Role of Adjacency Matrix in Graph Theory
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Graph theory is an applied branch of the mathematics which deals the problems, with the help of graphs. There are many applications of graph theory to a wide variety of subjects which include Operations Research, Physics, Chemistry, Economics, Genetics, Sociology, Computer Science, Engineering, Mechanical Engineering and the other branches of science. A graph can be represented inside a computer by using the adjacency matrix. We define adjacency matrix and observed based on adjacency matrix. We prove theorem of adjacency matrix and give example. Also draw a graph of adjacency matrix. We derive algorithm to found new adjacency matrix after fusion and fusion for connectedness. Also use fusion algorithm to check the connectedness
Authors and Affiliations
Chiranjib Mukherjee, Dr. Gyan Mukherjee
A Review on Solving ECDLP over Large Finite Field Using Parallel Pollard’s Rho (ρ) Method
Abstract: Elliptic Curve Discrete Log Problem (ECDLP) is the underlying basis of many popular Public Key Scheme like Diffie-Hellman and ElGamal. The strength of such public key schemes is based on the difficulty ofsolvin...
Cryptanalysis and Security Enhancement of a Khan et al.'sScheme
Abstract: Remote user authentication, in which the resources are distributed among the recipients and theyare shared across the network in the form of network services provided by the remote systems. Before supplys...
An Approach for Resource Management by Volunteering Community Cloud for an Educational Use
Abstract : In today’s (Information Technology) IT world, the service providers and the service users playing an important role. So the satisfactions at both the ends are also very important. This is a very common problem...
Artificial Neural Network To Detect Know And Unknown DDOS Attack
The key objective of Disturbed Denial of Service (DdoS) attack is to compile multiple systems across the internet with the infected zombies/agents and form the botnets of network. The infected systems are remotely contro...
Privacy Protection in Personalized Web Search Via TaxonomyStructure
Abstract: Web search engine has long become the most important portal for ordinary people looking foruseful information on the web. User might experience failure when search engine return irrelevanceinformation due to en...