Illustrate a running of dijkstra''s algorithm on graph

Assignment Help Computer Engineering
Reference no: EM133210511

Question 1) Suppose that CONTROL, a secret U.S. government counterintelligence agency based in Washington, D.C., has build a communication network that links n stations spread across the world using m communication channels between pairs of stations. Suppose further that the evil spy agency, KAOS, is able to eavesdrop on some number, k, of these channels and that CONTROL knows the k channels that have been compromised. Now, CONTROL has a message, M, that it wants to send from its headquarters station, s, to one of its field stations, t. The problem is that the message is super secret and should traverse a path that minimizes the number of compromised edges that occur along this path. Explain how to model this problem as a shortest-path problem, and describe and analyze an efficient algorithm to solve it.

Question 2) Draw a simple, connected, weighted, undirected graph with 8 vertices and 16 edges, and with distinct edge weights. Identify one vertex as a "start" vertex and illustrate a running of Dijkstra's algorithm on this graph.

Question 3) Show how to modify Dijkstra's algorithm to not only output the distance from v to each vertex in G, but also to output a tree Trooted at v, such that the path in T from v to a vertex u is actually a shortest path in G from v to u.

Question 4) Suppose you are given a connected weighted undirected graph, G, with n vertices and m edges, such that the weight of each edge in G is an integer in the interval 1,c, for a fixed constant c>0. Show how to solve the single-source shortest-paths problem, for any given vertex v, in G, in time O(n+m).

Hint: Think about how to exploit the fact that the distance from v to any other vertex in G can be at most O(cn)=O(n).

Reference no: EM133210511

Questions Cloud

Automate the infrastructure using terraform : You are asked to automate the infrastructure using Terraform first and install other required automation tools in it - DevOps methodology and in order
Calculate tax and net_salary : Calculate tax and net_salary and print the information of all employees in formatted output.
Describe organizations management : Describe how your organization's management should work with the stakeholders that are in each group.
Explain the design of your proposed research : Topic - Juvenile Delinquency and Crime - Research Design - Draft - Here, you will explain the design of your proposed research
Illustrate a running of dijkstra''s algorithm on graph : Draw a simple, connected, weighted, undirected graph with 8 vertices and 16 edges, and with distinct edge weights. Identify one vertex as a "start" vertex
Write a summary on the types of hackers : Using a critical thinking perspective (generally: positive, negative, and opinion) write a 5-6 paragraph summary on the types of hackers
What is multiplexing and demultiplexing : Explain, in your own words, what is multiplexing and demultiplexing and How many selection input bits are needed by the decoder of this simple multiplexer
Write about a company history and interning : Write about a company's history and interning there - Company name - Enterprise - Rent-A-Car. A description of the company, the department in which you worked
Discuss issues involved during desktop reconfiguration : Most computer users like to reconfigure their desktop settings. Theoretically, this should not be a security hazard. However, there are other issues

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the fundamental components of a distributed system

Describe the fundamental components of a distributed system. Compare and contrast advantages and disadvantages of at least 2 distributed system architectures.

  Prove that finding an acceptable arrangement

"Marge may not point her arms up while Ned, Apu, and Smithers point their arms down." Prove that finding an acceptable arrangement of arm positions is NP-hard.

  Find the primes p and q

Find the primes p and q. Find the decoding key, d, using the Euclidean Algorithm. Encode "Eleven" with the public key.

  Create a software assurance guidelines document

Create a software assurance guidelines document shell in Word. Select an existing organization, or identify a hypothetical organization that fits requirements.

  Determine how detects network vulnerabilities

Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network.

  Plan a future proofing data-driven information system

COIT12209 - Data Science - Central Queensland University - plan a future proofing data-driven information system to better facilitate the payment

  Write the relational schema and draw its dependency diagram

Write the relational schema, draw its dependency diagram, and identify all dependencies, including all partial and transitive dependencies.

  Why timer-counter comparison circuit can wait for comparison

Explain why the timer/counter comparison circuit in Figure can wait for a comparison up to 2 counter clock cycles away even though the counter overflows.

  Modify java application that displays the product number

make a Java application that displays the product number, the name of the product, the number of units in stock, the price of each unit, and the value of the inventory (the number of units in stock multiplied by the price of each unit).

  Explaining what is e-commerce and mobile technology

Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help.

  Explain benefits of performing pandemic risk assessment

Work Area Recovery Plan is a vital plan that establishes an adequate environment for people to work in the event of a disruptive incident.

  Show that any subset of a countable set is countable

Prove that for any finite alphabet S, S* is countable. Show that any subset of a countable set is countable.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd