Search alternatives:
tree » three (Expand Search)
Showing 1 - 20 results of 42 for search 'complex binary tree', query time: 0.13s Refine Results
  1. 1

    Parallel construction of binary tree based on sorting by Ya. E. Romm, D. A. Chabanyuk

    Published 2018-12-01
    “…An efficient parallel algorithm for constructing a binary tree based on the address sorting with time complexity of T(N2) = O(log2 N) is obtained. …”
    Get full text
    Article
  2. 2

    Classification of biomedical lung cancer images using optimized binary bat technique by constructing oblique decision trees by Shobha Aswal, Neelu Jyothi Ahuja, Ritika Mehra

    Published 2025-05-01
    “…In this paper, we propose a novel structural formation of the oblique decision tree (OBT) using a swarm intelligence technique, namely, the Binary Bat Swarm Algorithm (BBSA). …”
    Get full text
    Article
  3. 3
  4. 4

    Optimizing Image Watermarking with Dual-Tree Complex Wavelet Transform and Particle Swarm Intelligence for Secure and High-Quality Protection by Abed Al Raoof Bsoul, Alaa Bani Ismail

    Published 2025-01-01
    “…In this research, we propose an optimized image watermarking approach that utilizes the dual-tree complex wavelet transform and particle swarm optimization algorithm. …”
    Get full text
    Article
  5. 5

    A nonrevisiting genetic algorithm based on multi-region guided search strategy by Qijun Wang, Chunxin Sang, Haiping Ma, Chao Wang

    Published 2024-11-01
    “…The search history is stored in a binary space partition (BSP) tree, where each searched solution is assigned to a leaf node and corresponds to a search region in the search space. …”
    Get full text
    Article
  6. 6

    Scaled Fenwick Trees by Matthew Cushman

    Published 2023-01-01
    “…Two solutions to this problem are well-known: Fenwick trees (also known as Binary Indexed Trees) and Segment Trees. …”
    Get full text
    Article
  7. 7

    Geodesic Dominated Coloring of Graphs by M. Paruvatha Vathana, R. Jayagopal

    Published 2025-01-01
    “…As part of our contributions, we determine the exact values of the geodesic dominated chromatic number for various graph structures, such as cycle, hypermesh, complete binary tree, sibling tree, and hypertree.…”
    Get full text
    Article
  8. 8

    Generating Encrypted Document Index Structure Using Tree Browser by Doaa N. Mhawi, Haider W. Oleiwi, Heba L. Al-Taie

    Published 2023-06-01
    “…This method represents the keywords in a variable-length binary format before being stored in the index. This binary format provides additional encryption to the information stored and reduces the index size. …”
    Get full text
    Article
  9. 9

    Improved Quantum Query Upper Bounds Based on Classical Decision Trees by Arjan Cornelissen, Nikhil S. Mande, Subhasree Patro

    Published 2025-06-01
    “…This answers a question posed by Lin and Lin, who asked whether the guessing complexity of a decision tree is related to any complexity-theoretic measure. …”
    Get full text
    Article
  10. 10

    Performance Comparison of Random Forest and Decision Tree Algorithms for Anomaly Detection in Networks by Rafiq Fajar Ramadhan, Wahid Miftahul Ashari

    Published 2024-11-01
    “…From the study result, it can be conclude that the Decision Tree algorithm performs better in detecting anomalies in binary data with an accuracy of 99,71%. …”
    Get full text
    Article
  11. 11

    A comparative study of machine learning and deep learning models in binary and multiclass classification for intrusion detection systems by Ayesha Alharthi, Meera Alaryani, Sanaa Kaddoura

    Published 2025-07-01
    “…Network infrastructure evolution has significantly expanded the attack surface, leading to increasingly complex and sophisticated cybersecurity threats. Traditional rule-based intrusion detection systems (IDS) often fail to detect emerging attack vectors, prompting the need for intelligent, data-driven approaches. …”
    Get full text
    Article
  12. 12

    Network-based intrusion detection using deep learning technique by Muhammad Farhan, Hafiz Waheed ud din, Saadat Ullah, Muhammad Sajjad Hussain, Muhammad Amir Khan, Tehseen Mazhar, Umar Farooq Khattak, Ines Hilali Jaghdam

    Published 2025-07-01
    “…Abstract A high growth rate in network traffic and the complexity of cyber threats have made it necessary to create more effective and flexible intrusion detection systems. …”
    Get full text
    Article
  13. 13

    Shape Penalized Decision Forests for Imbalanced Data Classification by Rahul Goswami, Aindrila Garai, Payel Sadhukhan, Palash Ghosh, Tanujit Chakraborty

    Published 2025-01-01
    “…This paper introduces Shape Penalized Decision Forests, a novel classifier tailored for imbalanced binary classification. Our method integrates a penalty on the surface-to-volume ratio of decision sets within decision tree construction, thereby inherently addressing class imbalance without additional sampling. …”
    Get full text
    Article
  14. 14

    Bridging the Gap: Limitations of Machine Learning in Real-World Prediction of Heavy Metal Accumulation in Rice in Hunan Province by Qing-Qian Peng, Xia Zhou, Hang Zhou, Ye Liao, Zi-Yu Han, Lu Hu, Peng Zeng, Jiao-Feng Gu, Rong Zhang

    Published 2025-06-01
    “…Cadmium (Cd) pollution poses a severe threat to rice safety and human health, while traditional linear models exhibit significant limitations in predicting rice Cd accumulation due to environmental complexities. This study systematically evaluated the predictive performance of Random Forest (RF), Gradient Boosting Decision Tree (GBDT), and Residual Neural Networks (ResNet), using a multi-source soil–rice dataset comprising 57,200 samples from Hunan Province. …”
    Get full text
    Article
  15. 15
  16. 16

    Advanced GPU Techniques for Dynamic Remeshing and Self-Collision Handling in Real-Time Cloth Tearing by Jong-Hyun Kim, Jung Lee

    Published 2025-01-01
    “…We also present a method to optimize kernels based on a complete binary tree in arbitrary triangular meshes, improving performance. …”
    Get full text
    Article
  17. 17

    Analysis of Redundant Structure of Highly Reliable Train Communication Network Based on Ladder Topology by Tao GUO, Ping SHEN, Lide WANG, Xiaobo NIE, Jie JIAN

    Published 2020-03-01
    “…A highly reliable ladder redundant structure networking scheme applied to train communication network was constructed, and the fault protection and redundant switching mechanism of the network were analyzed. For complex TCN such as ladder networks, a simplified dynamic fault tree analysis(DFTA) method based on K-terminal connectivity detection was proposed, and a binary decision diagram(BDD) was used to simplify the fault tree calculation process. …”
    Get full text
    Article
  18. 18

    Research on feature extraction and intelligent diagnosis method of reciprocating compressor bearing clearance fault by Feng Yan

    Published 2025-06-01
    “…To overcome the shortcomings of traditional binary tree support vector machine (BTSVM) classifiers—such as slow convergence and error accumulation due to early misclassifications—an enhanced BTSVM model is introduced to reduce error propagation. …”
    Get full text
    Article
  19. 19

    Design of Onboard Shunting Protection Software for Metro Engineering Vehicles Based on BeiDou Satellite Positioning System by LIU Hao, ZHANG Xu, YU Hechun

    Published 2023-08-01
    “…The shunting protection software uses safety computer platform tools, adopts modular design, and makes comprehensive use of the BeiDou satellite positioning system, beacon positioning system, computer-based interlocking system and binary tree theory to realize precise protection of metro engineering vehicles in shunting operation, effectively solve the safety risks in the operation process, and improve the safety of the metro engineering vehicles in shunting operation. …”
    Get full text
    Article
  20. 20

    A Comparison of Machine Learning Algorithms for Predicting Alzheimer’s Disease Using Neuropsychological Data by Zakaria Mokadem, Mohamed Djerioui, Bilal Attallah, Youcef Brik

    Published 2024-12-01
    “…Binary classification tasks focused on CNvsAD and CNvsMCI subsets, while multiclass classification used the full dataset (TriClass). …”
    Get full text
    Article