M. Yamuna* et al. /International Journal of Pharmacy & Technology

Size: px
Start display at page:

Download "M. Yamuna* et al. /International Journal of Pharmacy & Technology"

Transcription

1 ISSN: X CODEN: IJPTFI Available Online through Research Article FINDING CRITICAL PATH OF A NETWORK USING MODIFIED DIJKSTRA S ALGORITHM Shantan Sawa, Shivangee Sabharwal, Purushottam Chandra, M. Yamuna* VIT University, Vellore, Tamilnadu myamuna@vit.ac.in Received on Accepted on Abstract Critical path method is used to estimate the duration of the critical path in a network of activities. The critical path denotes the longest path taken by the activities to complete, therefore it gives the maximum duration of the project of which the network diagram is made. In this paper, we aim to replace the typical traditional critical path method by a modified Dijkstra s Algorithm, to find the critical path. The proposed method involves the computation of a critical path without iterative calculations and is less time consuming. The proposed method is efficient as it provides the optimum critical path in all cases. The paper introduces a new method to find a critical path. The paper elucidates the critical path method and the modified Dijkstra s algorithm. Keywords: Critical path, Critical path method (CPM), Dijkstra s Algorithm, Network activity diagram, Optimized path, Reduction. Introduction Dijkstra s algorithm is an algorithm that finds the shortest path between that node and every other. It can also be used for finding the shortest paths from a single node to a single destination node by stopping the algorithm once the shortest path to the destination node has been determined [ 1 ]. One of the main reasons for the popularity of Dijkstra s Algorithm is that it is one of the most important and useful algorithms available for generating (exact) optimal solutions to a large class of shortest path problems. The point is that the shortest path problem is extremely important theoretically, practically, as well as educationally[ 8 ]. The Dijkstra s algorithm consists of n iterations. If all vertices have been visited, then the algorithm finishes; otherwise, from the list of unvisited vertices we have to choose the vertex which has the minimum (smallest) value at its label (At the beginning, we will choose a starting point s). After that, we will consider all neighbours of this vertex IJPT Sep-2016 Vol. 8 Issue No Page 16472

2 (Neighbours of a vertex are those vertices that have common edges with the initial vertex) [ 9 ]. There have been multiple algorithms designed since to find the shortest distance between two points in a graph, but at the bedrock of those algorithms, Dijkstra s algorithm is ubiquitous and deployed [ 3 ]. The traditional Dijkstra s algorithm is as follows: Let the node at which we are starting be called the initial node. Let the distance of node Y be the distance from the initial node to Y. Dijkstra's algorithm will assign some initial distance values and will try to improve them step by step [ 2 ]. 1. Assign to every node a tentative distance value: set it to zero for our initial node and to infinity for all other nodes. 2. Set the initial node as current. Mark all other nodes unvisited. Create a set of all the unvisited nodes called the unvisited set. 3. For the current node, consider all of its unvisited neighbours and calculate their tentative distances. Compare the newly calculated tentative distance to the current assigned value and assign the smaller one. For example, if the current node A is marked with a distance of 6, and the edge connecting it with a neighbour B has length 2, then the distance to B (through A) will be = 8. If B was previously marked with a distance greater than 8 then change it to 8. Otherwise, keep the current value. 4. When we are done considering all of the neighbours of the current node, mark the current node as visited and remove it from the unvisited set. A visited node will never be checked again. 5. If the destination node has been marked visited (when planning a route between two specific nodes) or if the smallest tentative distance among the nodes in the unvisited set is infinity (when planning a complete traversal; occurs when there is no connection between the initial node and remaining unvisited nodes), then stop. The algorithm has finished. 6. Otherwise, select the unvisited node that is marked with the smallest tentative distance, set it as the new "current node", and go back to step 3. The Critical Path Method is used to find the critical path of the network. In the paper an algorithm is proposed which finds the critical path of the given network. The proposed algorithm is nothing but Dijkstra s algorithm modified to a new algorithm which finds the critical path. The proposed algorithm is more optimum that the traditional critical path method to find the critical path as it reduces the required calculations and is much faster. IJPT Sep-2016 Vol. 8 Issue No Page 16473

3 Materials and Methods M. Yamuna* et al. /International Journal of Pharmacy & Technology Existing Method The Critical Path Method (CPM) is one of several related techniques for doing project planning. CPM is for projects that are made up of a number of individual "activities." If some of the activities require other activities to finish before they can start, then the project becomes a complex web of activities [ 4 ] [ 5 ]. CPM evaluates how long a complex project will take to complete which activities are "critical," meaning that they have to be done on time or else the whole project will take longer If information about the cost of each activity is used, and how much it costs to speed up each activity, CPM helps to find: Whether you should try to speed up the project? and, if so, What is the least costly way to speed up the project? Activities An activity is a specific task. An activity can have these properties: names of any other activities that have to be completed before this one can start a projected normal time duration For speeding up cost analysis, the following things about each activity should be known: a cost to complete a shorter time to complete on a crash basis the higher cost of completing it on a crash basis CPM Algorithm List the activities. Draw the network flow diagram Formulate a table with the fields: Activities, duration, earliest start time, earliest finish time, latest start time, latest finish time, total float. Fill the activities and duration column as per the question. Use the forward pass method to calculate the earliest start time. If more than one activity converge at a node, choose the maximum start time. IJPT Sep-2016 Vol. 8 Issue No Page 16474

