scispace - formally typeset
Search or ask a question
Topic

Prim's algorithm

About: Prim's algorithm is a research topic. Over the lifetime, 775 publications have been published within this topic receiving 17971 citations. The topic is also known as: DJP algorithm & Jarník algorithm.


Papers
More filters
Journal ArticleDOI
TL;DR: This work proposes an algorithm to solve the bottleneck spanning tree problem with an additional linear constraint and has an improved worst case performance over the best known algorithm for this problem.
Abstract: We propose an algorithm to solve the bottleneck spanning tree problem with an additional linear constraint. Our algorithm has an improved worst case performance over the best known algorithm for this problem. In a graph with n nodes and m edges such that m ≥ O(n log n log log*n), where log* n is the iterative logarithm of n, our algorithm runs in O(m) time and hence is the best possible in that case. For a large class of graphs, the proposed algorithm has almost the same complexity as that of computing just one minimum spanning tree.

10 citations

Journal ArticleDOI
TL;DR: Dynamic multi keyword based search Algorithm is proposed that contain modified fully homomophic encryption and prims Algorithm that provides 80 and 86% encryption and decryption throughput and take less indexing time to index the files than existing RC4+.
Abstract: Cloud provides plenty of storage that makes enterprises to move their precious information/documents to the cloud. Since the user moves their valued data to the cloud, security is a major concern between storage service provider and user. To ascertain the security, the cryptography plays vital role in the searchable encryption based document. In this paper, Dynamic multi keyword based search Algorithm is proposed that contain modified fully homomophic encryption and prims Algorithm. Based on keyword frequency present in the document, keywords are sorted and built searchable index for keyword and files. The dynamic tree is constructed using prim‘s algorithm based on keyword and file. The encrypted files in the tree are indexed to keywords using two way Hash table for efficient search and retrival of documents. The files are encrypted using modified ring based fully homomorphic encryption. The experimental result shows that proposed work provides 80 and 86% encryption and decryption throughput and take less indexing time to index the files than existing RC4+.

10 citations

Book ChapterDOI
15 Dec 2003
TL;DR: An algorithm based on Lagrangean relaxation that uses a repeated application of Kruskal’s MST algorithm interleaved with a combinatorial update of approximate lagrangean node-multipliers maintained by the algorithm.
Abstract: In a recent paper [5], we addressed the problem of finding a minimum-cost spanning tree T for a given undirected graph G=(V,E) with maximum node-degree at most a given parameter B>1. We developed an algorithm based on Lagrangean relaxation that uses a repeated application of Kruskal’s MST algorithm interleaved with a combinatorial update of approximate Lagrangean node-multipliers maintained by the algorithm.

10 citations

Journal ArticleDOI
TL;DR: This paper presents for the first time an optimal (in the order of message complexity) fault-resilient spanning forest constructing algorithm for general networks, which eventually constructs a spanning tree in every component of the network that remained connected in which at least one node initiated the algorithm.

10 citations

Proceedings ArticleDOI
01 Oct 2015
TL;DR: A self-healing scheme using Artificial Immune System as an optimization tool to solve the service restoration problem in power systems considering faults within the internal switch breakers is presented in this paper.
Abstract: The power system reconfiguration is a challenging task. As smart grids concepts develop, different approaches try to take advantage of the grid intelligent features and infrastructure to evolve a fast and robust self-healing scheme. At the distribution level, the self-healing schemes are responsible for performing automatic corrective and self-restorative actions. This task includes managing the service restoration by locating and isolating the fault, and reconfiguring the network topology to decrease the harm. This paper presents a self-healing scheme using Artificial Immune System as an optimization tool to solve the service restoration problem in power systems considering faults within the internal switch breakers. To make this approach suitable for bigger systems, the Prim Algorithm is used due to its capacity to generate minimum spanning trees from a graph. The proposed scheme is tested on benchmark systems to investigate the capacity of proposing feasible solutions for faulted systems.

10 citations


Network Information
Related Topics (5)
Time complexity
36K papers, 879.5K citations
82% related
Tree (data structure)
44.9K papers, 749.6K citations
78% related
Metaheuristic
29.9K papers, 921K citations
78% related
Scheduling (computing)
78.6K papers, 1.3M citations
77% related
Computational complexity theory
30.8K papers, 711.2K citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20232
20224
202113
20208
201920
201815