Public conveyance system for shortest path nding for real road network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: This article analyzes problems of determining the shortest path and optimal route amongst the given stoppages. The model of the problem is presented as a directional graph, where nodes are pickup points (termedas stoppage point in database) and crossings outside stoppage points and edges are roads among stoppage points and crossings. Each node has some information attached to it: stoppageId, stoppageName, latitude, longitude and numberOfPassengers of the stop, maintenance organizations, and mark(s) of the crossing(s). All pickup points are connected by roads. These roads are considered as the edges of the graph. Edges also have information attached to it: roadId, source, destination, distance, time etc.We have selected Floyd Warshall algorithm to nd the shortest path between two stoppages. This algorithm works in two stages: in rst stage, it nds the shortest path between all stoppages, and in second stage it nds optimized route to visit some of these stoppages. The solution is displayed in the form of shortest distance and time between two locations. The program is written in java language. It uses 3 tables as input from database : nodes, vehicle details and road. This paper gives implementation outcome of Floyd Warshall algorithm to solve the all pairs shortestpath problem for directed road graph system. We have considered an example of a map of Pune
Authors and Affiliations
Agam Mathur , Mayuresh Jakhotia , Anish Lavalekar , Nikita Magar
Performance of Phase Congruency and Linear Feature Extraction for Satellite Images Using Smoothing Algorithm
In computer vision all of the existing researches are interested in synthetic images features extraction. These images contain many types of features. Moreover, the satellite images are one most complex rea...
Automatic Detection of Social Engineering Attacks Using Dialog
Abstract: Cyber attacker target the weakest part of security system which is increasingly the people who use and interact with a computer-based system is the easiest way for cyber attacker to attack the user. A separate...
A survey on context aware system & intelligent Middleware’s
Context aware system or Sentient system is the most profound concept in the ubiquitous computing. In the cloud system or in distributed computing building a context aware system is difficult task and programmer...
Auditing Services in Cloud Computing For Achieving Data Access Control
Cloud computing has a great tendancy of providing robust computational power to the society at reduced cost. The wide adoption of this promising computation model is prevented by security which is the primary...
Improved Brain Extraction Tool using Marker-Controlled Watershed Segmentation
Abstract: MRI head scan images contains some non-brain tissues and it is necessary to remove these non-brain tissues for further processing. The Brain Extraction Tool (BET) is one of the most popular brain segmenta...