Illustrate a running of dijkstra''s algorithm on graph

Assignment Help Computer Engineering
Reference no: EM133210511

Question 1) Suppose that CONTROL, a secret U.S. government counterintelligence agency based in Washington, D.C., has build a communication network that links n stations spread across the world using m communication channels between pairs of stations. Suppose further that the evil spy agency, KAOS, is able to eavesdrop on some number, k, of these channels and that CONTROL knows the k channels that have been compromised. Now, CONTROL has a message, M, that it wants to send from its headquarters station, s, to one of its field stations, t. The problem is that the message is super secret and should traverse a path that minimizes the number of compromised edges that occur along this path. Explain how to model this problem as a shortest-path problem, and describe and analyze an efficient algorithm to solve it.

Question 2) Draw a simple, connected, weighted, undirected graph with 8 vertices and 16 edges, and with distinct edge weights. Identify one vertex as a "start" vertex and illustrate a running of Dijkstra's algorithm on this graph.

Question 3) Show how to modify Dijkstra's algorithm to not only output the distance from v to each vertex in G, but also to output a tree Trooted at v, such that the path in T from v to a vertex u is actually a shortest path in G from v to u.

Question 4) Suppose you are given a connected weighted undirected graph, G, with n vertices and m edges, such that the weight of each edge in G is an integer in the interval 1,c, for a fixed constant c>0. Show how to solve the single-source shortest-paths problem, for any given vertex v, in G, in time O(n+m).

Hint: Think about how to exploit the fact that the distance from v to any other vertex in G can be at most O(cn)=O(n).

Reference no: EM133210511

Questions Cloud

Automate the infrastructure using terraform : You are asked to automate the infrastructure using Terraform first and install other required automation tools in it - DevOps methodology and in order
Calculate tax and net_salary : Calculate tax and net_salary and print the information of all employees in formatted output.
Describe organizations management : Describe how your organization's management should work with the stakeholders that are in each group.
Explain the design of your proposed research : Topic - Juvenile Delinquency and Crime - Research Design - Draft - Here, you will explain the design of your proposed research
Illustrate a running of dijkstra''s algorithm on graph : Draw a simple, connected, weighted, undirected graph with 8 vertices and 16 edges, and with distinct edge weights. Identify one vertex as a "start" vertex
Write a summary on the types of hackers : Using a critical thinking perspective (generally: positive, negative, and opinion) write a 5-6 paragraph summary on the types of hackers
What is multiplexing and demultiplexing : Explain, in your own words, what is multiplexing and demultiplexing and How many selection input bits are needed by the decoder of this simple multiplexer
Write about a company history and interning : Write about a company's history and interning there - Company name - Enterprise - Rent-A-Car. A description of the company, the department in which you worked
Discuss issues involved during desktop reconfiguration : Most computer users like to reconfigure their desktop settings. Theoretically, this should not be a security hazard. However, there are other issues

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd