SHORTEST PATH ALGORITHMS: A COMPARATIVE ANALYSIS
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 4
Abstract
Now a days routing is the vital problem while forwarding information from one node to another node in communication networks. Routing in today’s network is accomplished by shortest path routing algorithm. There are different algorithms for finding paths in the network. The studied algorithms are Bellmen Ford’s, Dijkstra’s algorithm, Floyd algorithm and Johnson’s algorithm. In search algorithms, when a number of nodes get increased in the network, then the number of searches and complexity of the search algorithm also get increased. In this paper, analysis/comparison of shortest path algorithm is being done and it has been concluded that researchers have got remarkable success in designing better algorithms in the terms of space & time complexity to solve shortest path algorithms.
Authors and Affiliations
R. Kiruthika and Dr. R. Umarani
Forensic Tools Matrix: The Process of Computer Forensic for Digital Evidence Collection
Cyber crime is in limelight due to increasing use of computer and its networks in day to day activity. As computer networks is heavily use not only for information exchange but financial and private data are also trans...
4G WIRELESS NETWORKS: BENEFITS AND CHALLENGES.
The era of new wireless communications is upon us. Eventually it will penetrate into our daily life and change the way we live just like many technological innovations whose original research came from the military nee...
OPTIMISING HEAT GAIN BY BUILDING MATERIALS THROUGH LANDSCAPE ELEMENTS
Urban areas present distinctive micro climates. In the study of causes of the special climate in cities, it is reported that ―The total transformation of natural landscape into houses, streets, squares, big public buil...
Kerberos Authentication Protocol Modeling Using NUSMV Model
Authentication is one of the biggest problem related to computer information security in the area of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder protoco...
INTEGRATION OF EC & IC ENGINE’S WORKING.
It is known that when any kind of fossil fuel is burnt two phenomenons take place (i) Explosion and (ii) Heat generation. In the concept that is stated it is desired to merge the functioning of External Combustion (EC)...