методам VEGA, FFGA, NSGA.
статья, добавлен 27.07.2017Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.
статья, добавлен 14.01.2017Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
статья, добавлен 25.03.2016Theory of condensation growth of aerosol particles under saturation conditions. Mathematical description of heat and mass transfer processes. The structure of mathematical models and the algorithm of pollution dynamics modeling in "clean rooms".
статья, добавлен 26.06.2016Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.
научная работа, добавлен 15.09.2012