Dissertations / Theses on the topic 'Linked list'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 41 dissertations / theses for your research on the topic 'Linked list.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Liu, Yang. "Simulating depth of field using per-pixel linked list buffer." Thesis, Purdue University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1598036.
Full textIn this thesis, I present a method for simulating three characteristics of depth of field image: partial occlusion, bokeh and blur. Retrieving color from occluded surfaces is achieved by constructing a per-pixel linked list buffer, which only requires two render passes. Additionally, per-pixel linked list buffer eliminates the memory overhead of empty pixels in depth layers. Bokeh and blur effect are accomplished by image-space point splatting (Lee 2008). I demonstrate how point splatting can be used to account for the effect of aperture shape and intensity distribution on bokeh. Spherical aberration and chromatic aberration can be approximated using a custom pre-built sprite. Together as a package, this method is capable matching the realism of multi-perspective methods and layered methods.
Tett, Stuart Tosten. "A scripting interface for doubly linked face list based polygonal meshes." [College Station, Tex. : Texas A&M University, 2007. http://hdl.handle.net/1969.1/ETD-TAMU-2121.
Full text劉宗國 and Chung-kwok Albert Lau. "The doubly-linked list protocol family for distributed shared memory multiprocessor systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B3121325X.
Full textLau, Chung-kwok Albert. "The doubly-linked list protocol family for distributed shared memory multiprocessor systems /." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B17590553.
Full textLeung, K. H. W., and 梁海宏. "Implementation and performance evaluation of doubly-linked list protocols on a cluster of workstations." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31223060.
Full textHalverson, Ranette Hudson. "Efficient Linked List Ranking Algorithms and Parentheses Matching as a New Strategy for Parallel Algorithm Design." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc278153/.
Full textDicorato, Pino G. "Hardware linked-list using FPGAs and optical central stage impairments in a sectored packet switch with an optical core (demonstrator)." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27830.
Full textМартиненко, М. В. "Комп’ютерна реалізація структури даних "зв'язний список" в прикладному програмуванні." Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/76432.
Full textSuchaževskaja, Tatjana. "Dinaminės duomenų struktūros ir kai kurių jų algoritmų realizavimas rodyklėmis." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050608_172624-42734.
Full textКучмій, О. О. "Реалізація телефонного довідника на структурах даних "зв’язний список" та "дерево пошуку"." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72256.
Full textHák, Tomáš. "Moderní e-learning systém na platformě JAVA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217504.
Full textFarook, Mohammad. "Fast lock-free linked lists in distributed shared memory systems." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ32107.pdf.
Full textWenige, Lisa [Verfasser], Johannes M. [Gutachter] Ruhland, and Nils [Gutachter] Boysen. "On-the-fly recommendation retrieval from linked open data repositories / Lisa Wenige ; Gutachter: Johannes M. Ruhland, Nils Boysen." Jena : Friedrich-Schiller-Universität Jena, 2019. http://d-nb.info/1177387026/34.
Full textGängler, Thomas. "Semantic Federation of Musical and Music-Related Information for Establishing a Personal Music Knowledge Base." Master's thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-72434.
Full textLinke, Lisa [Verfasser], Günter [Akademischer Betreuer] Köhler, Günter [Gutachter] Köhler, and Pauline [Gutachter] Wimberger. "Charakterisierung, adjuvante Therapie, Nachsorge, progressionsfreies- und Gesamtüberleben von uterinen Karzinosarkomen / Lisa Linke ; Gutachter: Günter Köhler, Pauline Wimberger ; Betreuer: Günter Köhler." Greifswald : Ernst-Moritz-Arndt-Universität, 2018. http://d-nb.info/1170321445/34.
Full textLinke, Lisa Verfasser], Günter [Akademischer Betreuer] [Köhler, Günter Gutachter] Köhler, and Pauline [Gutachter] [Wimberger. "Charakterisierung, adjuvante Therapie, Nachsorge, progressionsfreies- und Gesamtüberleben von uterinen Karzinosarkomen / Lisa Linke ; Gutachter: Günter Köhler, Pauline Wimberger ; Betreuer: Günter Köhler." Greifswald : Ernst-Moritz-Arndt-Universität, 2018. http://nbn-resolving.de/urn:nbn:de:gbv:9-opus-23461.
Full textSchönbrunn, Lisa Christiane [Verfasser], Rolf [Akademischer Betreuer] Wachter, Gerd [Akademischer Betreuer] Hasenfuß, and Dirk [Akademischer Betreuer] Raddatz. "Einfluss einer diabetischen Stoffwechsellage auf die diastolische Funktion des linken Ventrikels / Lisa Christiane Schönbrunn. Gutachter: Gerd Hasenfuß ; Dirk Raddatz. Betreuer: Rolf Wachter." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2011. http://d-nb.info/1042723664/34.
Full textLindel, Lisa [Verfasser], and Dan [Akademischer Betreuer] Rujescu. "Assoziation von Single Nucleotid Polymorphismen im GRM5-Gen mit Schizophrenie und kognitiven Phänotypen / Lisa Lindel. Betreuer: Dan Rujescu." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2012. http://d-nb.info/1031379665/34.
Full textZimmermann, Lisa [Verfasser], Christoph [Akademischer Betreuer] [Gutachter] Herrmann-Lingen, and Wolfgang [Gutachter] Himmel. "Einfluss von Imaginationsübungen bei klimakterischen Beschwerden (IKB) auf menopausale Symptome und die Lebensqualität von Mammakarzinompatientinnen / Lisa Zimmermann ; Gutachter: Christoph Herrmann-Lingen, Wolfgang Himmel ; Betreuer: Christoph Herrmann-Lingen." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2017. http://d-nb.info/112733512X/34.
Full textBeckendorf, Lisa [Verfasser], Wolfgang [Gutachter] Linke, and Raphael [Gutachter] Stoll. "Characterisation of the truncated titin isoform Novex-3 from striated muscle / Lisa Beckendorf ; Gutachter: Wolfgang Linke, Raphael Stoll ; Fakultät für Chemie und Biochemie." Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1165304724/34.
Full textKrech, Lisa [Verfasser], David [Akademischer Betreuer] Zilles, Dirk [Gutachter] Wedekind, Christoph [Gutachter] Herrmann-Lingen, and Nicole von [Gutachter] Steinbüchel-Rheinwall. "Einfluss der Patientenerwartung auf Wirksamkeit und Verträglichkeit der Elektrokonvulsionstherapie / Lisa Krech ; Gutachter: Dirk Wedekind, Christoph Herrmann-Lingen, Nicole von Steinbüchel-Rheinwall ; Betreuer: David Zilles." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2019. http://d-nb.info/1189904578/34.
Full textSouza, Hiale Yane Silva de. "Estudo termoanal?tico da perlita hidrofobizada com ?leo de linha?a." Universidade Federal do Rio Grande do Norte, 2010. http://repositorio.ufrn.br:8080/jspui/handle/123456789/17640.
Full textIn this work, expanded perlite, a mineral clay, consisting of SiO2 and Al2O3 in the proportions of 72.1 and 18.5%, respectively, was used as an adsorbent for oil in its pure expanded form as well as hydrofobized with linseed oil. Thermogravimetry (TG), Derivative Thermogravimetry (DTG) and Differential Thermal Analysis (DTA) were used to study the thermal behavior and quantify the percent adsorption of perlite in differents processes comparing the results with the ones obtained using Gravimetric Analysis. In the process of hydrophobization with linseed oil granulometric fractions > 20, 20-32 and 32-60 mesh were used and adsorption tests with crude oil were performed in triplicate at room temperature. The results obtained by TG/DTG in dynamic atmosphere of air showed mass losses in a single step for the expanded perlite with pure adsorbed oil, indicating that the adsorption of oil was limited and that the particle size did not in this process. Linseed oil has performed well as an agent of hydrophobized perlite (32 to 60 mesh) indicating a maximum percentage of 59.9% and 68.6% the linseed with a fraction range from considering the data obtained by thermogravimetry and Gravimetry, respectively. The adsorption of oil in the expanded perlite and hydrofobized pure perlite with linseed oil did not produce good results, characterizing an increase of 0.5 to 4.6% in pure perlite and 3.3% in hydrofobized perlite with granulometric 32 to 60 mesh
Nesse trabalho a perlita expandida, um argilomineral, constitu?do de SiO2 e Al2O3 nas propor??es de 72,1 e 18,5%, respectivamente foi utilizada como adsorvente para petr?leo na sua forma pura expandida como tamb?m hidrofobizada com ?leo de linha?a. Para isso, utilizou-se a Termogravimetria (TG), a Termogravimetria Derivada (DTG) e a An?lise T?rmica Diferencial (DTA) para estudar o comportamento t?rmico e verificar o percentual de adsor??o da perlita nos processos utilizados, em compara??o com a An?lise Gravim?trica. No processo de hidrofobiza??o com o ?leo de linha?a utilizou-se as fra??es > 20, 20 a 32 e 32 a 60 mesh e os testes de adsor??o com o petr?leo bruto foram realizados em triplicata em temperatura ambiente. Os resultados obtidos por TG/DTG em atmosfera din?mica de ar mostraram perdas de massa em uma ?nica etapa para a perlita expandida pura adsorvida com petr?leo, indicando que a adsor??o de petr?leo foi limitada e que a granulometria n?o interferiu nesse processo. O ?leo de linha?a apresentou bons resultados como agente hidrofobizante da perlita indicando um percentual m?ximo de 59,9% e 68,6% de linha?a na fra??o de 32 a 60 mesh considerando os dados obtidos por Termogravimetria e Gravimetria, respectivamente. A adsor??o do petr?leo na perlita pura expandida e na perlita hidrofobizada com ?leo de linha?a n?o apresentou bons resultados, caracterizando um aumento de 0,5 a 4,6% na perlita pura e 3,3 % na perlita hidrofobizada de 32 a 60 mesh
Malík, Viktor. "Abstrakce dynamických datových struktur s využitím šablon." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363894.
Full textLagerkvist, Love. "Computation as Strange Material : Excursions into Critical Accidents." Thesis, Malmö universitet, Institutionen för konst, kultur och kommunikation (K3), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43639.
Full textChen, Chien-Lung, and 陳建龍. "Adaptive Linked-List Routing Algorithm with Wormhole Mechanism." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/qmggwc.
Full text國立中山大學
電機工程學系研究所
104
Due to Low-Rate Wireless Personal Area Networks(LR-WPANs) is universally used in Internet of Things(IOT) in recent years, Chiu and Wang proposed a linked list routing algorithm with wormhole mechanism. The algorithm includes the manner of construction linked list network, data jumping for routing broken, a new node join mechanism, the manner of construction wormhole network and aim at the modbus protocol as application layer, set up suitable Modbus extension instructions for data collection. It’s an algorithm for IOT data collection. However, there are still a lot of non-adaptive in algorithm. First, on network initialization problem, because exchange address information packet with offline nodes and interrupt nodes which are exchanging address information, nodes must turn on respectively to finish construction network. When numerous nodes existing in network, the algorithm without nodes turn on simultaneously mechanism is non-adaptive. Second, the problem on continuous nodes broken, chain scission nodes will broadcast ask and join packet randomly for adding back to the network. The broadcast storm will be occurred and interference the nodes which are still working on network leads to the collapse of the entire network. Third, on node outliers problem, node exits without stabling routing first will cause data packets loss. Finally is packet processing problem, without planning a complete resend packet queue and establishing packet processing flag, will cause resend packet extracting error and packet race condition. In this paper, we proposed an adaptive linked-list routing algorithm with wormhole mechanism. Included implementation the manner of turn on nodes simultaneously with Lock-address mechanism. Let the initialization of the routing more adaptive in a large number of nodes environment. Then the algorithm proposed the stable chain scission, reset sequentially and cutting timer mechanism for broken nodes determination. So that chain scission nodes can stable routing first then brocast join packet sequentially when continuous nodes broken occurred to avoid broadcast storm and linked error happen. Third we proposed the node outliers mechanism. Nodes will follow the node outliers mechanism to stable routing first, and then executing reset when node in sensoring data abnormally for a long time to avoid data packets loss. Finally, the algorithm planned a complete resend packet queue and established packet processing flag to solve resend packet extracting error and packet race condition. In simulation, the performance of network initialization of adaptive linked-list routing algorithm with wormhole mechanism and flooding is compared and simulated by NS3 in this paper. The simulations results reveal that the initialization of adaptive linked-list routing algorithm with wormhole mechanism is more efficient than flooding when nodes are 5 meters apart and a matrix model of nodes number from 7*7 to 15*15. In the future, we expect that adaptive linked-list routing algorithm with wormhole mechanism not only implement in LR-WPANs environment, also in IEEE802.15.1 or IEEE802.11 etc. protocols. Establish the standard of the algorithm for wireless network data collection.
