SlideShare une entreprise Scribd logo
1  sur  22
CHAPTER 4 Searching
Algorithm 4.1.1 Binary Search This algorithm searches for the value  key  in the nondecreasing array  L [ i ], ... , L[ j ]. If  key  is found, the algorithm returns an index  k  such that  L [ k ] equals  key . If  key  is not found, the algorithm returns -1, which is assumed not to be a valid index. Input Parameters:  L , i , j , key Output Parameters: None bsearch ( L , i , j , key ) { while ( i  =  j ) { k  = ( i  +  j )/2 if ( key  ==  L [ k ]) // found return  k if ( key  <  L [ k ]) // search first part j  =  k  - 1 else // search second part i  =  k  + 1 } return -1 // not found }
Algorithm 4.2.2 Depth-First Search This algorithm executes a depth-first search beginning at vertex start in a graph with vertices 1, ... ,  n  and outputs the vertices in the order in which they are visited. The graph is represented using adjacency lists;  adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex  i . Each node has members  ver , the vertex adjacent to  i , and  next , the next node in the linked list or null, for the last node in the linked list. To track visited vertices, the algorithm uses an array  visit ;  visit[i ] is set to true if vertex  i  has been visited or to false if vertex  i  has not been visited.
Input Parameters:  adj , start Output Parameters: None dfs ( adj , start )  { n  =  adj . last for  i  = 1 to  n visit [ i ] = false dfs_recurs ( adj , start ) } dfs_recurs ( adj , start ) { println ( start ) visit [ start ] = true trav  =  adj [ start ] while ( trav  != null) { v  =  trav . ver if (! visit [ v ]) dfs_recurs ( adj , v ) trav  =  trav . next } }
Algorithm 4.3.2 Breadth-First Search This algorithm executes a breadth-first search beginning at vertex  start  in a graph with vertices 1, ... ,  n  and outputs the vertices in the order in which they are visited. The graph is represented using adjacency lists;  adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex  i . Each node has members  ve r, the vertex adjacent to  i , and  next , a reference to the next node in the linked list or null, for the last node in the linked list. To track visited vertices, the algorithm uses an array  visit ;  visit [ i ] is set to true if vertex  i  has been visited or to false if vertex  i   has not been visited. The algorithm uses an initially empty queue  q  to store pending current vertices. The expression q . enqueue ( val ) adds  val  to  q . The expression q . front () returns the value at the front of  q  but does not remove it. The expression q . dequeue () removes the item at the front of  q . The expression q . empty () returns true if  q  is empty or false if  q  is not empty.
Input Parameters:  adj , start Output Parameters: None bfs ( adj , start )  { n  =  adj . last for  i  = 1 to  n visit [ i ] = false visit [ start ] = true println ( start ) q . enqueue ( start ) //  q  is an initially empty queue while (! q . empty ()) { current  =  q . front () q . dequeue () trav  =  adj [ current ] while ( trav  != null) { v  =  trav . ver if (! visit [ v ]) { visit [ v ] = true println ( v ) q . enqueue ( v ) } trav  =  trav . next } } }
Algorithm 4.3.4 Finding Shortest Path Lengths Using Breadth-First Search This algorithm finds the length of a shortest path from the start vertex  start to every other vertex in a graph with vertices 1, ... ,  n . The graph is represented using adjacency lists;  adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex  i . Each node has members  ve r, the vertex adjacent to  i , and  next , a reference to the next node in the linked list or null, for the last node in the linked list. In the array  length ,  length [ i ] is set to the length of a shortest path from start to vertex  i  if this length has been computed or to  ∞  if the length has not been computed. If there is no path from start to  i , when the algorithm terminates,  length [ i ] is  ∞ .
