Modulo Search Trees (Plain and Z-Overlapped)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: This paper exploits the modulo division operation to construct a tree which is termed as Modulo search tree with two versions out of which one is coined as Plain Modulo Search Tree and the other is termed as Z-Overlapped Modulo search Tree . The use of the term Modulo search tree implicitly implies the plain version of the tree. Searching Data in Modulo search tree will have better complexity as compared to the Binary Search tree. But the plain Modulo search tree structure requires more storage space to implement. Albeit, in contrast to the plain version of the Modulo search tree, Z-Overlapped version addresses the issue of extra storage and minimizes the storage requirement. And hence provides a flexibility (with the value of Z) to the implementer to choose a mid path between search time and storage space as and when required.
Authors and Affiliations
Prasad V Chaugule
Text Classification by Augmenting Bag of Words (BOW) Representation with Co-occurrence Feature
Text classification is the task of assigning predefined categories to free-text documents based on their content. Traditional approaches used unigram based models for text classification. Unigram based models suc...
Distinct Revocable Data Hiding In Ciphered Image
Abstract: This scheme proposes a secure and authenticated reversible data hiding in cipher images.Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can bereversibl...
Improved Max-Min Scheduling Algorithm
Abstract: In this research paper, additional constrains have been considered to progress a holistic analysisbased algorithm based on Max-Min algorithm, which work on principle of sorting jobs(cloudlets) based oncom...
Implementation of Various Cryptosystem Using Chaos
Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...
Security Measures in Aodv for Ad Hoc Network
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move a...