SlideShare une entreprise Scribd logo
1  sur  22
Presentation on prolog :
    Dijkstra’s Algorithm
A graph is defined as a set
of nodes and a set of edges, where
each edge is a pair of nodes.
There are several ways to
represent graphs in Prolog.
 One method is to represent each edge separately as one
 clause (fact).
                  • edge(1, 5). edge(1, 7). edge(2, 1). edge(2, 7). edge(3, 1). edge(3, 6).
                    edge(4, 3). edge(4, 5). edge(5, 8). edge(6, 4). edge(6, 5). edge(7, 5).
                    edge(8, 6). edge(8, 7).



                                    We call this edge-clause form
                        W
 Another method is to represent the whole graph as one
 data object. According to the definition of the graph as
 a pair of two sets (nodes and edges).
   EXAMPLE :
        graph([b,c,d,f,g,h,k],[e(b,c),e(b,f),e(c,f),e(f,k),e(g,h)]) .



   We call this graph-term form. Note, that the lists are
    kept sorted, they are really sets, without duplicated
    elements. Each edge appears only once in the edge list.

   The graph-term form is a default representation
 A third representation method is to associate with
 each node the set of nodes that are adjacent to that
 node .

 EXAMPLE:
          [n(b,[c,f]), n(c,[b,f]), n(d,[]), n(f,[b,c,k]), .........].
      
Directed graphs
  These are represented by ordered pairs
  To represent a directed graph, the forms discussed
  above are slightly modified. The example graph is
  represented as follows:
    When the edges are directed we call them arcs
         Arc-clause form
     

                 arc(s,u).
                 arc(u,r).
         Graph-term form
     
                 digraph([r,s,t,u,v],[a(s,r),a(s,u),a(u,r),a(u,s),a(v,u)])
         Adjacency-list form
     

                 [n(r,[]),n(s,[r,u]),n(t,[]),n(u,[r]),n(v,[u])]
Dijkstra
 Dijkstra's algorithm, introduced by the dutch
  computer scientist , is a graph searching algorithm.

 Dijkstra’s algorithm is used to solve the problems of
  finding the shortest path between edge - weighted
  graphs in which all the weights are non-negative.
Basic features of
Dijkstra's algorithm
 For a given source vertices it finds the lowest cost(i.e.
  The shortest path) for every other vertices .

 It can also be used to find the lowest cost for a
  particular destination by the stopping the algorithm in
  between.

 For example:- If the vertices represents the cities and
  the edge path cost represents the distance between
  pair cities then dijkstra’s can be used to find the
  shortest route between one city and all other.
An example of
    Dijkstra’s Algorithm
Dijkstra’s Algorithm can be applied to
   network routing, as it can be used to find
the shortest path from any source computer
      to any other computer in the network .
Basic steps towards the algorithm
 The algorithm begins by initializing any vertex in the graph
 (vertex A, for example) a permanent label with the value of
 0, and all other vertices a temporary label with the value of
 0.
Basic steps towards
 The algorithm then proceeds to select the least cost edge
 connecting a vertex with a permanent label (currently vertex
 A) to a vertex with a temporary label (vertex B, for
 example). Vertex B's label is then updated from a temporary
 to a permanent label. Vertex B's value is then determined by
 the addition of the cost of the edge with vertex A's value
Basic steps towards

 The next step is to find the next least cost edge
  extending to a vertex with a temporary label from
  either vertex A or vertex B (vertex C, for
  example), change vertex C's label to permanent, and
  determine its distance to vertex A.
Basic steps towards
This process is repeated until the labels of all vertices in the
graph are permanent.
Start


                     Identify source node and
                   destination node as V1 and V2


                          Set V1 as T-node



   Set T-node’s label to “permanent” and update
   neighbor's status record set


        Identify the tentative node linked to V1 that has the
        lowest weight and set it as T-node


                           Is T-Node is
                                V2?                             END

Based on information in status record set, do these until u
reach V1. The string of link represents the best route
dijkstra(Graph,MinDist,[],MinDist).
                      dijkstra(Graph,Closed,Open,MinDist):-
                               min(Open,V-D,ReducedOpen),
                           adjacent(Graph,V,AdjacentNodes),
                  diff(AdjacentNodes,Closed,PrunedNodes),
           addDist(PrunedNodes,D,UpdatedPrunedNodes),
nodeMerge(UpdatedPrunedNodes,ReducedOpen,NextOpen),
          dijkstra(Graph,[V-D|Closed],NextOpen,MinDist).
Rules which are used above in the
pesudo code
  min(L,Min,Rest):-
   The method min above takes a list L and puts the smallest
   value in the MIN with the smallest value in L and Rest with
   a list containing all values in L excluding Min.
  adjacent(Graph,Node,Adj) which is true if Adj is a list of all
   nodes reachable from the node Node in one hop in Graph.
   Node is of the form of a single graph vertex label (i.e. the
   minimum cost is not included), Adj should be a list of
   node-cost pairs.
  For example, given the query adjacent([a-b-1,a-c-2,b-a-4,b-
   c-1],a,A) Prolog should return A = [b-1,c-2]
Rules which are used above in the
pesudo code


  diff(L,M,N) takes a list L and a list M and unifies N
   with a list containing all items in L which are not in M.
   The list L is assumed to contain no duplicate elements.

  addDist(Nodes, D, NewNodes) which is true if
   NewNodes is a list containing all the nodes in Nodes
   with their edge cost incremented by D.
Rules which are used above in the
pesudo code
  nodeMerge(A,B,C) which merge lists A and B together
  and unifies the result in C. Lists A, B and C contain no
  duplicate elements: i.e. within the each list there is no
  pair of nodes V1,V2 such that V1=V2.
In today’s world, networking plays an important role in
                         communication between autonomous
     computers. For this many hardware devices and software
                         algorithms have been designed. So far,
  the traditional system used for the communication were the
                              hub networking system and many
other hardware applications present in the market, but as they
                               operate on electricity, it may lead
    to the failure of device due to some malfunctioning in the
          hardware circuitry. Dijkstra Algorithm provides easy
                    understandability and hence its chances of
                                             failure is negligible.
References
http://students.ceid.upatras.gr/~papagel/project/kef5_7_1.htm

 http://www.animal.ahrgr.de/showAnimationDetails.php3?lang=en&anim=
    16

 http://www.cs.sunysb.edu/~skiena/combinatorica/animations/dijkstra.ht
    ml

 http://www.ibiblio.org/links/devmodules/graph_networking/xhtml/page13
    .xml

 Survivable networks: algorithms for diverse routing By Ramesh Bhandari
    Edition: illustrated Published by Springer, 1999 ISBN page 22

Contenu connexe

Tendances

Dijkstra's algorithm
Dijkstra's algorithmDijkstra's algorithm
Dijkstra's algorithm
gsp1294
 
Dfs presentation
Dfs presentationDfs presentation
Dfs presentation
Alizay Khan
 
Networks dijkstra's algorithm- pgsr
Networks  dijkstra's algorithm- pgsrNetworks  dijkstra's algorithm- pgsr
Networks dijkstra's algorithm- pgsr
Linawati Adiman
 

Tendances (20)

PRIM’S AND KRUSKAL’S ALGORITHM
PRIM’S AND KRUSKAL’S  ALGORITHMPRIM’S AND KRUSKAL’S  ALGORITHM
PRIM’S AND KRUSKAL’S ALGORITHM
 
Shortest path algorithms
Shortest path algorithmsShortest path algorithms
Shortest path algorithms
 
minimum spanning tree
minimum spanning tree minimum spanning tree
minimum spanning tree
 
Dijkstra's algorithm
Dijkstra's algorithmDijkstra's algorithm
Dijkstra's algorithm
 
(Binary tree)
(Binary tree)(Binary tree)
(Binary tree)
 
Graph traversals in Data Structures
Graph traversals in Data StructuresGraph traversals in Data Structures
Graph traversals in Data Structures
 
Dijkstra algorithm a dynammic programming approach
Dijkstra algorithm   a dynammic programming approachDijkstra algorithm   a dynammic programming approach
Dijkstra algorithm a dynammic programming approach
 
Dfs presentation
Dfs presentationDfs presentation
Dfs presentation
 
Data structure tries
Data structure triesData structure tries
Data structure tries
 
Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning tree
 
Shortest path algorithm
Shortest path algorithmShortest path algorithm
Shortest path algorithm
 
Bfs and Dfs
Bfs and DfsBfs and Dfs
Bfs and Dfs
 
Breadth first search and depth first search
Breadth first search and  depth first searchBreadth first search and  depth first search
Breadth first search and depth first search
 
Binary search tree(bst)
Binary search tree(bst)Binary search tree(bst)
Binary search tree(bst)
 
Binary tree
Binary tree Binary tree
Binary tree
 
Optimal binary search tree dynamic programming
Optimal binary search tree   dynamic programmingOptimal binary search tree   dynamic programming
Optimal binary search tree dynamic programming
 
Networks dijkstra's algorithm- pgsr
Networks  dijkstra's algorithm- pgsrNetworks  dijkstra's algorithm- pgsr
Networks dijkstra's algorithm- pgsr
 
Binary Tree in Data Structure
Binary Tree in Data StructureBinary Tree in Data Structure
Binary Tree in Data Structure
 
Graphs bfs dfs
Graphs bfs dfsGraphs bfs dfs
Graphs bfs dfs
 
Kruskal & Prim's Algorithm
Kruskal & Prim's AlgorithmKruskal & Prim's Algorithm
Kruskal & Prim's Algorithm
 

En vedette

Dijkstra’s algorithm
Dijkstra’s algorithmDijkstra’s algorithm
Dijkstra’s algorithm
faisal2204
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
guest862df4e
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
Srikrishnan Suresh
 
Dijkstra algorithm
Dijkstra algorithmDijkstra algorithm
Dijkstra algorithm
are you
 
Lewis Dijkstra, DG Regional Policy
Lewis Dijkstra, DG Regional PolicyLewis Dijkstra, DG Regional Policy
Lewis Dijkstra, DG Regional Policy
plan4all
 

En vedette (20)

Dijkstra’s algorithm
Dijkstra’s algorithmDijkstra’s algorithm
Dijkstra’s algorithm
 
Shortest Path Problem: Algoritma Dijkstra
Shortest Path Problem: Algoritma DijkstraShortest Path Problem: Algoritma Dijkstra
Shortest Path Problem: Algoritma Dijkstra
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
 
Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
 
Application of Dijkstra Algorithm in Robot path planning
Application of Dijkstra Algorithm in Robot path planningApplication of Dijkstra Algorithm in Robot path planning
Application of Dijkstra Algorithm in Robot path planning
 
Dijkstra algorithm
Dijkstra algorithmDijkstra algorithm
Dijkstra algorithm
 
Shortest path problem
Shortest path problemShortest path problem
Shortest path problem
 
Dijkstra's Algorithm - Colleen Young
Dijkstra's Algorithm  - Colleen YoungDijkstra's Algorithm  - Colleen Young
Dijkstra's Algorithm - Colleen Young
 
Dijkastra’s algorithm
Dijkastra’s algorithmDijkastra’s algorithm
Dijkastra’s algorithm
 
Basics of data structure
Basics of data structureBasics of data structure
Basics of data structure
 
Face recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signingFace recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signing
 
Graph & Heap in Data Structure (Basic Information)
Graph & Heap in Data Structure (Basic Information)Graph & Heap in Data Structure (Basic Information)
Graph & Heap in Data Structure (Basic Information)
 
Walking ...
Walking ...Walking ...
Walking ...
 
A neural ada boost based facial expression recogniton System
A neural ada boost based facial expression recogniton SystemA neural ada boost based facial expression recogniton System
A neural ada boost based facial expression recogniton System
 
CSE240 Doubly Linked Lists
CSE240 Doubly Linked ListsCSE240 Doubly Linked Lists
CSE240 Doubly Linked Lists
 
Lewis Dijkstra, DG Regional Policy
Lewis Dijkstra, DG Regional PolicyLewis Dijkstra, DG Regional Policy
Lewis Dijkstra, DG Regional Policy
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Path cycle part1
Path cycle part1Path cycle part1
Path cycle part1
 
Doubly Linked Lists
Doubly Linked ListsDoubly Linked Lists
Doubly Linked Lists
 

Similaire à Dijkstra

Lecture 5b graphs and hashing
Lecture 5b graphs and hashingLecture 5b graphs and hashing
Lecture 5b graphs and hashing
Victor Palmar
 
Graph terminology and algorithm and tree.pptx
Graph terminology and algorithm and tree.pptxGraph terminology and algorithm and tree.pptx
Graph terminology and algorithm and tree.pptx
asimshahzad8611
 
Lecture 14 data structures and algorithms
Lecture 14 data structures and algorithmsLecture 14 data structures and algorithms
Lecture 14 data structures and algorithms
Aakash deep Singhal
 
Chap10 slides
Chap10 slidesChap10 slides
Chap10 slides
HJ DS
 

Similaire à Dijkstra (20)

Lecture 5b graphs and hashing
Lecture 5b graphs and hashingLecture 5b graphs and hashing
Lecture 5b graphs and hashing
 
