slugSHORTEST PATH ALGORITHMS: A COMPARATIVE ANALYSIS
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 4
Abstract
Now a days routing is the vital problem while forwarding information from one node to another node in communication networks. Routing in today’s network is accomplished by shortest path routing algorithm. There are different algorithms for finding paths in the network. The studied algorithms are Bellmen Ford’s, Dijkstra’s algorithm, Floyd algorithm and Johnson’s algorithm. In search algorithms, when a number of nodes get increased in the network, then the number of searches and complexity of the search algorithm also get increased. In this paper, analysis/comparison of shortest path algorithm is being done and it has been concluded that researchers have got remarkable success in designing better algorithms in the terms of space & time complexity to solve shortest path algorithms.
Authors and Affiliations
R. Kiruthika and Dr. R. Umarani
slugMANAGEMENT OF NON-PERFORMING ASSETS A STUDY OF INDIAN PUBLIC SECTOR BANKS
A mounting level of NPA's in the banking sector can severely affect the economy in many ways. If NPA's are not properly managed, it can cause financial and economic degradation which in turn signals an adverse investme...
Role of Mobile computing in developing technologies
Mobile computing has changed the complete panorama of our everyday lifestyles. It is fitting most important due to the upward thrust within the number of transportable computer systems and the wish to have steady commu...
VISUAL CRYPTOGRAPHIC STEGANOGRPHY IN IMAGES
In the multimedia steganocryptic system, the message will first be encrypted using public key encryption algorithm, and then this encrypted data will be hidden into an image file thus accomplishing both data encoding a...
slugIncorporating security into Web Applications - An Aspect oriented approach
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web appli...
A Novel Parameter Management Approach for Remote Cancelable Biometrics
Protecting biometric information is key concern in biometric systems, since physical characteristics such as fingerprint, irises, face and vein patterns cannot be changed or revoked like passwords. As a solution to thi...