Input Parameters:  adj , start Output Parameters:  length shortest_paths ( adj , start , length )  { n  =  adj . last for  i  = 1 to  n length [ i ] = ∞ length [ start ] = 0 q . enqueue ( start ) //  q  is an initially empty queue while (! q . empty ()) { current  =  q . front () q . dequeue () trav  =  adj [ current ] while ( trav  != null) { v  =  trav . ver if ( length [ v ] == ∞) { length [ v ] = 1 +  length [ current ]  q . enqueue ( v ) } trav  =  trav . next } } }
Algorithm 4.4.1 Topological Sort This algorithm computes a topological sort of a directed acyclic graph with vertices 1, ... ,  n .  The vertices in the topological sort are stored in the array  ts . The graph is represented using adjacency lists;  adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex  i . Each node has members  ver , the vertex adjacent to  i , and  next , the next node in the linked list or null, for the last node in the linked list.  To track visited vertices, the algorithm uses an array  visit ;  visit[i ] is set to true if vertex  i  has been visited or to false if vertex  i   has not been visited.
Input Parameters:  adj Output Parameters:  ts top_sort ( adj , ts )  { n  =  adj . last //  k  is the index in  ts  where the next vertex is to be // stored in topological sort.  k  is assumed to be global. k  =  n for  i  = 1 to  n visit [ i ] = false for  i  = 1 to  n if (! visit [ v ]) top_sort_recurs ( adj , i , ts ) } top_sort_recurs ( adj , start , ts ) { visit [ start ] = true trav  =  adj [ start ] while ( trav  != null) { v  =  trav . ver if (! visit [ v ]) top_sort_recurs ( adj , v , ts ) trav  =  trav . next } ts [ k ] =  start k  =  k  - 1 }
Algorithm  n -Queens, Initial Version The  n -queens problem is to place n queens on an  n  ×  n  board so that no two queens are in the same row, column, or diagonal. Using backtracking, this algorithm outputs all solutions to this problem. We place queens successively in the columns beginning in the left column and working from top to bottom. When it is impossible to place a queen in a column, we return to the previous column and move its queen down.
n_queens ( n ) { rn_queens (1, n ) } rn_queens ( k , n ) { for  row [ k ] = 1 to  n if ( position_ok ( k , n )) if ( k  ==  n ) { for  i  = 1 to  n print ( row [ i ] + “ ”) println () } else rn_queens ( k  + 1, n ) } position_ok ( k , n ) for  i  = 1 to  k  - 1 //  abs  is absolute value if ( row [ k ] ==  row [ i ] ||  abs ( row [ k ] -  row [ i ]) ==  k  -  i ) return false return true }
Algorithm 4.5.2 Solving the  n -Queens Problem Using Backtracking The  n -queens problem is to place n queens on an  n  ×  n  board so that no two queens are in the same row, column, or diagonal. Using backtracking, this algorithm outputs all solutions to this problem. We place queens successively in the columns beginning in the left column and working from top to bottom. When it is impossible to place a queen in a column, we return to the previous column and move its queen down.
The value of  row [ k ] is the row where the queen in column  k  is placed. The algorithm begins when  n_queens  calls  rn_queens (1, n ). When rn_queens (k, n) is called, queens have been properly placed in columns 1 through  k  - 1, and rn_queens ( k , n ) tries to place a queen in column  k . If it is successful and  k equals  n , it prints a solution. If it is successful and  k  does not equal  n , it calls rn_queens ( k  + 1, n ). If it is not successful, it backtracks by returning to its caller rn_queens ( k  - 1 , n ). The value of  row_used [ r ] is true if a queen occupies row  r  and false otherwise. The value of  ddiag_used [ d ] is true if a queen occupies  ddiag  diagonal  d  and false otherwise. According to the numbering system used, the queen in column  k , row  r , is in  ddiag  diagonal  n  -  k  +  r . The value of  udiag_used [ d ] is true if a queen occupies  udiag  diagonal  d  and false otherwise. According to the numbering system used, the queen in column  k , row  r , is in  udiag   k  +  r  - 1. The function  position_ok ( k , n ) assumes that queens have been placed in columns 1 through  k  - 1. It returns true if the queen in column  k  does not conflict with the queens in columns 1 through  k - 1 or false if it does conflict.
Input Parameter:  n Output Parameters: None n_queens ( n ) { for  i  = 1 to  n row_used [ i ] = false for  i  = 1 to 2 *  n  - 1 ddiag_used [ i ] =  udiag_used [ i ] = false rn_queens (1, n ) } ...
... // When  rn_queens (k, n ) is called, queens have been // properly placed in columns 1 through  k  - 1. rn_queens ( k , n ) { for  row [ k ] = 1 to  n if ( position_ok ( k , n )) row_used [ row [ k ]] = true ddiag_used [ n  -  k  +  row [ k ]] = true udiag_used [ k  +  row [ k ] - 1] = true if ( k  ==  n ) { // Output a solution. Stop if only one  // solution is desired. for  i  = 1 to  n print ( row [ i ] + “ ”) println () } else rn_queens ( k  + 1, n ) row_used [ row [ k ]] = false ddiag_used [ n  -  k  +  row [ k ]] = false udiag_used [ k  +  row [ k ] - 1] = false } ...
... //  position_ok ( k , n ) returns true if the queen in column  k // does not conflict with the queens in columns 1 // through  k  - 1 or false if it does conflict. position_ok ( k , n ) return !( row_used [ row [ k ]] ||  ddiag_used [ n  -  k  +  row [ k ]] ||  udiag_used [ k  +  row [ k ] - 1 ]) }
Form of Backtracking Algorithm Suppose that we solve a problem using backtracking as in Algorithm 4.5.2 in which the solution is of the form  x [1], ... ,  x [ n ]. Suppose also that the values of  x [ i ] are in the set  S  (e.g., in Algorithm 4.5.2, S  = {1, . . . ,  n }).  We require a function  bound ( k ) with the following property. Whenever x [1], ... ,  x [ k  - 1] is a partial solution and  x [ k ] has been assigned a value, then  bound ( k ) has to return true if x [1], ... ,  x [ k ] is a partial solution and false otherwise. The key to writing a useful back- tracking algorithm is to write an efficient bound function that eliminates many potential nodes from the search tree.
The general form of a backtracking algorithm is backtrack(n) { rbacktrack(1,n) } rbacktrack(k,n) { for each x[k]    S if (bound(k)) if (k == n) { // Output a solution. Stop if only for i = 1 to n // one solution is desired. print(x[i] + “ ”) println() } else rbacktrack(k + 1, n) }
Algorithm 4.5.4 Searching for a Hamiltonian Cycle This algorithm inputs a graph with vertices 1, ... ,  n . The graph is represented as an adjacency matrix  adj ;  adj [ i ][ j ] is true if ( i , j ) is an edge or false if it is not an edge. If the graph has a Hamiltonian cycle, the algorithm computes one such cycle ( x [1], ... ,  x [ n ], x[1]). If the graph has no Hamiltonian cycle, the algorithm returns false and the contents of the array  x  are not specified. In the array  used ,  used [ i ] is true if  i  has been selected as one of the vertices in a potential Hamiltonian cycle or false if  i  has not been selected. The function  path_ok ( adj , k , x ) assumes that ( x [1], ... ,  x [ k  - 1]) is a path from  x [1] to  x [ k  - 1] and that the vertices  x [1], ... ,  x [ k  - 1] are distinct. It then checks whether  x [ k ] is different from each of  x [1], ... ,  x [ k  - 1] and whether ( x [ k  - 1],  x [ k ]) is an edge. If  k  =  n ,  path_ok  also checks whether ( x [ n ],  x [1]) is an edge.
Input Parameter:  adj Output Parameter:  x hamilton ( adj , x ) { n  =  adj . last x [1] = 1 used [1] = true for  i  = 2 to  n used [ i ] = false rhamilton ( adj ,2, x ) } rhamilton ( adj , k , x ) { n  =  adj . last for  x [ k ] = 2 to  n if ( path_ok ( adj , k , x )) { used [ x [ k ]] = true if ( k  ==  n  ||  rhamilton ( adj , k  + 1, x )) return true used [ x [ k ]] = false } return false } ...
... path_ok ( adj , k , x ) { n  =  adj . last if ( used [ x [ k ]]) return false if ( k  <  n ) return  adj [ x [ k  - 1]][ x [ k ]] else return  adj [ x [ n  - 1]][ x [ n ]] &&  adj [ x [1]][ x [ n ]] }

Contenu connexe

Tendances

Null space, Rank and nullity theorem
Null space, Rank and nullity theoremNull space, Rank and nullity theorem
Null space, Rank and nullity theorem
Ronak Machhi
 
Merge sort
Merge sortMerge sort
Merge sort
Kumar
 
Lect11 Sorting
Lect11 SortingLect11 Sorting
Lect11 Sorting
ryokollll
 
Insersion & Bubble Sort in Algoritm
Insersion & Bubble Sort in AlgoritmInsersion & Bubble Sort in Algoritm
Insersion & Bubble Sort in Algoritm
Ehsan Ehrari
 
Eigenvectors & Eigenvalues: The Road to Diagonalisation
Eigenvectors & Eigenvalues: The Road to DiagonalisationEigenvectors & Eigenvalues: The Road to Diagonalisation
Eigenvectors & Eigenvalues: The Road to Diagonalisation
Christopher Gratton
 

Tendances (20)

Sorting
SortingSorting
Sorting
 
Sorting algorithms
Sorting algorithmsSorting algorithms
Sorting algorithms
 
Lec2
Lec2Lec2
Lec2
 
algorithm unit 1
algorithm unit 1algorithm unit 1
algorithm unit 1
 
Null space, Rank and nullity theorem
Null space, Rank and nullity theoremNull space, Rank and nullity theorem
Null space, Rank and nullity theorem
 
Merge sort
Merge sortMerge sort
Merge sort
 
Algorithm designing using divide and conquer algorithms
Algorithm designing using divide and conquer algorithmsAlgorithm designing using divide and conquer algorithms
Algorithm designing using divide and conquer algorithms
 
Eigenvalue problems .ppt
Eigenvalue problems .pptEigenvalue problems .ppt
Eigenvalue problems .ppt
 
Lect11 Sorting
Lect11 SortingLect11 Sorting
Lect11 Sorting
 
Presentation
PresentationPresentation
Presentation
 
Brute force
Brute forceBrute force
Brute force
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
 
Insersion & Bubble Sort in Algoritm
Insersion & Bubble Sort in AlgoritmInsersion & Bubble Sort in Algoritm
Insersion & Bubble Sort in Algoritm
 
Eigenvectors & Eigenvalues: The Road to Diagonalisation
Eigenvectors & Eigenvalues: The Road to DiagonalisationEigenvectors & Eigenvalues: The Road to Diagonalisation
Eigenvectors & Eigenvalues: The Road to Diagonalisation
 
01.02 linear equations
01.02 linear equations01.02 linear equations
01.02 linear equations
 
algorithm Unit 5
algorithm Unit 5 algorithm Unit 5
algorithm Unit 5
 
Sorting
SortingSorting
Sorting
 
algorithm Unit 3
algorithm Unit 3algorithm Unit 3
algorithm Unit 3
 
Deterministic finite automata
Deterministic finite automata Deterministic finite automata
Deterministic finite automata
 
Algorithm Assignment Help
Algorithm Assignment HelpAlgorithm Assignment Help
Algorithm Assignment Help
 

En vedette (20)

Lecture916
Lecture916Lecture916
Lecture916
 
Lecture911
Lecture911Lecture911
Lecture911
 
Chap03alg
Chap03algChap03alg
Chap03alg
 
Recursive
RecursiveRecursive
Recursive
 
Union Avoidance
Union AvoidanceUnion Avoidance
Union Avoidance
 
Python
PythonPython
Python
 
Gagasan perda perlindungan anak kota bandung, juli 2011
Gagasan perda perlindungan anak kota bandung, juli 2011Gagasan perda perlindungan anak kota bandung, juli 2011
Gagasan perda perlindungan anak kota bandung, juli 2011
 
Disco Dirt Evaluation
Disco Dirt EvaluationDisco Dirt Evaluation
Disco Dirt Evaluation
 
Chap02alg
Chap02algChap02alg
Chap02alg
 
Protsesor
ProtsesorProtsesor
Protsesor
 
プレゼン ドラフト 120619
プレゼン ドラフト 120619プレゼン ドラフト 120619
プレゼン ドラフト 120619
 
Barrier of packaging
Barrier of packagingBarrier of packaging
Barrier of packaging
 
Chap08alg
Chap08algChap08alg
Chap08alg
 
Hybrid worlds fungi updated - crews
Hybrid worlds   fungi updated - crewsHybrid worlds   fungi updated - crews
Hybrid worlds fungi updated - crews
 
Tobch lecture
Tobch lectureTobch lecture
Tobch lecture
 
Lecture911
Lecture911Lecture911
Lecture911
 
Raporti Mbi Shqiperine ... Raport Su Albania
Raporti Mbi Shqiperine ... Raport Su AlbaniaRaporti Mbi Shqiperine ... Raport Su Albania
Raporti Mbi Shqiperine ... Raport Su Albania
 
Brochure Subsidie- & Innovatieadvies
Brochure Subsidie- & InnovatieadviesBrochure Subsidie- & Innovatieadvies
Brochure Subsidie- & Innovatieadvies
 
Chap05alg
Chap05algChap05alg
Chap05alg
 
Resume
ResumeResume
Resume
 

Similaire à Chap04alg

13 recursion-120712074623-phpapp02
13 recursion-120712074623-phpapp0213 recursion-120712074623-phpapp02
13 recursion-120712074623-phpapp02
Abdul Samee
 
Skiena algorithm 2007 lecture11 breadth deapth first search
Skiena algorithm 2007 lecture11 breadth deapth first searchSkiena algorithm 2007 lecture11 breadth deapth first search
Skiena algorithm 2007 lecture11 breadth deapth first search
zukun
 

Similaire à Chap04alg (20)

N-Queens Combinatorial Problem - Polyglot FP for Fun and Profit – Haskell and...
N-Queens Combinatorial Problem - Polyglot FP for Fun and Profit – Haskell and...N-Queens Combinatorial Problem - Polyglot FP for Fun and Profit – Haskell and...
N-Queens Combinatorial Problem - Polyglot FP for Fun and Profit – Haskell and...
 
Chap07alg
Chap07algChap07alg
Chap07alg
 
Chap07alg
Chap07algChap07alg
Chap07alg
 
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycleBacktracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
Backtracking-N Queens Problem-Graph Coloring-Hamiltonian cycle
 
Algo
AlgoAlgo
Algo
 
Graph applications chapter
Graph applications chapterGraph applications chapter
Graph applications chapter
 
Data structure 8.pptx
Data structure 8.pptxData structure 8.pptx
Data structure 8.pptx
 
Unit 4 jwfiles
Unit 4 jwfilesUnit 4 jwfiles
Unit 4 jwfiles
 
Chap12alg
Chap12algChap12alg
Chap12alg
 
Chap12alg
Chap12algChap12alg
Chap12alg
 
Chap11alg
Chap11algChap11alg
Chap11alg
 
Chap11alg
Chap11algChap11alg
Chap11alg
 
Backtracking
BacktrackingBacktracking
Backtracking
 
Chap06alg
Chap06algChap06alg
Chap06alg
 
Chap06alg
Chap06algChap06alg
Chap06alg
 
13 recursion-120712074623-phpapp02
13 recursion-120712074623-phpapp0213 recursion-120712074623-phpapp02
13 recursion-120712074623-phpapp02
 
Unit 3 daa
Unit 3 daaUnit 3 daa
Unit 3 daa
 
CSE680-07QuickSort.pptx
CSE680-07QuickSort.pptxCSE680-07QuickSort.pptx
CSE680-07QuickSort.pptx
 
Daa chapter11
Daa chapter11Daa chapter11
Daa chapter11
 
Skiena algorithm 2007 lecture11 breadth deapth first search
Skiena algorithm 2007 lecture11 breadth deapth first searchSkiena algorithm 2007 lecture11 breadth deapth first search
Skiena algorithm 2007 lecture11 breadth deapth first search
 

Plus de Munhchimeg (20)

Ded algorithm1
Ded algorithm1Ded algorithm1
Ded algorithm1
 
Ded algorithm
Ded algorithmDed algorithm
Ded algorithm
 
Tobch lecture1
Tobch lecture1Tobch lecture1
Tobch lecture1
 
Lecture916
Lecture916Lecture916
Lecture916
 
Lecture915
Lecture915Lecture915
Lecture915
 
Lecture914
Lecture914Lecture914
Lecture914
 
Lecture913
Lecture913Lecture913
Lecture913
 
Lecture912
Lecture912Lecture912
Lecture912
 
Lecture910
Lecture910Lecture910
Lecture910
 
Lecture9
Lecture9Lecture9
Lecture9
 
Lecture8
Lecture8Lecture8
Lecture8
 
Lecture7
Lecture7Lecture7
Lecture7
 
Lecture6
Lecture6Lecture6
Lecture6
 
Lecture5
Lecture5Lecture5
Lecture5
 
Lecture4
Lecture4Lecture4
Lecture4
 
Lecture3
Lecture3Lecture3
Lecture3
 
Protsesor
ProtsesorProtsesor
Protsesor
 
Pm104 standard
Pm104 standardPm104 standard
Pm104 standard
 
Pm104 2004 2005
Pm104 2004 2005Pm104 2004 2005
Pm104 2004 2005
 
Lecture915
Lecture915Lecture915
Lecture915
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Chap04alg

