Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Let G = (V,E) be a graph for which all nodes have degree 5 and where G is 5-edge is connected.

a) Show that the vector x which is indexed by the edges E and for which xe= 1/5 for all e in E is in the Perfect Matching Polytope PPM.

b) Use your result in a) to show that G must have a perfect matching.

c) Show that b) may not be true if G is only 1-edge connected (but still has degree 5 everywhere) by giving an ex of such a graph G which has no perfect matching.
 
problem 2:

a) Find the shortest paths from r to all other nodes in the digraph G = (V,E) shown below using the Bellman-Ford algorithm (as taught in class). Please show your work, and draw the final shortest dipath tree on a copy of a diagram of the digraph.

1186_bellman ford algorithm.jpg

b) Using the potential y found in a), find a new set of costs c* for G which are non-negative, and preserve shortest dipaths.  

problem 3: Demonstrate that Dijkstra’s algorithm does not necessarily work if some of the costs are negative by finding a digraph with negative costs (but no negative cost dicircuits) for which it fails. You must also demonstrate that Dijkstra’s algorithm fails on your ex.
 
problem 4: Find a minimum cost spanning arborescence rooted at r for the digraph shown below, using the final algorithm shown in class. Please show your work, and also give a final diagram which shows your solution on the digraph, and states its final cost.

1162_digraph.jpg


problem 5:

a) Given a digraph G = (V,E), prove that if we add a constant k to the length of every arc coming out from the root node r, the shortest path tree remains the same. Do this by using potentials: 

i) Show there is a potential y* for the new costs for which the paths in the tree to each node v have cost  y*v, and

ii) describe why this proves it. What is the relationship between the shortest path distances of the modified problem and those of the original problem? 
 
b) Can adding a constant k to the length of every arc coming out from a non-root node produce a change in the shortest path tree?  Justify your answer.
 
problem 6: Normally a potential y satisfies yr = 0 and 0  ≥ yw – cvw –yv. Given an integer K ≥ 0, define a K-potential to be an array y that satisfies yr = 0 and K ≥ yw – cvw –yv. Show that for a K-potential y we have that for each node v, yv is within Kn of being the cost of an optimal r-v dipath, i.e. show c(P) + Kn ≥ yv for any r to v dipath P in G.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91057

Have any Question? 


Related Questions in Computer Engineering

The server is starting to run slower and slower how do you

The server is starting to run slower and slower. How do you determine whether you need more RAM, a faster disk subsystem, or something else?

1 list four types of delays in a packet-switched network2

1. List four types of delays in a packet-switched network. 2. In Figure 18.10, assume that the link between R1 and R2 is upgraded to 170 kbps and the link between the source host and R1 is now downgraded to 140 kbps. Wha ...

1 using the cidr notation show the ipv6 address compatible

1. Using the CIDR notation, show the IPv6 address compatible to the IPv4 address 129.6.12.34. 2. Using the CIDR notation, show the IPv6 address mapped to the IPv4 address 129.6.12.34. 3. Using the CIDR notation, show the ...

We consider the long-term security of the advanced

We consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time. ...

1 investigate how netscape navigator and internet explorer

1. Investigate how Netscape Navigator and Internet Explorer implemented SSL technology. 2. Study both SSL and S-HTTP. Show that these two protocols have a lot in common. However, the two protocols have some differences. ...

1 show that all of the stack adt operations have a constant

1. Show that all of the Stack ADT operations have a constant time in the worst case when implemented as a linked list. 2. Would it buy us anything to use a tail reference with the linked list structure used to implement ...

Assignmentyou have been recently hired to assist with

Assignment You have been recently hired to assist with purchasing computer forensics tools and resources for a major corporation. Using the concepts that you learned in chapters nine through twelve recommend specific too ...

Q 1 identify and explain the three major interrelated tasks

Q. 1 Identify and explain the three major interrelated tasks for creating 3-D animation. a. creating the objects and scenes b. defining motion c. rendering the final animation Q. 2 Identify and explain the advantages of ...

As is so often true in cryptography it is easy to weaken a

As is so often true in cryptography, it is easy to weaken a seemingly strong scheme by small modifications. Assume a variant of the OFB mode by which we only feed back the 8 most significant bits of the cipher output. We ...

Consider how enciphering of connections would affect

Consider how enciphering of connections would affect thumbprinting. a. If the connection contents were enciphered using an end-to-end encipherment protocol, would thumbprinting work? Why or why not? b. If the connection ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen