An Alternate Way Of Implementing Heuristic Searching Technique
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
This work was carried out to explore the use of different data structure for heuristic search algorithm which can result in better performance with respect to time. The commonly used data structure Generalized Link List (GLL) and proposed use of data structure Multi Leveled Link List (MLL) schemes are presented in this paper. This scheme is more intended for better utilization of system resources. Almost all the heuristic algorithms have to maintain the list, which are to be added, updated and processed. Here different lists are maintained and operated upon simultaneously. Maintaining these lists simultaneously is not only tedious but complex too. The use of MLL will reduce this complexity. The paper aims at presenting the method for effective use of system resources without compromising on the optimality of the algorithm.
Authors and Affiliations
Mr. Girish P Potdar, Dr. R C Thool
Indoor positioning and Navigation using Light sensor
Indoor positioning systems now a days got an extensive popularity. These systems have been successfully used in many applications such as asset tracking and inventory management. In this work we describes a novel lig...
Energy Efficient Group Key Management (EEGK) for Secure Data Processing in Ad Hoc and WSN Networks
WMNs have been in recent times recommended as a capable low-cost approach to provide last-mile high-speed Internet access. A typical WMN is a multihop hierarchical wireless network. A major challenge in formulating s...
Merits and Demerits of Open Source Software
Open source software (OSS) is one of the fastest growing movements towards the less budget and cheaper software. Within the technical development of the world, yet we have seen that OSS will become a viable alternati...
Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure
A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although usi...
Analysis of Face Recognition using PCA and Neural Networks
Face Recognition System could be a laptop application that is employed to spot or verify someone during a digital image, supported digital image process and is a vigorous space of analysis. The Face Recognition Syste...