4 Use the backward pass method to calculate the latest finish time. If more than one activity leave a node, take the minimum finish time. Latest start time is calculated as the sum of duration of the activity and earliest start time. Earliest finish time is calculated as the difference of latest finish time and duration of the activity. Total float is calculated as the difference of latest start time and earliest start time or latest finish time and earliest finish time. The activity for which the total float is zero is the critical activity. The set of all critical activities is the critical path. The sum of the duration of all activities in the critical path is the duration of the project [ 6 ]. Proposed Algorithm 1. List down all the nodes with the initial and the final nodes separated by the intermediate nodes. 2. Current node = initial node. 3. Update the cost taken to reach the adjacent nodes from the current node. 4. In case of a conflict where a value has already been assigned to the adjacent node, update the value if the new value is greater than or equal to the assigned cost, along with the node. 5. Current node = node with the least cost. 6. Current node = final node? True: All nodes visited? True: Jump to STEP 8. False: Jump to STEP 7. False: Jump to STEP Current node = intermediate node with the least cost not visited, with most nodes traversed. Jump to STEP Cost of the final node gives the critical time. 9. Use back tracking from the final node to find the critical path. We illustrate the proposed method with two examples Example-1 Consider the network seen in Fig. 1 IJPT Sep-2016 Vol. 8 Issue No Page 16475

5 Table-1: provides the details using the regular CPM. Fig. 1 ACTIVITY DURATION EARLIEST START (ES) EARLIEST FINISH (EF) LATEST START (LS) LATEST FINISH (LF) FLAG (LS-ES) A B C D E E F G H I J K Table 1 IJPT Sep-2016 Vol. 8 Issue No Page 16476

6 ES J = 0 LF A = 110 ES A = ES J + J LF K = 110 ES A = 5 ES H = ES J + J LF C = 110 ES H = 5 ES E = ES J + J LF D = 110 ES E = 5 ES F = ES J + J LF G = LF D - D ES F = 5 LF G = 105 ES K = ES J + J LF I = min(lf C C, LF G G) ES K = 5 LF I = min(110, 80) LF I = 80 ES E = ES E + E LF H = LF I - I ES E = 20 LF H = 50 ES B = max(es E + E, ES F + F) LF B = LF I - I ES B = max(20, 20) LF B = 50 ES B = 20 ES I = max(es H + H, ES B + B) LF E = LF B - B ES I = max(20, 50) LF E = 20 ES I = 50 ES G = ES I + I LF E = LF E E ES G = 80 LF E = 20 ES C = ES I + I LF F = LF B - B ES C = 80 LF F = 20 ES D = ES G + G LF J = min(lf A A, LF H H, LF E E, LF F F, LF K K) ES D = 105 LF J = min(95, 35, 5, 5, 65) LF J = 5 IJPT Sep-2016 Vol. 8 Issue No Page 16477

7 As a result we record the following for example 1 using the regular CPM. LATEST FINISH = max(es A + A, ES K + K, ES C + C, ES D + D) LATEST FINISH = max(50, 20, 90, 110) LATEST FINISH = 110 CRITICAL ACTIVITIES: J -> E-> E -> B -> I-> G-> D CRITICAL PATH: 1-> 2 -> 3-> 4-> 5 -> 6-> 7 -> 8 CRITICAL : = 110. We now proceed to do the evaluation for this example using the proposed algorithm. Table 2 illustrates the results generated by implementing the proposed algorithm. Final Node Intermediate Nodes -> Visited Nodes via via 2 via 2 via 2 via via 3 via 2 via via 4 via via 5 via via 6 via via 7 Critical time = 110 Critical path: 1 -> 2 -> 3 -> 4 -> 5 -> 6 -> 7 -> 8 Table 2 IJPT Sep-2016 Vol. 8 Issue No Page 16478

8 Comparing both the results we observe that the value 110 obtained by using the proposed algorithm is same as the value obtained by the regular method. The critical path also remains the same ( both highlighted in red ). Example-2 As a sample example consider the network seen in Fig. 2. Fig. 2 The critical time is 6.4 and the critical path is using the routine method (calculations are omitted ). ACTIVITY DURATIO N EARLIES T START (ES) EARLIES T FINISH (EF) LATEST START (LS) LATEST FINISH (LF) FLAG (LS-ES) A B C D E F G H I J IJPT Sep-2016 Vol. 8 Issue No Page 16479

9 DUMMY (7-8) DUMMY (6-8) Table 3 Hence critical time is 6.4 and the critical path is Table-3: Provides the result for example 2 using the proposed method. Intermediate Nodes -> Visited Nodes via via via 3 via 3 via via 3 via 4 via via 4 via 5 via via 4 via 5 via via 5 via 6 via via 5 via via 5 via via 7 via via 8 via via via 10 IJPT Sep-2016 Vol. 8 Issue No Page 16480

10 Critical Time: 6.4 Critical path: 1 -> 2 -> 3 -> 5 -> 7 -> 8 -> 9 -> 10 -> 11 Table 3 Discussion As seen from the elucidations mentioned above, both Dijkstra s Algorithm and Critical Path Method give the same critical path, but the only difference is that in Dijkstra s Algorithm, we can find the critical path of each node with every other node. In this way, if ever we need to find the longest path between two different nodes, we could easily refer the table, unlike in Critical Path Method wherein we have to redo the entire table keeping in mind the updated initial and final node. In all examples, we first found the critical path using the critical path method (CPM) and then found the critical path using Dijkstra s Algorithm. It is clear that even though CPM is more well knows, a small modification in Dijkstra s algorithm can be used to find the same result in a more efficient manner. In the modified algorithm, we consider the initial node of the network. Applying the algorithm iteratively, we compute the critical path along with the critical time for any given network. The algorithm starts with the initial node taken into consideration. From this node, we find all the possible paths to its neighbours and accordingly update the values in the table. For the next iteration, we consider all the intermediate node which takes the least time to reach it. When a new value is attained for any node, we update the already existing values with the one which is greater than or equal to the already assigned value to the node. Unlike Dijkstra's algorithm, which stop the computation as soon as the final node is reached, the proposed algorithm keeps working until all the intermediate nodes have been visited. For instance, in Example 1, the final node, Node 8 was accessed by Node 2 after the second iteration with the time amounting to 50 units. Dijkstra s algorithm would have terminated at this point. But the proposed algorithm continues to compute the optimal, critical path and time. With this method, computation of critical path and time becomes easier as unnecessary calculations of earliest start times and latest finish times and calculation of the flag and slack values are eliminated altogether. The final value at the final node gives the critical time of the network and using backtracking gives us the critical path of the network. Conclusion The difference between Critical Path Method and Dijkstra s Algorithm is the lack of repeated initialization in CPM method which is conveniently eliminated in Dijkstra s algorithm. Not only is this less time consuming, but it s also more efficient, because in the future if we need to find the critical path between two different nodes, we do not need IJPT Sep-2016 Vol. 8 Issue No Page 16481

11 to recreate the entire table by finding the slack, instead we use the modified Dijkstra s algorithm and refer to the table. This method could widely be used for highway reconstruction, aeroplane navigation, traffic control, geonavigation and other fields where we need to find the critical path between nodes/stations etc. References Dijkstra, E. (1959). A note on two problems in connexion with graphs. Numer. Math., 1(1), pp Magzhan, K. and Mat Jani, H. (2013). A Review and Evaluations of Shortest Path Algorithms. International Journal of Scientific & Technology Research, Volume 2(Issue 6), pp Tamrakar, P. (2013). Analysis and Improvement by the Application of Network Analysis (Pert/Cpm). The International Journal of Engineering And Science (IJES), Volume 2(Issue 1), pp A.M. Natarajan, P.Balasubramani, A. Tamilarasi. (2014). Operations Research, publisher: Dorling Kindersley (India) Pvt. Ltd., Licensees of Pearson Education of South Asia. ISBN: M. Sniedovich, (2006). Dijkstra s algorithm revisited: the dynamic programming connexion, Control and Cybernetics, Volume 35 (Issue 3), pp K. Magzhan and H. M. Jani, (2013). A Review And Evaluations Of Shortest Path Algorithms, International Journal of Scientific & Technology Research, Volume 2 (Issue 6), pp. 2.(ISSN: ). Corresponding Author: M. Yamuna*, myamuna@vit.ac.in IJPT Sep-2016 Vol. 8 Issue No Page 16482

M. Yamuna* et al. International Journal of Pharmacy & Technology

M. Yamuna* et al. International Journal of Pharmacy & Technology ISSN: 0975766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com AMULANCE SERVICE USING MODIFIED DIJKSTRA S ALGORITHM Chhandak agchi, Khushbu Chopra, M. Yamuna* VIT University,

More information

Modelling with linear programming

Modelling with linear programming Modelling with linear programming jla@imm.dtu.dk Informatics and Mathematical Modeling Technical University of Denmark 1 Decision models Real world abstraction Model interpretation A model is a carefully

More information

School of Advanced Sciences, VIT University, Vellore, India. Received on Accepted on

School of Advanced Sciences, VIT University, Vellore, India.   Received on Accepted on ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com DEVELOPMENT OF ALTERNATE FAULT TOLERANT MINIMUM WEIGHTED SPANNING TREE USING VERTEX, EDGE CONNECTIVITY M. Yamuna*

More information

Review Article AN ANALYSIS ON THE PERFORMANCE OF VARIOUS REPLICA ALLOCATION ALGORITHMS IN CLOUD USING MATLAB

Review Article   AN ANALYSIS ON THE PERFORMANCE OF VARIOUS REPLICA ALLOCATION ALGORITHMS IN CLOUD USING MATLAB ISSN: 0975-766X CODEN: IJPTFI Available through Online Review Article www.ijptonline.com AN ANALYSIS ON THE PERFORMANCE OF VARIOUS REPLICA ALLOCATION ALGORITHMS IN CLOUD USING MATLAB 1 P. Nagendramani*,

More information

Construction Planning & scheduling. Precedence Networks. Precedence networks

Construction Planning & scheduling. Precedence Networks. Precedence networks Construction Planning & scheduling Precedence Networks Dr. Maha alkasasbeh are the most common type of network schedule in use today Most scheduling software these days require the user to input the information

More information

Dijkstra's Algorithm

Dijkstra's Algorithm Carlos Moreno cmoreno @ uwaterloo.ca EIT-4103 Image courtesy of wikipedia.org https://ece.uwaterloo.ca/~cmoreno/ece250 Standard reminder to set phones to silent/vibrate mode, please! During today's class

More information

An Investigation of Dijkstra and Floyd Algorithms in National City Traffic Advisory Procedures

An Investigation of Dijkstra and Floyd Algorithms in National City Traffic Advisory Procedures Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Network Optimization Models. Chapter 10: Hillier and Lieberman Chapter 8: Decision Tools for Agribusiness Dr. Hurley s AGB 328 Course

Network Optimization Models. Chapter 10: Hillier and Lieberman Chapter 8: Decision Tools for Agribusiness Dr. Hurley s AGB 328 Course Network Optimization Models Chapter 10: Hillier and Lieberman Chapter 8: Decision Tools for Agribusiness Dr. Hurley s AGB 328 Course Terms to Know Nodes, Arcs, Directed Arc, Undirected Arc, Links, Directed

More information

S.Hrushikesava Raju* et al. International Journal of Pharmacy & Technology

S.Hrushikesava Raju* et al. International Journal of Pharmacy & Technology ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com APPLICATION OF DATA PREPROCESSING ON THE GIVEN DATA AND EFFICIENT CONSTRUCTION OF OPTIMAL BINARY SEARCH TREES

More information

CSE 100: GRAPH ALGORITHMS

CSE 100: GRAPH ALGORITHMS CSE 100: GRAPH ALGORITHMS 2 Graphs: Example A directed graph V5 V = { V = E = { E Path: 3 Graphs: Definitions A directed graph V5 V6 A graph G = (V,E) consists of a set of vertices V and a set of edges

More information

Discrete Mathematics, Spring 2004 Homework 8 Sample Solutions

Discrete Mathematics, Spring 2004 Homework 8 Sample Solutions Discrete Mathematics, Spring 4 Homework 8 Sample Solutions 6.4 #. Find the length of a shortest path and a shortest path between the vertices h and d in the following graph: b c d a 7 6 7 4 f 4 6 e g 4

More information

Chapter 6: Activity Planning Part 2

Chapter 6: Activity Planning Part 2 Chapter 6: Activity Planning Part 2 NET481: Project Management Afnan Albahli " Representing Lagged Activities Lag activities: are two activities that will be undertaken in parallel but there is a lag between

More information

Dependency Table Example. Task ID Name Predecessors 1 A 2 B 3 C 4 D 1 5 E 1;2 6 F 1;2 7 G 5;6 8 H 4;5

Dependency Table Example. Task ID Name Predecessors 1 A 2 B 3 C 4 D 1 5 E 1;2 6 F 1;2 7 G 5;6 8 H 4;5 Dependency Table Example Task ID Name Predecessors 1 A 2 B 3 C 4 D 1 5 E 1;2 6 F 1;2 7 G 5;6 8 H 4;5 Dependent tasks Dependency Matrix 1 2 3 4 5 6 7 8 9 10 1 x 2 x x 3 x x 4 x 5 x x 6 x 7 x 8 x 9 x x 10

More information

Adaptive GPS Algorithms

Adaptive GPS Algorithms Adaptive GPS Algorithms Chad Seibert Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 seib0060@morris.umn.edu March 16, 2011 Abstract Global positioning systems (GPS)

More information

Network Routing Protocol using Genetic Algorithms

Network Routing Protocol using Genetic Algorithms International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a

More information

Graphs. The ultimate data structure. graphs 1

Graphs. The ultimate data structure. graphs 1 Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely

More information

General network with four nodes and four activities with triangular fuzzy number as activity times

General network with four nodes and four activities with triangular fuzzy number as activity times International Journal of Engineering Research and General Science Volume 3, Issue, Part, March-April, 05 ISSN 09-730 General network with four nodes and four activities with triangular fuzzy number as

More information

Shortest Paths. Shortest Path. Applications. CSE 680 Prof. Roger Crawfis. Given a weighted directed graph, one common problem is finding the shortest

Shortest Paths. Shortest Path. Applications. CSE 680 Prof. Roger Crawfis. Given a weighted directed graph, one common problem is finding the shortest Shortest Path Introduction to Algorithms Shortest Paths CS 60 Prof. Roger Crawfis Given a weighted directed graph, one common problem is finding the shortest path between two given vertices Recall that

More information

YEAR 12 FURTHER MATHS UNIT 4 MODULE 2 NETWORKS AND DECISION MATHEMATICS CRITICAL PATH ANALYSIS

YEAR 12 FURTHER MATHS UNIT 4 MODULE 2 NETWORKS AND DECISION MATHEMATICS CRITICAL PATH ANALYSIS YEAR 12 FURTHER MATHS UNIT 4 MODULE 2 NETWORKS AND DECISION MATHEMATICS CRITICAL PATH ANALYSIS Directed graphs or digraphs can be used to model situations where an order or direction is implied. For example,

More information

Bijou Detouring - A Dynamic Node Level Routing Algorithm

Bijou Detouring - A Dynamic Node Level Routing Algorithm Bijou Detouring - A Dynamic Node Level Routing Algorithm G.Reshma K.Swarupa Rani D.Leela Dharani D.Anusha Abstract This paper holds a candle light on the Dijkstra algorithm and Distance Vector routing

More information

The Shortest Path Problem

The Shortest Path Problem The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring

More information

Topological Sort. Here a topological sort would label A with 1, B and C with 2 and 3, and D with 4.

Topological Sort. Here a topological sort would label A with 1, B and C with 2 and 3, and D with 4. Topological Sort The goal of a topological sort is given a list of items with dependencies, (ie. item 5 must be completed before item 3, etc.) to produce an ordering of the items that satisfies the given

More information

CS350: Data Structures Dijkstra s Shortest Path Alg.

CS350: Data Structures Dijkstra s Shortest Path Alg. Dijkstra s Shortest Path Alg. James Moscola Department of Engineering & Computer Science York College of Pennsylvania James Moscola Shortest Path Algorithms Several different shortest path algorithms exist

More information

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33 Chapter 10 Fundamental Network Algorithms M. E. J. Newman May 6, 2015 M. E. J. Newman Chapter 10 May 6, 2015 1 / 33 Table of Contents 1 Algorithms for Degrees and Degree Distributions Degree-Degree Correlation

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

How Routing Algorithms Work

How Routing Algorithms Work How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information

More information

CMPUT 396 Sliding Tile Puzzle

CMPUT 396 Sliding Tile Puzzle CMPUT 396 Sliding Tile Puzzle Sliding Tile Puzzle 2x2 Sliding Tile States Exactly half of the states are solvable, the other half are not. In the case of 2x2 puzzles, I can solve it if I start with a configuration

