Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

EXERCISES for Section 4.2

In Exercises 4.2.1 through 4.2.7, draw the depth-first tree that results when Algorithm 4.2.1 is applied to the graph shown below, starting at the specified vertex. Include the dfnumbers and use: (a) lexicographic order as the default priority; (b) reverse lexico¬graphic order as the default priority.

4.2.1s Vertex w.
4.2.2 Vertex u.
4.2.3 Vertex x.
4.2.4 Vertex y.
4.2.5s Vertex t.
4.2.6 Vertex z.
4.2.7 Vertex s.

EXERCISES for Section 4.3

Larcises 4.3.1 through 4.3.4, apply prior's algorithm (Algorithm 4.3.1) to the given w ighled graph, starting at vertex s and resolving ties as in Example 4.3.1. Draw the minimum spanning tree that results, and indicate its total weight. Also give the discovery number at each vertex.

In Exercises 4.3.5 through 4.3.8, apply Dijkstra's algorithm (Algorithm 4.3.2) to the given weighted graph, starting at vertex s and resolving ties as in Example 4.3.3. Draw the shortest-path tree that results, and indicate for each vertex v, the discovery number and the distance from vertex s to v.

4.3.5s The graph of Exercise       4.3.1. 4.3.6 The graph of Exercise 4.3.2.
4.3.7 The graph of Exercise         4.3.3. 4.3.8 The graph of Exercise 4.3.4.

4.3.9 Suppose that the weighted graph shown below represents a communication network, where the weight pii on arc ij is the probability that the link from i to j does not fail. If the link failures are independent of one another, then the probability that a path does not fail is the product of the link probabilities for that path. Under this assumption, find the most reliable path from s to t. (Hint: Consider -logiopii.)

EXERCISES for Section 4.4

In Exercises 4.4.1 through 4.4.7, (a) give the dfnumber and low values for each vertex that result from a depth-first search on the graph shown, starting at the specified vertex. Use the alphabetical order of the vertex names as the default priority; (b) verify the characterization given by Corollary 4.4.12 for the calculations of part (a).

4.4.1s Vertex a.
4.4.2 Vertex b.
4.4.3 Vertex c.
4.4.4 Vertex e.
4.4.5s Vertex g.
4.4.6 Vertex i.
4.4.7 Vertex f .

4.4.8 Prove that a postorder traversal of a depth-first tree reproduces the finish order of the depth-first search.

EXERCISES for Section 5.4

In Exercises 5.4.1 through 5.4.4, identify the blocks in the given graph and draw the block graph.

5.4.1s

In Exercises 6.1.6 through 6.1.9, apply Algorithm 6.1.1 to construct an E ulFrian tour of the given graph. Begin the construction at vertex s.

252 Chapter 6 OPTIMAL GRAPH TRAVERSALS

In Exercises 6.1.16 through 6.1.19, use an appropriate modification of Algorithm 6.1.1 to construct an eulerian tour or open eulerian trail in the given digraph.

In Exercises 6.2.12 through 6.2.15, apply Algorithm 6.2.2 to find a minimum-weight postman tour for the given weighted graph. Determine whether the solution is unique.

In Exercises 6.3.6 through 6.3.10, draw the specified graph or prove that it does not exist.

6.3.6s An 8-vertex simple graph with more than 8 edges that is both eulerian and hamiltonian.

6.3.7 An 8-vertex simple graph with more than 8 edges that is eulerian but not hamiltonian.

6.3.8 An 8-vertex simple graph with more than 8 edges that is hamiltonian but not eulerian.

6.3.9 An 8-vertex simple hamiltonian graph that does not satisfy the conditions of Ore's theorem.

6.3.10 A 6-vertex simple graph with 10 edges that is not hamiltonian.

Attachment:- Graph Theory.pdf

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92074886

Have any Question?


Related Questions in Computer Engineering

Given a list of numbers l a value x is said to be a

Given a list of numbers L, a value x is said to be a majority value if the value of over half the elements in L is x; in other words, if L has n elements and nx is the number of elements in L with value x, then x is a ma ...

Regards to cin what programming situations would the use of

Regards to C++ In what programming situations would the use of an array be beneficial? What situations would not warrant the use of an array? Provide an example showing why. Research the concept of C++ vectors. Describe ...

1 a university found that 10 of students withdraw from a

1. A university found that 10% of students withdraw from a math course. Assume 25 students are enrolled. a. Write the appropriate probability distribution function with the specific parameters for this problem. b. Comput ...

Systems and networksconsider sending a large file from a

(Systems and Networks) Consider sending a large file from a host to another host using a reliable connection such as TCP. Suppose the reliable connection uses additive-increase, multiplicative-decrease (AIMD) without slo ...

For a small computer design with 8-instructions suppose the

For a small computer design with 8-instructions. Suppose the processor is modified such that it can is 21-bit processor and can address 2^16 Memory locations: 1. What is the word size? 2. How that will affect the size of ...

In a survey of 3236 adults 1470 say they have started

In a survey of 3236 adults, 1470 say they have started paying bills online in the last year. Construct a? 99% confidence interval for the population proportion. Interpret the results.

When searching for the entry x within the list r s t u v w

When searching for the entry X within the list R, S, T, U, V, W, Z how many entries will be considered before discovering that the entry is not present? (Note that the list is in alphabetical order.)

We talked a few times about slow migration from ipv4 to

We talked a few times about slow migration from IPv4 to IPv6 in the U.S. What was the primary motivating factor to migrate to IPv6? What are two other advantages of IPv6 over IPv4? Why is China farther along in implement ...

Write a program to calculate the average temperature for

Write a program to calculate the average temperature for the year and determine the hottest month of the year. In your main method, the program should collect the user input of the average Fahrenheit temperatures for eac ...

Sql for databasebuild a query of all students on athletic

Sql for database Build a query of all students on athletic scholarship. Additionally, produce a report with descriptive report and column headings. Be sure there is enough data to prove the selection and sort worked as r ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As