A Significant Approach for Graph Theory and Its Applications

Authors

  • K. Ramya  Assistant Professor, Department of Science and humanities, C. Abdul Hakeem college of Engineering and Technology, Vellore, Tamil Nadu, India
  • K. Suganya  Assistant Professor, Department of Computer Applications, Vivekananda college of Arts and Science, Sirkali, Tamil Nadu, India

DOI:

https://doi.org//10.32628/IJSRST18401146

Keywords:

GPS, PERT

Abstract

Graph theory is a branch of discrete mathematics. Graph theory is the study of graphs which are mathematical structures used to model pair wise relations between objects. Now a days the role of graph theory in various filed is increasing, currently it provide greater functionality, combination, and low cost system into real world designed systems. Graph theory is in spot to play extensive roles in real application

References

  1. Mark Weiser, The Computer for the 21st Century, Scientific American, September 1991
  2. M.Satyanarayanan, PervasiveComputing:Vision and Challenges, IEEE Personal Communications ,2001.
  3. LalanaKagal,TimFinin, and AnupamJoshi,Trust-Based Security inPervasive Computing Environments, Computer Communications, Elseiver, December 2001
  4. Michael Collins,Simon Dobson, Paddy Nixon, S ecurity Issues with Pervasive Computing Frameworks, in workshop on privacy,Trust and Identity issues for Ambient Intelligence at Pervasive 2006 , pp 1-7, (2006)
  5. Munirul, Haque and Sheikh Iqbal Ahamed, Security in Pervasive Computing: Current Status and Open Issues, International Journalof Network Security, Vol.3, No.3, PP.203-214, Nov.2006
  6. Zeeshan Bilal, Ashraf Masood, Firdous Kausar, Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFIDTags:Gossamer Protocol, in Proceedings of International Conference on Network-Based Information Systems, August 2009
  7. Thomas Eisenbarth, Sandeep Kumar, Christof Paar and Axel Poschmann, Leif Uhsadel, A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, November- December 2007
  8. Jianhua Ma, Qiang fu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence T. Yang, Runhe Huang, and Qun Jin, Ubisafe computing Vision and challenges, L.T.Yang et al.(Eds.): ATC 2006, LNCS4158, pp.386-397, Springer-Verlag Berlin Heidelberg

Downloads

Published

2018-12-30

Issue

Section

Research Articles

How to Cite

[1]
K. Ramya, K. Suganya, " A Significant Approach for Graph Theory and Its Applications, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 11, pp.247-250, November-December-2018. Available at doi : https://doi.org/10.32628/IJSRST18401146