Write down dijkstra''s algorithm, Basic Computer Science

Assignment Help:

QUESTION

(a) Write down the Update Step in the Dijkstra's algorithm explaining its complexity.

(b) Propose a Generic Algorithm for Depth-First Search Algorithm, assuming the Initialisation procedure has already been implemented.

(c) Below is the algorithm of a flow decomposition algorithm.

begin

Initialize

while y ≠Ø do

begin

Select(s, y)

Search(s, y)

if a cycle C is found then do

begin

let D = Capacity(C, y)

Add Flow(D, C) to cycle flows

Subtract Flow(D, C) from y.

end

if a path P is found then do

begin

let D = Capacity(P, y)

Add Flow(D, P) to path flows

Subtract Flow(D, P) from y.

end

end

Describe the complexity of the following:

i) Selecting the initial node,

ii) Finding a cycle or a path,

iii) Update step.

(c) Write down Dijkstra's Algorithm, clearly indicating the variables used.


Related Discussions:- Write down dijkstra''s algorithm

Computer architecture, Subject Name CIT2193 COMPUTER ARCHITECTURE Topic AS...

Subject Name CIT2193 COMPUTER ARCHITECTURE Topic ASSIGNMENT Due Date 16 March 2012 Name : ……….…………………….……………….. Lecturer : ................................. Intake : ………………….

Explain se process model objective, Question 1 Explain attributes, propert...

Question 1 Explain attributes, properties, and characteristics of system Question 2 What do understand from Organizational Aspects of System Life Cycles? Explain Question

Simulated annealing-artificial intelligence, Simulated Annealing One wa...

Simulated Annealing One way to answer the problem of local maxima and related problems like ridges and plateaux in hill climbing is to permit the agent to go downhill to some e

DBMS, what is the meaning of data definition

what is the meaning of data definition

Discuss the attributes of speech codec, Question 1 What is mobile telephon...

Question 1 What is mobile telephone initialization? Explain the three main goals of this procedure Define GSM system operations Introduction to mobile telephone initializ

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Information security, can someone balance between information security and ...

can someone balance between information security and access, if yes,how can they balance?

Backup storage, Backup Storage: Back up (backing) storage, also termed...

Backup Storage: Back up (backing) storage, also termed external storage, is used to hold programs and data which are read into internal storage when required. The most common

MIS, information system providors

information system providors

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd