Modified Genetic Algorithm for Maximum Clique Problem
|
International Journal of Computer & Organization Trends (IJCOT) | |
© 2013 by IJCOT Journal | ||
Volume-3 Issue-2 |
||
Year of Publication : 2013 | ||
Authors : Naresh Kumar, Deepkiran Munjal |
Citation
Naresh Kumar, Deepkiran Munjal "Modified Genetic Algorithm for Maximum Clique Problem". International Journal of Computer & organization Trends (IJCOT), V3(2):40-42 Mar - Apr 2013, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Abstract
Maximum clique problem is NP-hard problem which applies its application in determining the maximum connected sub graphs. Cliques are one of the basic concepts of graph theory and are used in many other mathematical problems and constructions on graphs. Clique corresponds to individual set in the graph. The approach used in obtaining maximum clique is Genetic Algorithm. Genetic Algorithms are a type of optimization algorithm which is based on the theory of natural selection for generating solutions of the problem. Genetic Algorithms are adaptive heuristic search algorithms for the survival of the fittest. The Genetic Algorithm is a probabilistic search algorithm that iteratively transforms a set of mathematical objects of fixed length binary string. The maximum clique problem calls for finding the maximum sized sub graphs in a particular graph. The intent is to develop a method to find the optimal solution from huge set of solutions.
References
[1].Alejandro Proa˜no and Loukas Lazos- Packet-Hiding Methods for Preventing Selective Jamming Attacks.
[2]. G. Noubir and G. Lin. Low-power DoS attacks in data wireless LANs and bad guys. In DIMACS Workshop on Mobile and Wireless Security, 2004.
[3]. www.techterms.com/definition/wireless
[4]. http://www.geocaching.com/seek/cache_details.aspx?guid=395a56a3-61b4-4c29-b413-69374d4c2565
[5]. Y.Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2):2–23, 2006.
[6]. J. Douceur. The sybil attack. In 1st International Workshop on Peer-to-Peer Systems - IPTPS,2002.
[7]. Andrew S. Tanembaum. Redes de computadores. Elsevier, Rio de Janeiro, 4ž edition edition,2003.
[8]. www.spamlaws.com/jamming-attacks.html
[9]. www.cambridge.org/us/catalogue/
[10]. Gustavo S. Quirino, Admilson R. L. Ribeiro and Edward David Moreno- Asymmetric Encryption in WirelessSensor Networks
Keywords
Jamming Attacks, Wireless Networks Elements, Crypto–logic Riddles, Enhanced Packet Delivery Techniques, wi-fi, Blue Tooth.