15.082J & 6.855J & ESD.78J Visualizations

Slides:



Advertisements
Similar presentations
and 6.855J Modified Label Correcting Algorithm.
Advertisements

Outline LP formulation of minimal cost flow problem
15.082J & 6.855J & ESD.78J October 14, 2010 Maximum Flows 2.
15.082J & 6.855J & ESD.78J Shortest Paths 2: Bucket implementations of Dijkstra’s Algorithm R-Heaps.
15.082J, 6.855J, and ESD.78J Sept 16, 2010 Lecture 3. Graph Search Breadth First Search Depth First Search Intro to program verification Topological Sort.
& 6.855J & ESD.78J Algorithm visualizations Modified Label Correcting Algorithm.
15.082J and 6.855J and ESD.78J November 2, 2010 Network Flow Duality and Applications of Network Flows.
Lecture 10 The Label Correcting Algorithm.
& 6.855J & ESD.78J Algorithm Visualization The Ford-Fulkerson Augmenting Path Algorithm for the Maximum Flow Problem.
and 6.855J The Goldberg-Tarjan Preflow Push Algorithm for the Maximum Flow Problem.
15.082J and 6.855J and ESD.78J The Successive Shortest Path Algorithm and the Capacity Scaling Algorithm for the Minimum Cost Flow Problem.
15.082J & 6.855J & ESD.78J September 30, 2010 The Label Correcting Algorithm.
Suppose G = (V, E) is a directed network. Each edge (i,j) in E has an associated ‘length’ c ij (cost, time, distance, …). Determine a path of shortest.
Decision Maths 1 Shortest path algorithm Dijkstra’s Algorithm A V Ali :
15.082J and 6.855J and ESD.78J Network Simplex Animations.
Cycle Canceling Algorithm
Network Optimization J.B. Orlin
Network Simplex Animations
EMIS 8374 Dijkstra’s Algorithm Updated 18 February 2008
Party-by-Night Problem
Disjoint Path Routing Algorithms
Dijkstra’s Algorithm with two levels of buckets
The Shortest Augmenting Path Algorithm for the Maximum Flow Problem
Introduction to Maximum Flows
15.082J & 6.855J & ESD.78J Visualizations
Dijkstra’s Algorithm for the Shortest Path Problem
15.082J & 6.855J & ESD.78J Visualizations
Lecture 6 Shortest Path Problem.
Dijkstra’s Algorithm for the Shortest Path Problem
Breadth first search animation
Lecture 4 Graph Search.
Lecture 19-Problem Solving 4 Incremental Method
Introduction to Minimum Cost Flows
EMIS 8374 Shortest Path Problems: Introduction Updated 9 February 2008
Shortest-Path Property 4.1
Spanning Tree Algorithms
and 6.855J Flow Decomposition
Primal-Dual Algorithm
Successive Shortest Path Algorithm
Successive Shortest Path Algorithm
Shortest Path Problems
and 6.855J March 6, 2003 Maximum Flows 2
15.082J & 6.855J & ESD.78J Radix Heap Animation
Network Optimization Depth First Search
Introduction to Algorithms
Min Global Cut Animation
Network Optimization Flow Decomposition.
Dijkstra’s Algorithm for Shortest Paths
The Shortest Augmenting Path Algorithm for the Maximum Flow Problem
Reading before Lecture 13
The Shortest Augmenting Path Algorithm for the Maximum Flow Problem
Network Optimization Topological Ordering
and 6.855J The Goldberg-Tarjan Preflow Push Algorithm for the Maximum Flow Problem Obtain a network, and use the same network to illustrate the.
and 6.855J Dijkstra’s Algorithm
Visualizations Dijkstra’s Algorithm
Introduction to Maximum Flows
Network Simplex Animations
and 6.855J The Goldberg-Tarjan Preflow Push Algorithm for the Maximum Flow Problem Obtain a network, and use the same network to illustrate the.
Eulerian Cycles in directed graphs
and 6.855J Topological Ordering
The Minimum Cost Spanning Tree Problem
and 6.855J Depth First Search
Breadth first search animation
OPIM 915 Fall 2010 Data Structures 23-38,
Introduction to Minimum Cost Flows
Introduction to Maximum Flows
The Successive Shortest Path Algorithm
Max Flows 3 Preflow-Push Algorithms
Class 11 Max Flows Obtain a network, and use the same network to illustrate the shortest path problem for communication networks, the max flow.
15.082J & 6.855J & ESD.78J Visualizations
Presentation transcript:

15.082J & 6.855J & ESD.78J Visualizations Label Correcting Algorithm Obtain a network, and use the same network to illustrate the shortest path problem for communication networks, the max flow problem, the minimum cost flow problem, and the multicommodity flow problem. This will be a very efficient way of introducing the four problems. (Perhaps under 10 minutes of class time.)

An Example ∞ ∞ 4 2 ∞ ∞ 1 5 7 Initialize d(1) := 0; d(j) := ∞ for j ≠ 1 3 3 3 1 ∞ ∞ -2 6 1 5 7 Initialize 2 3 4 3 d(1) := 0; d(j) := ∞ for j ≠ 1 -4 3 6 ∞ ∞ In next slides: the number inside the node will be d(j). Violating arcs will be in thick lines.

An arc (i,j) is violating if d(j) > d(i) + cij. ∞ ∞ 2 ∞ 3 ∞ 3 3 3 1 -2 6 ∞ ∞ Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 ∞ ∞ Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. ∞ ∞ 2 ∞ 3 3 3 3 1 -2 6 ∞ 6 ∞ Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 ∞ ∞ Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. ∞ 3 ∞ 2 ∞ 3 3 3 3 1 -2 6 6 ∞ Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 ∞ 3 ∞ Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. 3 ∞ 2 5 ∞ 3 3 3 3 1 -2 6 6 ∞ Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 3 ∞ Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. 3 ∞ 2 5 3 3 3 3 1 -2 6 6 4 ∞ Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 3 ∞ Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. 3 6 ∞ 2 5 3 3 3 3 1 -2 6 6 4 ∞ Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 3 6 ∞ Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. 2 3 ∞ 6 5 3 3 3 3 1 -2 6 6 4 ∞ Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 2 3 ∞ 6 Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. 2 6 5 3 3 3 3 1 -2 6 4 ∞ 9 Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 2 6 Pick a violating arc (i,j) and replace d(j) by d(i) + cij.

An arc (i,j) is violating if d(j) > d(i) + cij. 2 6 5 3 3 3 3 1 -2 6 4 9 Generic Step 2 3 4 3 An arc (i,j) is violating if d(j) > d(i) + cij. -4 2 6 Pick a violating arc (i,j) and replace d(j) by d(i) + cij. No arc is violating We now show the predecessor arcs. The distance labels are optimal

15.082J / 6.855J / ESD.78J Network Optimization MITOpenCourseWare http://ocw.mit.edu 15.082J / 6.855J / ESD.78J Network Optimization Fall 2010 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.