Lee, Tsung-Lin, and 李宗霖. "Adaptive Linked-List Mechanism For Wi-Fi Wireless Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/nspptj.
Full text國立中山大學
電機工程學系研究所
106
In response to the concept of Smart City and Internet of Things (IoT) being prevailed in recent years, networking requirements for various devices have increased significantly, however, many related problems have arisen. To solve the problems and shortcomings of the existing IoT wireless networking technologies, for example, the data rate of ZigBee is slow and the wireless networking technologies which uses star topology like NB-IoT and LoRa is rely on the signal of base station, if the node is at communication deadzone, it will not be able to successfully transmit data. Therefore, this thesis proposes an Adaptive Linked-List Mechanism For Wi-Fi Wireless Network, this algorithm takes advantage of the low-collision of the linked-list architecture and solves the problem that multiple nodes cannot be started at the same time, moreover, the nodes are able to use signal strength as the basis for constructing a linked-list network that ensure that the nodes within the signal coverage can be stably connected, and the entire system will not be interrupted due to a problem with a few nodes. The algorithm also modifies the linked-list network construction and broken node recovery process, and adds the packet signal strength queue mechanism, so that multiple nodes can quickly construct the network chain. Furthermore, we design a Wi-Fi control board which is based on CC3220MODA and implement our algorithm on it, finally, after testing in different environment, we offer two objective function for two important arguments. We hope to take advantage of this wireless linked-list network in data collection network in the future, and then solve the multi-device networking requirements, and build a stable, reliable and high-speed data collection network for IoT.
Peng, Yi-wei. "Interactive 3D Debugging Information Visualization for Linked-List Data Structure." 2002. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0021-1904200715425065.
Full textChiu, Hong-Wei, and 邱泓瑋. "Rescuing Algorithm for Linked-List Wireless Network with Wormhole Mechanism." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71354134458798253749.
Full text國立中山大學
電機工程學系研究所
104
Due to the concept of Smart City being gradually prevailed in recent years, the wireless routing algorithm for Low-Rate Wireless Personal Area Networks is an important research for data collecting network which is used for managing and collecting the several data in the city. Chiu and Chen proposed an adaptive linked list routing algorithm with wormhole mechanism. The algorithm is a low collision wireless protocol which is suitable for several kinds of data collection systems such as intelligent street lighting, smart meters, smart appliances and other systems. However, the algorithm may cause the unstable transmission because of environmental interference and the inappropriate design of the protocol. In this paper, we proposed a rescuing algorithm for linked-list wireless network with wormhole mechanism to solve the problems in the link-listed network. The algorithm has the efficient method which can collect the information of the isolated nodes which can’t join the network, and choose the urgent one to join the network as the save node rapidly with the advantage of the low collision. The algorithm also designs the mechanism to stabilize the data transmission path and fix the break of commands, tries to make the efficiency of the data collecting not to be affected easily by the environmental interference. In order to make the linked-list network can collect and write the data rapidly with the save nodes, the algorithm also fixes the related commands in the network. We use the network simulation-3 to verify the efficacy of the rescuing algorithm. First, we find that the algorithm can save most of the isolated nodes rapidly with the limited hardware device in the multi-nodes environment. We prove that the rescuing algorithm can solve the routing problem of the linked-list network. Then, we verify that the stable path of the data transmission mechanism can build the better wormhole data path for the packet with max payload. Finally, we simulate the Gather and Scatter commands and find that the linked-list network with the save nodes can completely and rapidly collect and write the multi-nodes data. The result of the simulation tells that the linked-list network with the save nodes can build a stable and rapid data collecting network system.
Yi-wei, Peng, and 彭怡煒. "Interactive 3D Debugging Information Visualization for Linked-List Data Structure." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/90712672856074930954.
Full text國立臺灣師範大學
資訊教育研究所
91
Debugging a complex program may be tedious and difficult. As the size of programs grow, this problem becomes serious. Programmers need effective debugger tools, but current debugging tools are far from their need. Our research uses the techniques of software visualization to visualize the variables and data structures of programs and extends the visualization to a 3D environment to address the scalability problem. Our system named DIVINE (3D Interactive Visualization Environment for Debugging) concentrates on the integration of visualization tool and debugger. DIVINE can be divided into two parts. One is the debugger and the other is the visualization subsystem. The debugger provides a window-based user interface for users to debug a program. The visualization subsystem provides a meaningful visualization to aid debugging for programs with complex linked-list structure. The visualization subsystem creates and displays the debugging information in a 3D graphic environment. Users can use a data glove to interact with DIVINE. Users need not key in debugging commands in the window-based debugger. They use the data glove with particular gestures and some simple keyboard keys to communicate with the debugger. Through the interactive visualization, programmers can facilitate the debugging process.
Kuo, Shan-Chun, and 郭善群. "A Linked-List Difference Histogram Computation Algorithm for Fast Image Processing." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/25539177455645787916.
Full text國立臺灣科技大學
電子工程系
101
Local histogram construction is one of the significant bases in many image processing applications, which efficiently shows the intensity distribution of pixel values. During the past few years, it has aroused increasing interest in image processing and computer vision, and has shown its effectiveness in a number of applications, in particular for video surveillance systems. This paper presents a comprehensive survey of local histogram construction methodology, furthermore, proposes a better histogram construction method and also describes the related embodiments. Experimental results demonstrate that the efficiency of the proposed method in contrast with those of other methods for histogram construction and image processing applications.
Pai, Kai-Chung, and 白凱中. "Linked List Based High Utility Itemsets Mining Using Pattern Growth Method." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/71028669060393819757.
Full text國立中正大學
資訊管理所暨醫療資訊管理所
97
In the past, several researches in frequent pattern mining focused on relative frequent patterns and did not consider the utility of merchandise. Indeed, the property of profit or revenue is also meaningful to business. Methods on mining high utility itemsets, considering profit, do not have anti-monotone property. Considering this problem, Liu et al. proposed the TwoPhase algorithm with anti-monotone property; but, it is based on candidate generation-and-test approach. On the other hand, Erwin et al. proposed CTU-Tree data structure and CTU-Mine algorithm to mine high utility itemsets; however, it is inefficient in traversal the CTU-Tree. In this paper, we develop the double layer index and linked lists method using pattern growth approach to enhance the performance of CTU-Mine. Moreover, the proposed method with the property of anti-monotone and lexicon order in each linked list can quickly find the specific pattern and utilize multi-processing approach to enhance the efficiency both for providing a real insight into business strategy.
Wang, Wen-hsin, and 王汶鑫. "Linked List Routing Algorithm with Wormhole Mechanism for Data Collecting Wireless Network." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/98568314906611664754.
Full text國立中山大學
電機工程學系研究所
102
Due to the development of the Internet of Things(IOT), many communications protocols and routing algorithm used in IOT have been proposed. IOT is composed of numerous wireless embedded systems and its topology changes a lot. How to collect data stably within a short time is an important issue. However, the existing routing protocols are mostly used for data transmission and it’s inefficient if used in data collection with polling manner. Therefore, we proposed a Linked List Routing Algorithm with Wormhole Mechanism for Data Collecting Wireless Network. Using linked list topology to construct a data collecting network, in which data collecting behavior can be completed on the same path so that we can gather data at one time by data fusing operation. Moreover, when the number of node rise, we need a larger neighbor table and routing table to keep routing information correct, it will become a challenge due to the embedded system’s memory. Linked list network has simple routing table and neighbor table, we won’t spend too much time in path finding and it won’t limit by embedded system’s memory so that the extensibility is high. In traditional linked list network, the hop count is a big problem, so we add wormhole in our network to improve data collection efficiency. In our protocol, we develop some function such as how to construct a linked list network, how a new node join network, data routing when link failure and node repair. Besides, we develop an instruction and tell you how to collect data by this instruction. In this paper, we implement the routing protocol to verify a data collection in wireless sensor network. The performance of the Linked List Routing Algorithm with Wormhole Mechanism and AODV is compared and simulated by NS2. The simulation results reveal that the mechanism is more efficient than AODV. In the future, we expect that our proposed routing protocol can be used in health monitoring in hospital and sanatorium or power monitoring.
Lin, Yue-Wei, and 林岳威. "Searching the Optimal Data Imputation Method for Missing Values of Vehicle Detector Using Linked List." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/18897154871480374324.
Full text國立中央大學
土木工程研究所
100
To search for the optimal imputation of Vehicle Detector, this paper using the Data Structure-Linked Lists to search the optimal solution of imputation of Vehicle Detector. We have to establish three the essential VD Lists and the numbers of data imputation Lists. Using the Lists to find the optimal solution of missing values VD. First, use the 35 VD to establish the original VD Lists and copy the data of the original VD Lists to establish another List, it’s call data complete lists. Then we input the VD of missing values to delete VD of data complete lists, at the same time, use the VD of missing values to establish missing data lists. And then using combination of statistics of data complete lists to find the imputation mode, MAPE use the random to decide. Use the imputation mode to establish the numbers of data imputation Lists. Finally , we can search the local optimal solution from the data imputation Lists, and find the optimal solution from those local optimal solution. The result showed that every VD of missing value the local optimal solutions MAPE are 5%, because the imputation mode is too much and the MAPE is random to decide. But we have to find the optimal solution of missing value VD, so according to Literature, we choose the most VD imputation Data is optimal solution.
Lin, Guan-An, and 林冠安. "Use of an Automated Cognitive Mentor for Learning Basic Linked List Concepts - A Preliminary investigation." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/p9zju3.
Full text中原大學
資訊工程研究所
105
For novices, it is a great challenge to learn to program, especially when there are arrays, records and/or linked lists involved. Concepts of arrays, records, and linked lists are not so easy to grasp, making it hard for novices to come up with correct programs. This is especially the case with linked lists. When novices learn new concepts, they may form misconceptions. These misconceptions not only make the construction of programming knowledge difficult but also hinder their learning of subsequent programming concepts. To help novices correct their misconceptions, the use of direct teaching may not be very helpful. A better way of helping novices to correct their misconceptions may be to use Socratic dialogues. When conducting a Socratic dialog with a novice, it is important that the novice must find his/her misconceptions all by him/herself. That is, only the necessary guidance is given, so that the novice will find contradictions in his/her reasoning, which is then followed by necessary corrective measures, again with the help of further guidance. To use Socratic dialogs, however, there is a big problem that must be overcome, and the problem has to do with the fact that a teacher can handle only one student at a time. When there are many (say, 40 or even 80) students that need to be helped, the teacher will have problems using Socratic dialogs to help them. One solution to this situation is to use a computer system with embedded dialogs in it. Whenever the user (a student) gives an input to the system, the system always have a pre-designated answer for it, an answer that is reminiscent of a Socratic-styled answer. In this thesis, we investigate the use of such a computerized approach to help students correct their misconceptions of linked list processing. We focus on a very narrow domain - the domain of linked list traversal, node deletion, and node insertion, and we prove that our approach is somewhat effective in helping learners correct their misunderstandings.
Ni, Jia-De, and 倪嘉德. "Hardware/Software Codesign and Implementation of a Linked-List-based Hough-Transform Algorithmic Processor for Line Detection." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3tbq4z.
Full text國立臺灣科技大學
電子工程系
106
This thesis is related to the hardware/software codesign and implementation of a linked-list-based Hough-transform algorithmic processor for line detection. The research includes four parts: The first part is to analyze the property of the algorithm and, after considering that the embedded systems have limited memory resources, a linked-list-based Hough-transform algorithm for line detection has been developed. Also the C language is used to write the program for implementing and verifying the proposed algorithm. The second part is to design and develop a linked-list-based Hough-transform algorithmic processor for line detection. This algorithmic processor consists of a control unit, a source data buffer, a valid-pixel logic, a coordinate-and-address generator, a Hough-parameter generator, and a linked-list-based Hough-transform algorithmic subprocessor. The algorithmic processor is integrated onto a SOPC-based chip and implemented on an Altera FPGA development board. The third part is about the hardware/software codesign of a linked-list-based Hough-transform algorithmic processor for line detection. Software and driver programs are developed by using the NIOS II integrated development environment to verify and analyze the function of this algorithmic processor. The fourth part is to evaluate the performance of the algorithm and the algorithmic processor. In conclusion, the goal of this thesis is: (1) to develop a linked-list-based Hough-transform algorithm for line detection; (2) to finish the hardware/software codesign and implementation of the HT-based algorithmic processor. Finally, by implementing this algorithmic processor on an FPGA development board, both the modified algorithm and the related algorithmic processor are proved to be more memory-efficient and have better performance.
Yao, Zhenhua, Jian-Sheng Wang, and Min Cheng. "Improved O(N) neighbor list method using domain decomposition and data sorting." 2003. http://hdl.handle.net/1721.1/3884.
Full textSingapore-MIT Alliance (SMA)
Hu, Che-Wei, and 胡哲維. "A Study on Edge Detection by Using the Chained Linked List Structure and Its Application for Information Hiding." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/14141037155233139852.
Full text國立臺中技術學院
多媒體設計研究所
94
Edge detection is a very important technique in the domain of image processing and computer vision. Because edge detection is useful in applying to image segmentation and object detection. An edge detection method based on Minimum Spanning Tree (MST) was published in 2005. The edge detection of MST method can produce better image quality than gradient operators. An information hiding algorithm based on Pixel-value Differencing (PVD) was announced in 2005. It can hide the secret data within the difference of two neighboring pixels. Afterward a new information hiding algorithm was issued in 2005. The new algorithm is based on combine PVD and Least Significant Bit (LSB). It can increase plenty of capacities more than the PVD algorithm. This study provides an edge detection method by chained linked-list. After compared to MST method, the proposed of the present study method has better time efficiency in processing speed. And the proposed method can detect the edge and the area of plain, it can reduce noises in the area of plain. In addition, CLL can be applied to information hiding, called Dynamic LSB by Edge Detection (DLED). DLED can determine the bits of LSB dynamic to improve hiding capacity and image quality. In current research, it is found that DLED can hide more secret data than PVD and others.
Nagoor, Omniah H. "Image-based Exploration of Large-Scale Pathline Fields." Thesis, 2014. http://hdl.handle.net/10754/321000.
Full textPorter, Donald E. "Operating system transactions." Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-12-2488.
Full texttext
Fomitchev, Mikhail. "Lock-free linked lists and skip lists /." 2003. http://gateway.proquest.com/openurl?url%5Fver=Z39.88-2004&res%5Fdat=xri:pqdiss&rft%5Fval%5Ffmt=info:ofi/fmt:kev:mtx:dissertation&rft%5Fdat=xri:pqdiss:MQ99307.
Full textTypescript. Includes bibliographical references (leaves 224-226). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL:http://gateway.proquest.com/openurl?url%5Fver=Z39.88-2004&res%5Fdat=xri:pqdiss&rft%5Fval%5Ffmt=info:ofi/fmt:kev:mtx:dissertation&rft%5Fdat=xri:pqdiss:MQ99307
Hsu, Kuo-Hua, and 徐國華. "Addition of Arrays, Records and Linked Lists to a Visual Coding System – Some Issues and Solutions." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/09538693502205138421.
Full text中原大學
資訊工程研究所
99
For most novices, learning to write a program is a very difficult challenge, especially when arrays, records, or linked lists are used in the program. These data types are more complex. Therefore, students may not fully understand how to process such data structures. In order to solve this problem, a visual coding system was developed to help students learn the use of arrays, records, and linked lists. In this thesis, we describe how the system works and we also discuss about the design and implementation of this system. We first examine the differences between visual coding systems, visual programming systems, program visualization systems and interface builders. This is followed by a discussion about existing research on visual programming, program visualization and visual coding. The discussion focuses on issues and solutions as related to how arrays, records, and linked lists are presented and operated upon. By using a questionnaire, students’ reaction toward the potential usefulness of this system was solicited and presented as a survey result. The survey result shows that the use of this visual coding system for writing programs helped them better understand the working of programs; this system also helped them develop the understanding of the concepts of array and record. However, only few students agree that this system can be used as a substitute for traditional textual programming systems for writing programs. The survey result is in line with the role of the system. It also confirms that the use of visual coding does help students to better understand the concepts of array and record.