More information

Subnet Shortest Path Pseudocode based on Dijkstra's Algorithm

Subnet Shortest Path Pseudocode based on Dijkstra's Algorithm Subnet Shortest Path Pseudocode based on Dijkstra's Algorithm Salah Elrofai 1, Abdeen Abdelkareem 2 1Assistant Professor, School of Electronic, Collage of Engineering, Sudan University of Science and Technology,

More information

Chapter 14. Graphs Pearson Addison-Wesley. All rights reserved 14 A-1

Chapter 14. Graphs Pearson Addison-Wesley. All rights reserved 14 A-1 Chapter 14 Graphs 2011 Pearson Addison-Wesley. All rights reserved 14 A-1 Terminology G = {V, E} A graph G consists of two sets A set V of vertices, or nodes A set E of edges A subgraph Consists of a subset

More information

Dynamic-Programming algorithms for shortest path problems: Bellman-Ford (for singlesource) and Floyd-Warshall (for all-pairs).

Dynamic-Programming algorithms for shortest path problems: Bellman-Ford (for singlesource) and Floyd-Warshall (for all-pairs). Lecture 13 Graph Algorithms I 13.1 Overview This is the first of several lectures on graph algorithms. We will see how simple algorithms like depth-first-search can be used in clever ways (for a problem

More information

A NEW METHOD FOR SOLVING TWO VEHICLE COST VARYING FUZZY TRANSPORTATION PROBLEM

A NEW METHOD FOR SOLVING TWO VEHICLE COST VARYING FUZZY TRANSPORTATION PROBLEM ISSN: 0975-766X CDEN: IJPTFI Available nline through esearch Article www.ptonline.com A NEW METHD F SLVING TW VEHICLE CST VAYING FUZZY TANSPTATIN PBLEM D.Kalpanapriya* and D.Anuradha Department of Mathematics

More information

Description of The Algorithm

Description of The Algorithm Description of The Algorithm Dijkstra s algorithm works by solving the sub-problem k, which computes the shortest path from the source to vertices among the k closest vertices to the source. For the dijkstra

More information

Graph Algorithms. Revised based on the slides by Ruoming Kent State

Graph Algorithms. Revised based on the slides by Ruoming Kent State Graph Algorithms Adapted from UMD Jimmy Lin s slides, which is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States. See http://creativecommons.org/licenses/by-nc-sa/3.0/us/

More information

LECTURES 3 and 4: Flows and Matchings

LECTURES 3 and 4: Flows and Matchings LECTURES 3 and 4: Flows and Matchings 1 Max Flow MAX FLOW (SP). Instance: Directed graph N = (V,A), two nodes s,t V, and capacities on the arcs c : A R +. A flow is a set of numbers on the arcs such that

More information

Wiener index of chemical trees from its subtree

Wiener index of chemical trees from its subtree Available online at www.derpharmachemica.com Scholars Research Library Der Pharma Chemica, 014, 6(5):35-4 (http://derpharmachemica.com/archive.html) Wiener index of chemical trees from its subtree M. Yamuna

More information

Improving the quantitative testing of fast aspherics surfaces with null screen using Dijkstra algorithm

Improving the quantitative testing of fast aspherics surfaces with null screen using Dijkstra algorithm Improving the quantitative testing of fast aspherics surfaces with null screen using Dijkstra algorithm Víctor Iván Moreno Oliva a *, Álvaro Castañeda Mendozaa, Manuel Campos García b, Rufino Díaz Uribe

More information

Lecture 18 Solving Shortest Path Problem: Dijkstra s Algorithm. October 23, 2009

Lecture 18 Solving Shortest Path Problem: Dijkstra s Algorithm. October 23, 2009 Solving Shortest Path Problem: Dijkstra s Algorithm October 23, 2009 Outline Lecture 18 Focus on Dijkstra s Algorithm Importance: Where it has been used? Algorithm s general description Algorithm steps

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis K Shortest Path Implementation by RadhaKrishna Nagubadi LIU-IDA/LITH-EX-A--13/41--SE 213-6-27 Linköpings universitet

More information

Different Optimal Solutions in Shared Path Graphs

Different Optimal Solutions in Shared Path Graphs Different Optimal Solutions in Shared Path Graphs Kira Goldner Oberlin College Oberlin, OH 44074 (610) 324-3931 ksgoldner@gmail.com ABSTRACT We examine an expansion upon the basic shortest path in graphs

More information

Research Article AUTOMATED EXCEPTION HANDLING IN SOFTWARE TESTING Dr. Anjaneyulu G.S.G.N*

Research Article  AUTOMATED EXCEPTION HANDLING IN SOFTWARE TESTING Dr. Anjaneyulu G.S.G.N* ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com AUTOMATED EXCEPTION HANDLING IN SOFTWARE TESTING Dr. Anjaneyulu G.S.G.N* 1 Professor, School of Advanced Sciences,

More information

4. Linear Programming

4. Linear Programming /9/08 Systems Analysis in Construction CB Construction & Building Engineering Department- AASTMT by A h m e d E l h a k e e m & M o h a m e d S a i e d. Linear Programming Optimization Network Models -

More information

Available Online through

Available Online through D. Saravanan*et al. /International Journal of Pharmacy & Technology Available Online through ISSN: 0975-766X CODEN: IJPTFI Research Article www.ijptonline.com VALIDATION OF SECRET CODE USING IMAGE BASED

More information

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS 3.1. Extension of a Static k-sp Algorithm to the Time-Dependent Case Kaufman and Smith [1993] showed that under the consistency

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

1 Non greedy algorithms (which we should have covered

1 Non greedy algorithms (which we should have covered 1 Non greedy algorithms (which we should have covered earlier) 1.1 Floyd Warshall algorithm This algorithm solves the all-pairs shortest paths problem, which is a problem where we want to find the shortest

More information

Graphs. The ultimate data structure. graphs 1

Graphs. The ultimate data structure. graphs 1 Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely

More information

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 1 CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 Shortest Paths The discussion in these notes captures the essence of Dijkstra s algorithm discussed in textbook

More information

Received on Accepted on

Received on Accepted on ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com TASK SCHEDULING FOR REAL TIME APPLICATIONS USING MEAN-DIFFERENCE ROUND ROBIN (MDRR) ALGORITHM WITH DYNAMIC TIME

More information

2.3 Optimal paths. Optimal (shortest or longest) paths have a wide range of applications:

2.3 Optimal paths. Optimal (shortest or longest) paths have a wide range of applications: . Optimal paths Optimal (shortest or longest) paths have a wide range of applications: Google maps, GPS navigators planning and management of transportation, electrical and telecommunication networks project

More information

Comparison of Dijkstra's Algorithm with other proposed algorithms

Comparison of Dijkstra's Algorithm with other proposed algorithms International Academic Institute for Science and Technology International Academic Journal of Science and Engineering Vol. 3, No. 7, 2016, pp. 53-66. ISSN 2454-390X International Academic Journal of Science

More information

Chalmers University of Technology. Network Models. April 11, Birgit Grohe

Chalmers University of Technology. Network Models. April 11, Birgit Grohe Chalmers University of Technology Applied Optimisation lp 4 VT08 Network Models April 11, 2008 Birgit Grohe Network Models - Examples Many different problems can be formulated as graph/network models:

More information

Network Models - Examples. Network Models. Definition and Terminology. The Minimum Spanning Tree (MST) Problem

Network Models - Examples. Network Models. Definition and Terminology. The Minimum Spanning Tree (MST) Problem Chalmers University of Technology Applied Optimisa- Network Models - Examples tion lp 4 VT08 Network Models April 11, 2008 Birgit Grohe Many different problems can be formulated as graph/network models:

More information

Introduction to Parallel & Distributed Computing Parallel Graph Algorithms

Introduction to Parallel & Distributed Computing Parallel Graph Algorithms Introduction to Parallel & Distributed Computing Parallel Graph Algorithms Lecture 16, Spring 2014 Instructor: 罗国杰 gluo@pku.edu.cn In This Lecture Parallel formulations of some important and fundamental

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Shortest Path Problem G. Guérard Department of Nouvelles Energies Ecole Supérieur d Ingénieurs Léonard de Vinci Lecture 3 GG A.I. 1/42 Outline 1 The Shortest Path Problem Introduction

More information

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes CS 4: Computer Networks SPRING 004 MIDTERM II May 5, 004 0 minutes Name: Student No: ) a) (8 pts) List the reasons why Internet has a hierarchical routing architecture. (Use at most four sentences) b)

More information

Performance Analysis of Routing Techniques in Networks

Performance Analysis of Routing Techniques in Networks International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Performance Analysis of Routing Techniques in Networks J.Mahesh, M.Antony Kumar P.M.R.Engineering College

More information

In this edition of HowStuffWorks, we'll find out precisely what information is used by routers in determining where to send a packet.

In this edition of HowStuffWorks, we'll find out precisely what information is used by routers in determining where to send a packet. How Routing Algorithms Work by Roozbeh Razavi If you have read the HowStuffWorks article How Routers Work, then you know that a router is used to manage network traffic and find the best route for sending

More information

IMPROVEMENT OF SHORTEST-PATH ALGORITHMS USING SUBGRAPHS' HEURISTICS

IMPROVEMENT OF SHORTEST-PATH ALGORITHMS USING SUBGRAPHS' HEURISTICS IMPROVEMENT OF SHORTEST-PATH ALGORITHMS USING SUBGRAPHS' HEURISTICS 1 FAISAL KHAMAYSEH, 2 NABIL ARMAN 1 Asstt Prof., Department of Information Technology, Palestine Polytechnic University 2 Prof., Department

More information

L3 Network Algorithms

L3 Network Algorithms L3 Network Algorithms NGEN06(TEK230) Algorithms in Geographical Information Systems by: Irene Rangel, updated Nov. 2015 by Abdulghani Hasan, Nov 2017 by Per-Ola Olsson Content 1. General issues of networks

More information

EE/CSCI 451 Midterm 1

EE/CSCI 451 Midterm 1 EE/CSCI 451 Midterm 1 Spring 2018 Instructor: Xuehai Qian Friday: 02/26/2018 Problem # Topic Points Score 1 Definitions 20 2 Memory System Performance 10 3 Cache Performance 10 4 Shared Memory Programming

More information

Practice Problems for the Final

Practice Problems for the Final ECE-250 Algorithms and Data Structures (Winter 2012) Practice Problems for the Final Disclaimer: Please do keep in mind that this problem set does not reflect the exact topics or the fractions of each

More information

CS/COE

CS/COE CS/COE 1501 www.cs.pitt.edu/~lipschultz/cs1501/ Weighted Graphs Last time, we said spatial layouts of graphs were irrelevant We define graphs as sets of nodes and edges However, we ll certainly want to

More information

Position Sort. Anuj Kumar Developer PINGA Solution Pvt. Ltd. Noida, India ABSTRACT. Keywords 1. INTRODUCTION 2. METHODS AND MATERIALS

Position Sort. Anuj Kumar Developer PINGA Solution Pvt. Ltd. Noida, India ABSTRACT. Keywords 1. INTRODUCTION 2. METHODS AND MATERIALS Position Sort International Journal of Computer Applications (0975 8887) Anuj Kumar Developer PINGA Solution Pvt. Ltd. Noida, India Mamta Former IT Faculty Ghaziabad, India ABSTRACT Computer science has

More information

Role of Genetic Algorithm in Routing for Large Network

Role of Genetic Algorithm in Routing for Large Network Role of Genetic Algorithm in Routing for Large Network *Mr. Kuldeep Kumar, Computer Programmer, Krishi Vigyan Kendra, CCS Haryana Agriculture University, Hisar. Haryana, India verma1.kuldeep@gmail.com

More information

COMP4128 Programming Challenges

COMP4128 Programming Challenges Network Networks Network COMP4128 Programming Challenges School of Computer Science and Engineering UNSW Australia Table of Contents 2 Network 1 Networks Networks 2 3 4 5 6 networks 3 Network Networks

More information

L22-23: Graph Algorithms

L22-23: Graph Algorithms Indian Institute of Science Bangalore, India भ रत य व ज ञ न स स थ न ब गल र, भ रत Department of Computational and Data Sciences DS 0--0,0 L-: Graph Algorithms Yogesh Simmhan simmhan@cds.iisc.ac.in Slides

More information

Optimization of Cutting Parameters for Milling Operation using Genetic Algorithm technique through MATLAB

Optimization of Cutting Parameters for Milling Operation using Genetic Algorithm technique through MATLAB International Journal for Ignited Minds (IJIMIINDS) Optimization of Cutting Parameters for Milling Operation using Genetic Algorithm technique through MATLAB A M Harsha a & Ramesh C G c a PG Scholar, Department

More information

A Study of Different Parallel Implementations of Single Source Shortest Path Algorithms

A Study of Different Parallel Implementations of Single Source Shortest Path Algorithms A Study of Different Parallel Implementations of Single Source Shortest Path s Dhirendra Pratap Singh Department of Computer Science and Engineering Maulana Azad National Institute of Technology, Bhopal

More information

Dijkstra s algorithm for shortest paths when no edges have negative weight.

Dijkstra s algorithm for shortest paths when no edges have negative weight. Lecture 14 Graph Algorithms II 14.1 Overview In this lecture we begin with one more algorithm for the shortest path problem, Dijkstra s algorithm. We then will see how the basic approach of this algorithm

More information

Real-World Applications of Graph Theory

Real-World Applications of Graph Theory Real-World Applications of Graph Theory St. John School, 8 th Grade Math Class February 23, 2018 Dr. Dave Gibson, Professor Department of Computer Science Valdosta State University 1 What is a Graph? A

More information

Scheduling distributed applications can be challenging in a multi-cloud environment due to the lack of knowledge

Scheduling distributed applications can be challenging in a multi-cloud environment due to the lack of knowledge ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com CHARACTERIZATION AND PROFILING OFSCIENTIFIC WORKFLOWS Sangeeth S, Srikireddy Sai Kiran Reddy, Viswanathan M*,

More information

PSAV MODEL: AGILE METHOD TO DESIGN HUMAN MACHINE INTERACTION FOR USER EXPERIENCE ACROSS THE PLATFORMS

PSAV MODEL: AGILE METHOD TO DESIGN HUMAN MACHINE INTERACTION FOR USER EXPERIENCE ACROSS THE PLATFORMS Original Article International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN (P): 2250-1568; ISSN (E): 2278-9448 Vol. 8, Issue 4, Dec 2018, 9-14 TJPRC Pvt. Ltd. PSAV

More information

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies:

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies: UNIT 5 CSE 103 - Unit V- Graph GRAPH Graph is another important non-linear data structure. In tree Structure, there is a hierarchical relationship between, parent and children that is one-to-many relationship.

More information

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem L. De Giovanni M. Di Summa The Traveling Salesman Problem (TSP) is an optimization problem on a directed

More information

SHORTEST PATH TECHNIQUE FOR SWITCHING IN A MESH NETWORK

SHORTEST PATH TECHNIQUE FOR SWITCHING IN A MESH NETWORK International Conference Mathematical and Computational Biology 2011 International Journal of Modern Physics: Conference Series Vol. 9 (2012) 488 494 World Scientific Publishing Company DOI: 10.1142/S2010194512005570

More information

CS 206 Introduction to Computer Science II

CS 206 Introduction to Computer Science II CS 206 Introduction to Computer Science II 04 / 13 / 2018 Instructor: Michael Eckmann Today s Topics Questions? Comments? Graphs Depth First Search (DFS) Shortest path Shortest weight path (Dijkstra's

More information

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry

More information

Utilizing Restricted Direction Strategy and Binary Heap Technology to Optimize Dijkstra Algorithm in WebGIS

Utilizing Restricted Direction Strategy and Binary Heap Technology to Optimize Dijkstra Algorithm in WebGIS Key Engineering Materials Online: 2009-10-08 ISSN: 1662-9795, Vols. 419-420, pp 557-560 doi:10.4028/www.scientific.net/kem.419-420.557 2010 Trans Tech Publications, Switzerland Utilizing Restricted Direction

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

A NEW APPROACH FOR FUZZY CRITICAL PATH METHOD USING OCTAGONAL FUZZY NUMBERS

A NEW APPROACH FOR FUZZY CRITICAL PATH METHOD USING OCTAGONAL FUZZY NUMBERS Volume 119 No. 13 2018, 357-364 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A NEW APPROACH FOR FUZZY CRITICAL PATH METHOD USING OCTAGONAL FUZZY NUMBERS D. STEPHEN DINAGAR 1 AND

More information

CSC 8301 Design & Analysis of Algorithms: Linear Programming

CSC 8301 Design & Analysis of Algorithms: Linear Programming CSC 8301 Design & Analysis of Algorithms: Linear Programming Professor Henry Carter Fall 2016 Iterative Improvement Start with a feasible solution Improve some part of the solution Repeat until the solution

More information

Australian Journal of Basic and Applied Sciences. Meeting the Desired Fuzzy Shortest Possible Duration to Complete the Project at Fuzzy Least Cost

Australian Journal of Basic and Applied Sciences. Meeting the Desired Fuzzy Shortest Possible Duration to Complete the Project at Fuzzy Least Cost Australian Journal of Basic and Applied Sciences, 9(23) July 2, Pages: 36-43 ISSN:99-878 Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com Meeting the Desired Shortest

More information

CHAPTER-III WAVELENGTH ROUTING ALGORITHMS

CHAPTER-III WAVELENGTH ROUTING ALGORITHMS CHAPTER-III WAVELENGTH ROUTING ALGORITHMS Introduction A wavelength routing (WR) algorithm selects a good route and a wavelength to satisfy a connection request so as to improve the network performance.

More information

An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network

An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network Centre for Telecommunication Research and Innovation (CeTRI), Faculty of Electronic and Computer

More information

Asha. N* et al. International Journal of Pharmacy & Technology

Asha. N* et al. International Journal of Pharmacy & Technology ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com CUSTOMER SEGREGATIONIN BANKINGORGANISATIONUSING KNOWLEDGE MANAGEMENT Asha. N* School of information technology,

More information

d. Solution coming soon. 6. Directed Graphs

d. Solution coming soon. 6. Directed Graphs Fall 2013 Final Solutions (Beta Edition) 1. TSTs. a. ID, IDD, IDDQD, IDKFA, XA, XX, XEA, XYZZY b. IDAAAA or XDAAAA or XCAAAA, or indeed anything that is six letters long and starts with ID, XD, or XC.

More information

Simple graph Complete graph K 7. Non- connected graph

Simple graph Complete graph K 7. Non- connected graph A graph G consists of a pair (V; E), where V is the set of vertices and E the set of edges. We write V (G) for the vertices of G and E(G) for the edges of G. If no two edges have the same endpoints we

More information

Autonomous robot motion path planning using shortest path planning algorithms

Autonomous robot motion path planning using shortest path planning algorithms IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 1 (Jan. 2013), V1 PP 65-69 Autonomous robot motion path planning using shortest path planning algorithms T. Ravi

More information

2.3 Optimal paths. E. Amaldi Foundations of Operations Research Politecnico di Milano 1

2.3 Optimal paths. E. Amaldi Foundations of Operations Research Politecnico di Milano 1 . Optimal paths E. Amaldi Foundations of Operations Research Politecnico di Milano Optimal (minimum or maximum) paths have a wide range of applications: Google maps, GPS navigators planning and management

More information

Salman Ahmed.G* et al. /International Journal of Pharmacy & Technology

Salman Ahmed.G* et al. /International Journal of Pharmacy & Technology ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com A FRAMEWORK FOR CLASSIFICATION OF MEDICAL DATA USING BIJECTIVE SOFT SET Salman Ahmed.G* Research Scholar M. Tech

More information

casting etc. across IP Network. Design of IP Based Multimedia Network is the complete guide to a success network

casting etc. across IP Network. Design of IP Based Multimedia Network is the complete guide to a success network ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com DESIGN OF IP BASED MULTIMEDIA NETWORK FOR NATION WIDE CONCERTED S. Kongu Vel* *Research Scholor, Bharath Institute

More information

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,

More information

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University)

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University) Transportation and Assignment Problems The transportation model is a special class of linear programs. It received this name because many of its applications involve determining how to optimally transport

More information

Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network

Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network The wireless stations in a CSMA/CA wireless LAN access system connect directly to each other to form a wireless mesh

More information

Friday 24 May 2013 Morning

Friday 24 May 2013 Morning Friday 24 May 2013 Morning AS GCE MATHEMATICS 4736/01 Decision Mathematics 1 QUESTION PAPER *4715580613* Candidates answer on the Printed Answer Book. OCR supplied materials: Printed Answer Book 4736/01

More information

Eulerian Cycle (2A) Walk : vertices may repeat, edges may repeat (closed or open) Trail: vertices may repeat, edges cannot repeat (open)

Eulerian Cycle (2A) Walk : vertices may repeat, edges may repeat (closed or open) Trail: vertices may repeat, edges cannot repeat (open) Eulerian Cycle (2A) Walk : vertices may repeat, edges may repeat (closed or open) Trail: vertices may repeat, edges cannot repeat (open) circuit : vertices my repeat, edges cannot repeat (closed) path

More information

An Algorithmic Approach to Graph Theory Neetu Rawat

An Algorithmic Approach to Graph Theory Neetu Rawat An Algorithmic Approach to Graph Theory Neetu Rawat nrwt12345@gmail.com, Assistant Professor, Chameli Devi Group of Institutions, Indore. India. Abstract This paper compares two different minimum spanning

More information

Planar Graph Characterization - Using γ - Stable Graphs

Planar Graph Characterization - Using γ - Stable Graphs Planar Graph Characterization - Using γ - Stable Graphs M. YAMUNA VIT University Vellore, Tamilnadu INDIA myamuna@vit.ac.in K. KARTHIKA VIT University Vellore, Tamilnadu INDIA karthika.k@vit.ac.in Abstract:

More information