Graph terminology and algorithm and tree.pptx
Graph terminology and algorithm and tree.pptxGraph terminology and algorithm and tree.pptx
Graph terminology and algorithm and tree.pptx
 
Algorithms Design Exam Help
Algorithms Design Exam HelpAlgorithms Design Exam Help
Algorithms Design Exam Help
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
Lecture 14 data structures and algorithms
Lecture 14 data structures and algorithmsLecture 14 data structures and algorithms
Lecture 14 data structures and algorithms
 
Chap10 slides
Chap10 slidesChap10 slides
Chap10 slides
 
Weighted graphs
Weighted graphsWeighted graphs
Weighted graphs
 
graph ASS (1).ppt
graph ASS (1).pptgraph ASS (1).ppt
graph ASS (1).ppt
 
Chap10 slides
Chap10 slidesChap10 slides
Chap10 slides
 
1535 graph algorithms
1535 graph algorithms1535 graph algorithms
1535 graph algorithms
 
Algorithms Design Assignment Help
Algorithms Design Assignment HelpAlgorithms Design Assignment Help
Algorithms Design Assignment Help
 
Graph ASS DBATU.pptx
Graph ASS DBATU.pptxGraph ASS DBATU.pptx
Graph ASS DBATU.pptx
 
Graph_data_structure_information_engineering.pptx
Graph_data_structure_information_engineering.pptxGraph_data_structure_information_engineering.pptx
Graph_data_structure_information_engineering.pptx
 
Lecture 2.3.1 Graph.pptx
Lecture 2.3.1 Graph.pptxLecture 2.3.1 Graph.pptx
Lecture 2.3.1 Graph.pptx
 
Cnetwork
CnetworkCnetwork
Cnetwork
 
10.graph
10.graph10.graph
10.graph
 
Graph Analyses with Python and NetworkX
Graph Analyses with Python and NetworkXGraph Analyses with Python and NetworkX
Graph Analyses with Python and NetworkX
 
Twopi.1
Twopi.1Twopi.1
Twopi.1
 
Graph theory concepts complex networks presents-rouhollah nabati
Graph theory concepts   complex networks presents-rouhollah nabatiGraph theory concepts   complex networks presents-rouhollah nabati
Graph theory concepts complex networks presents-rouhollah nabati
 
Graph Analytics - From the Whiteboard to Your Toolbox - Sam Lerma
Graph Analytics - From the Whiteboard to Your Toolbox - Sam LermaGraph Analytics - From the Whiteboard to Your Toolbox - Sam Lerma
Graph Analytics - From the Whiteboard to Your Toolbox - Sam Lerma
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Dijkstra