  • 2. Algorithm 4.1.1 Binary Search This algorithm searches for the value key in the nondecreasing array L [ i ], ... , L[ j ]. If key is found, the algorithm returns an index k such that L [ k ] equals key . If key is not found, the algorithm returns -1, which is assumed not to be a valid index. Input Parameters: L , i , j , key Output Parameters: None bsearch ( L , i , j , key ) { while ( i = j ) { k = ( i + j )/2 if ( key == L [ k ]) // found return k if ( key < L [ k ]) // search first part j = k - 1 else // search second part i = k + 1 } return -1 // not found }
  • 3. Algorithm 4.2.2 Depth-First Search This algorithm executes a depth-first search beginning at vertex start in a graph with vertices 1, ... , n and outputs the vertices in the order in which they are visited. The graph is represented using adjacency lists; adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex i . Each node has members ver , the vertex adjacent to i , and next , the next node in the linked list or null, for the last node in the linked list. To track visited vertices, the algorithm uses an array visit ; visit[i ] is set to true if vertex i has been visited or to false if vertex i has not been visited.
  • 4. Input Parameters: adj , start Output Parameters: None dfs ( adj , start ) { n = adj . last for i = 1 to n visit [ i ] = false dfs_recurs ( adj , start ) } dfs_recurs ( adj , start ) { println ( start ) visit [ start ] = true trav = adj [ start ] while ( trav != null) { v = trav . ver if (! visit [ v ]) dfs_recurs ( adj , v ) trav = trav . next } }
  • 5. Algorithm 4.3.2 Breadth-First Search This algorithm executes a breadth-first search beginning at vertex start in a graph with vertices 1, ... , n and outputs the vertices in the order in which they are visited. The graph is represented using adjacency lists; adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex i . Each node has members ve r, the vertex adjacent to i , and next , a reference to the next node in the linked list or null, for the last node in the linked list. To track visited vertices, the algorithm uses an array visit ; visit [ i ] is set to true if vertex i has been visited or to false if vertex i has not been visited. The algorithm uses an initially empty queue q to store pending current vertices. The expression q . enqueue ( val ) adds val to q . The expression q . front () returns the value at the front of q but does not remove it. The expression q . dequeue () removes the item at the front of q . The expression q . empty () returns true if q is empty or false if q is not empty.
  • 6. Input Parameters: adj , start Output Parameters: None bfs ( adj , start ) { n = adj . last for i = 1 to n visit [ i ] = false visit [ start ] = true println ( start ) q . enqueue ( start ) // q is an initially empty queue while (! q . empty ()) { current = q . front () q . dequeue () trav = adj [ current ] while ( trav != null) { v = trav . ver if (! visit [ v ]) { visit [ v ] = true println ( v ) q . enqueue ( v ) } trav = trav . next } } }
  • 7. Algorithm 4.3.4 Finding Shortest Path Lengths Using Breadth-First Search This algorithm finds the length of a shortest path from the start vertex start to every other vertex in a graph with vertices 1, ... , n . The graph is represented using adjacency lists; adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex i . Each node has members ve r, the vertex adjacent to i , and next , a reference to the next node in the linked list or null, for the last node in the linked list. In the array length , length [ i ] is set to the length of a shortest path from start to vertex i if this length has been computed or to ∞ if the length has not been computed. If there is no path from start to i , when the algorithm terminates, length [ i ] is ∞ .
  • 8. Input Parameters: adj , start Output Parameters: length shortest_paths ( adj , start , length ) { n = adj . last for i = 1 to n length [ i ] = ∞ length [ start ] = 0 q . enqueue ( start ) // q is an initially empty queue while (! q . empty ()) { current = q . front () q . dequeue () trav = adj [ current ] while ( trav != null) { v = trav . ver if ( length [ v ] == ∞) { length [ v ] = 1 + length [ current ] q . enqueue ( v ) } trav = trav . next } } }
  • 9. Algorithm 4.4.1 Topological Sort This algorithm computes a topological sort of a directed acyclic graph with vertices 1, ... , n . The vertices in the topological sort are stored in the array ts . The graph is represented using adjacency lists; adj [ i ] is a reference to the first node in a linked list of nodes representing the vertices adjacent to vertex i . Each node has members ver , the vertex adjacent to i , and next , the next node in the linked list or null, for the last node in the linked list. To track visited vertices, the algorithm uses an array visit ; visit[i ] is set to true if vertex i has been visited or to false if vertex i has not been visited.
  • 10. Input Parameters: adj Output Parameters: ts top_sort ( adj , ts ) { n = adj . last // k is the index in ts where the next vertex is to be // stored in topological sort. k is assumed to be global. k = n for i = 1 to n visit [ i ] = false for i = 1 to n if (! visit [ v ]) top_sort_recurs ( adj , i , ts ) } top_sort_recurs ( adj , start , ts ) { visit [ start ] = true trav = adj [ start ] while ( trav != null) { v = trav . ver if (! visit [ v ]) top_sort_recurs ( adj , v , ts ) trav = trav . next } ts [ k ] = start k = k - 1 }
  • 11. Algorithm n -Queens, Initial Version The n -queens problem is to place n queens on an n × n board so that no two queens are in the same row, column, or diagonal. Using backtracking, this algorithm outputs all solutions to this problem. We place queens successively in the columns beginning in the left column and working from top to bottom. When it is impossible to place a queen in a column, we return to the previous column and move its queen down.
  • 12. n_queens ( n ) { rn_queens (1, n ) } rn_queens ( k , n ) { for row [ k ] = 1 to n if ( position_ok ( k , n )) if ( k == n ) { for i = 1 to n print ( row [ i ] + “ ”) println () } else rn_queens ( k + 1, n ) } position_ok ( k , n ) for i = 1 to k - 1 // abs is absolute value if ( row [ k ] == row [ i ] || abs ( row [ k ] - row [ i ]) == k - i ) return false return true }
  • 13. Algorithm 4.5.2 Solving the n -Queens Problem Using Backtracking The n -queens problem is to place n queens on an n × n board so that no two queens are in the same row, column, or diagonal. Using backtracking, this algorithm outputs all solutions to this problem. We place queens successively in the columns beginning in the left column and working from top to bottom. When it is impossible to place a queen in a column, we return to the previous column and move its queen down.
  • 14. The value of row [ k ] is the row where the queen in column k is placed. The algorithm begins when n_queens calls rn_queens (1, n ). When rn_queens (k, n) is called, queens have been properly placed in columns 1 through k - 1, and rn_queens ( k , n ) tries to place a queen in column k . If it is successful and k equals n , it prints a solution. If it is successful and k does not equal n , it calls rn_queens ( k + 1, n ). If it is not successful, it backtracks by returning to its caller rn_queens ( k - 1 , n ). The value of row_used [ r ] is true if a queen occupies row r and false otherwise. The value of ddiag_used [ d ] is true if a queen occupies ddiag diagonal d and false otherwise. According to the numbering system used, the queen in column k , row r , is in ddiag diagonal n - k + r . The value of udiag_used [ d ] is true if a queen occupies udiag diagonal d and false otherwise. According to the numbering system used, the queen in column k , row r , is in udiag k + r - 1. The function position_ok ( k , n ) assumes that queens have been placed in columns 1 through k - 1. It returns true if the queen in column k does not conflict with the queens in columns 1 through k - 1 or false if it does conflict.
  • 15. Input Parameter: n Output Parameters: None n_queens ( n ) { for i = 1 to n row_used [ i ] = false for i = 1 to 2 * n - 1 ddiag_used [ i ] = udiag_used [ i ] = false rn_queens (1, n ) } ...
  • 16. ... // When rn_queens (k, n ) is called, queens have been // properly placed in columns 1 through k - 1. rn_queens ( k , n ) { for row [ k ] = 1 to n if ( position_ok ( k , n )) row_used [ row [ k ]] = true ddiag_used [ n - k + row [ k ]] = true udiag_used [ k + row [ k ] - 1] = true if ( k == n ) { // Output a solution. Stop if only one // solution is desired. for i = 1 to n print ( row [ i ] + “ ”) println () } else rn_queens ( k + 1, n ) row_used [ row [ k ]] = false ddiag_used [ n - k + row [ k ]] = false udiag_used [ k + row [ k ] - 1] = false } ...
  • 17. ... // position_ok ( k , n ) returns true if the queen in column k // does not conflict with the queens in columns 1 // through k - 1 or false if it does conflict. position_ok ( k , n ) return !( row_used [ row [ k ]] || ddiag_used [ n - k + row [ k ]] || udiag_used [ k + row [ k ] - 1 ]) }
  • 18. Form of Backtracking Algorithm Suppose that we solve a problem using backtracking as in Algorithm 4.5.2 in which the solution is of the form x [1], ... , x [ n ]. Suppose also that the values of x [ i ] are in the set S (e.g., in Algorithm 4.5.2, S = {1, . . . , n }). We require a function bound ( k ) with the following property. Whenever x [1], ... , x [ k - 1] is a partial solution and x [ k ] has been assigned a value, then bound ( k ) has to return true if x [1], ... , x [ k ] is a partial solution and false otherwise. The key to writing a useful back- tracking algorithm is to write an efficient bound function that eliminates many potential nodes from the search tree.
  • 19. The general form of a backtracking algorithm is backtrack(n) { rbacktrack(1,n) } rbacktrack(k,n) { for each x[k]  S if (bound(k)) if (k == n) { // Output a solution. Stop if only for i = 1 to n // one solution is desired. print(x[i] + “ ”) println() } else rbacktrack(k + 1, n) }
  • 20. Algorithm 4.5.4 Searching for a Hamiltonian Cycle This algorithm inputs a graph with vertices 1, ... , n . The graph is represented as an adjacency matrix adj ; adj [ i ][ j ] is true if ( i , j ) is an edge or false if it is not an edge. If the graph has a Hamiltonian cycle, the algorithm computes one such cycle ( x [1], ... , x [ n ], x[1]). If the graph has no Hamiltonian cycle, the algorithm returns false and the contents of the array x are not specified. In the array used , used [ i ] is true if i has been selected as one of the vertices in a potential Hamiltonian cycle or false if i has not been selected. The function path_ok ( adj , k , x ) assumes that ( x [1], ... , x [ k - 1]) is a path from x [1] to x [ k - 1] and that the vertices x [1], ... , x [ k - 1] are distinct. It then checks whether x [ k ] is different from each of x [1], ... , x [ k - 1] and whether ( x [ k - 1], x [ k ]) is an edge. If k = n , path_ok also checks whether ( x [ n ], x [1]) is an edge.
  • 21. Input Parameter: adj Output Parameter: x hamilton ( adj , x ) { n = adj . last x [1] = 1 used [1] = true for i = 2 to n used [ i ] = false rhamilton ( adj ,2, x ) } rhamilton ( adj , k , x ) { n = adj . last for x [ k ] = 2 to n if ( path_ok ( adj , k , x )) { used [ x [ k ]] = true if ( k == n || rhamilton ( adj , k + 1, x )) return true used [ x [ k ]] = false } return false } ...
  • 22. ... path_ok ( adj , k , x ) { n = adj . last if ( used [ x [ k ]]) return false if ( k < n ) return adj [ x [ k - 1]][ x [ k ]] else return adj [ x [ n - 1]][ x [ n ]] && adj [ x [1]][ x [ n ]] }