Downloads: 12 | Views: 183 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3
Research Paper | Computer Science | India | Volume 12 Issue 8, August 2023 | Popularity: 5.6 / 10
Analysing Efficiency and Time Complexity of AVL Tree Re-balancing during Value Insertion
Himansh Chitkara
Abstract: This research paper experimentally models the efficiency of an AVL (Adelson-Velskii and Landis) Tree in re-balancing itself during the insertion of values, focusing on its time complexity. The study demonstrates a logarithmic relationship between the time required for insertion and re-balancing operations in the AVL Tree. Through empirical analysis, the paper provides valuable insights into the performance characteristics of AVL Trees and their suitability for handling large data sets. The findings highlight the effectiveness of AVL Trees in maintaining balance and optimizing insertion operations, contributing to the understanding of efficient data structures.
Keywords: Binary Tree, AVL Tree, Efficiency, Time Complexity, Re-balancing, Insertion Operations, Node, Balancing Algorithms
Edition: Volume 12 Issue 8, August 2023
Pages: 1078 - 1089
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Research Paper, Computer Science, India, Volume 10 Issue 5, May 2021
Pages: 632 - 637Network Analysis of AODV and AOMDV Routing Protocols for MANET
K. Divya, B. Srinivasan
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
New Innovation and Idea, Computer Science, India, Volume 11 Issue 6, June 2022
Pages: 401 - 404A Trust Based Mechanism for Preventing Noncooperative Eaves Dropping in WSN
C. Nithya Praba, Dr. D. Kalaivani
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science, Malawi, Volume 12 Issue 4, April 2023
Pages: 257 - 261Secure and Efficient Data Transfer in AODV Routing Protocol Using RSA Encryption
Chatheka Ngazi Mangazi, Dr. Glorindal Selvam
Downloads: 6 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Research Paper, Computer Science, India, Volume 13 Issue 5, May 2024
Pages: 767 - 770Establishing a Secure File Transfer Using Hybrid Cryptography and LSB Stenographic Techniques
K Annsheela, S Habeeb Mohamed Sathak Amina
Downloads: 56 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science, India, Volume 10 Issue 2, February 2021
Pages: 199 - 201Identification of Hidden Exposed Nodes and Solving Hidden Exposed Problem Using MAC Protocols in AD-HOC Networks
Ch. Srilatha, T. Mohana Kumari