  • 1. Presentation on prolog : Dijkstra’s Algorithm
  • 2. A graph is defined as a set of nodes and a set of edges, where each edge is a pair of nodes.
  • 3. There are several ways to represent graphs in Prolog.  One method is to represent each edge separately as one clause (fact). • edge(1, 5). edge(1, 7). edge(2, 1). edge(2, 7). edge(3, 1). edge(3, 6). edge(4, 3). edge(4, 5). edge(5, 8). edge(6, 4). edge(6, 5). edge(7, 5). edge(8, 6). edge(8, 7). We call this edge-clause form W
  • 4.  Another method is to represent the whole graph as one data object. According to the definition of the graph as a pair of two sets (nodes and edges).  EXAMPLE :  graph([b,c,d,f,g,h,k],[e(b,c),e(b,f),e(c,f),e(f,k),e(g,h)]) .  We call this graph-term form. Note, that the lists are kept sorted, they are really sets, without duplicated elements. Each edge appears only once in the edge list.  The graph-term form is a default representation
  • 5.  A third representation method is to associate with each node the set of nodes that are adjacent to that node .  EXAMPLE: [n(b,[c,f]), n(c,[b,f]), n(d,[]), n(f,[b,c,k]), .........]. 
  • 6. Directed graphs  These are represented by ordered pairs  To represent a directed graph, the forms discussed above are slightly modified. The example graph is represented as follows:  When the edges are directed we call them arcs Arc-clause form  arc(s,u). arc(u,r). Graph-term form  digraph([r,s,t,u,v],[a(s,r),a(s,u),a(u,r),a(u,s),a(v,u)]) Adjacency-list form  [n(r,[]),n(s,[r,u]),n(t,[]),n(u,[r]),n(v,[u])]
  • 7. Dijkstra  Dijkstra's algorithm, introduced by the dutch computer scientist , is a graph searching algorithm.  Dijkstra’s algorithm is used to solve the problems of finding the shortest path between edge - weighted graphs in which all the weights are non-negative.
  • 8. Basic features of Dijkstra's algorithm  For a given source vertices it finds the lowest cost(i.e. The shortest path) for every other vertices .  It can also be used to find the lowest cost for a particular destination by the stopping the algorithm in between.  For example:- If the vertices represents the cities and the edge path cost represents the distance between pair cities then dijkstra’s can be used to find the shortest route between one city and all other.
  • 9. An example of Dijkstra’s Algorithm
  • 10. Dijkstra’s Algorithm can be applied to network routing, as it can be used to find the shortest path from any source computer to any other computer in the network .
  • 11. Basic steps towards the algorithm  The algorithm begins by initializing any vertex in the graph (vertex A, for example) a permanent label with the value of 0, and all other vertices a temporary label with the value of 0.
  • 12. Basic steps towards  The algorithm then proceeds to select the least cost edge connecting a vertex with a permanent label (currently vertex A) to a vertex with a temporary label (vertex B, for example). Vertex B's label is then updated from a temporary to a permanent label. Vertex B's value is then determined by the addition of the cost of the edge with vertex A's value
  • 13. Basic steps towards  The next step is to find the next least cost edge extending to a vertex with a temporary label from either vertex A or vertex B (vertex C, for example), change vertex C's label to permanent, and determine its distance to vertex A.
  • 14. Basic steps towards This process is repeated until the labels of all vertices in the graph are permanent.
  • 15. Start Identify source node and destination node as V1 and V2 Set V1 as T-node Set T-node’s label to “permanent” and update neighbor's status record set Identify the tentative node linked to V1 that has the lowest weight and set it as T-node Is T-Node is V2? END Based on information in status record set, do these until u reach V1. The string of link represents the best route
  • 16.
  • 17. dijkstra(Graph,MinDist,[],MinDist). dijkstra(Graph,Closed,Open,MinDist):- min(Open,V-D,ReducedOpen), adjacent(Graph,V,AdjacentNodes), diff(AdjacentNodes,Closed,PrunedNodes), addDist(PrunedNodes,D,UpdatedPrunedNodes), nodeMerge(UpdatedPrunedNodes,ReducedOpen,NextOpen), dijkstra(Graph,[V-D|Closed],NextOpen,MinDist).
  • 18. Rules which are used above in the pesudo code  min(L,Min,Rest):- The method min above takes a list L and puts the smallest value in the MIN with the smallest value in L and Rest with a list containing all values in L excluding Min.  adjacent(Graph,Node,Adj) which is true if Adj is a list of all nodes reachable from the node Node in one hop in Graph. Node is of the form of a single graph vertex label (i.e. the minimum cost is not included), Adj should be a list of node-cost pairs. For example, given the query adjacent([a-b-1,a-c-2,b-a-4,b- c-1],a,A) Prolog should return A = [b-1,c-2]
  • 19. Rules which are used above in the pesudo code  diff(L,M,N) takes a list L and a list M and unifies N with a list containing all items in L which are not in M. The list L is assumed to contain no duplicate elements.  addDist(Nodes, D, NewNodes) which is true if NewNodes is a list containing all the nodes in Nodes with their edge cost incremented by D.
  • 20. Rules which are used above in the pesudo code  nodeMerge(A,B,C) which merge lists A and B together and unifies the result in C. Lists A, B and C contain no duplicate elements: i.e. within the each list there is no pair of nodes V1,V2 such that V1=V2.
  • 21. In today’s world, networking plays an important role in communication between autonomous computers. For this many hardware devices and software algorithms have been designed. So far, the traditional system used for the communication were the hub networking system and many other hardware applications present in the market, but as they operate on electricity, it may lead to the failure of device due to some malfunctioning in the hardware circuitry. Dijkstra Algorithm provides easy understandability and hence its chances of failure is negligible.
  • 22. References http://students.ceid.upatras.gr/~papagel/project/kef5_7_1.htm  http://www.animal.ahrgr.de/showAnimationDetails.php3?lang=en&anim= 16  http://www.cs.sunysb.edu/~skiena/combinatorica/animations/dijkstra.ht ml  http://www.ibiblio.org/links/devmodules/graph_networking/xhtml/page13 .xml  Survivable networks: algorithms for diverse routing By Ramesh Bhandari Edition: illustrated Published by Springer, 1999 ISBN page 22