SlideShare a Scribd company logo
1 of 12
Present by: Abdul Ahad Abro
1
Graph Theory in Computer Applications
Computer Engineering Department, Ege University, Turkey
October 26-2017
Connectivity
Connectivity Bağlantı
The message can be sent between two computers using intermediate links
can be studied with a graph model. Problems of efficiently planning routes for
mail delivery, garbage pickup, diagnostics in computer networks and so on
can be solved using models that that involve paths in graphs .
2
Fig: 01 Connectivity
Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to
vertex along edges of the graph.
Vertices cannot repeat. Edges cannot repeat (Open) .
Path of length 4 - 1,2,3,4,6
A closed path is called Cycle. (a-b-c-d-a)
3
Paths Yollar
Fig: 02 Path
A Path in which edges/nodes can be repeated.
a-b-d-a-b-c
Walk of length 5 - 1,2,5,2,3,4
Vertices may repeat. Edges may repeat (Closed or Open)
4
Walk Yürüme
Fig: 03 Walk
Trail: iz
If all the edges (but not necessarily all the vertices) of a walk are different, then the walk is
called a trail.
No Edge can be repeat.
a-b-c-d-e-b-d
5
Fig: 04 Trail
A circuit is a path that begins and end at the same vertex.
6
In this graph a,d,c,f,e is a simple path of length 4, because {a,d}, {d,c}, {c,f} and {f,e} are all
edges. However d,e,c,a is not a path because {e,c} is not an edge. Where as {b,c}, {c,f}, {f,e}
and {e,b} are edges and this path begins and ends at b.
Circuit
Fig: 05 Simple Graph
7
When does a computer network have the property that every pair of
computers can share information, if messages can be sent through one or
more intermediate computers? When a graph is used to represent this
computer network, where vertices represent the computers and edges
represent the communication links.
Connectedness in Undirected Graphs
The graph H and its connected components H1, H2, H3
8
Any two computers in the network can communicate if and only if the graph of this
network is connected .
Fig: 06 Connected Components
9
A cut-edge or cut-vertex of a graph is an edge or vertex whose deletion
increases the number of components.
Cut Edge or Cut Vertex
Fig: 07 Cut Edge or Cut Vertex
10
A directed graph is said to be strongly connected only if every pair of distinct
vertices are connected.
In a weakly connected graph the nodes cannot be visited by a single path.
Strongly / Weakly Connected Directed Graphs
Fig: 08 strong and weakly connected graph
11
Two graphs are isomorphic if and only if after recording the vertices their adjacency
matrices are the same.
Isomorphism
Isomorphic Not Isomorphic
Fig: 09 Isomorphism
12

More Related Content

What's hot

Dijkstra algorithm
Dijkstra algorithmDijkstra algorithm
Dijkstra algorithm
are you
 
Networks dijkstra's algorithm- pgsr
Networks  dijkstra's algorithm- pgsrNetworks  dijkstra's algorithm- pgsr
Networks dijkstra's algorithm- pgsr
Linawati Adiman
 
Double Patterning (3/31 update)
Double Patterning (3/31 update)Double Patterning (3/31 update)
Double Patterning (3/31 update)
guest833ea6e
 
Geometry theory
Geometry theoryGeometry theory
Geometry theory
halo4robo
 

What's hot (20)

Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer Application
 
HOMOGENEOUS CO-ORDINATES IN COMPUTER GRAPHICS PPT
HOMOGENEOUS CO-ORDINATES IN COMPUTER GRAPHICS PPTHOMOGENEOUS CO-ORDINATES IN COMPUTER GRAPHICS PPT
HOMOGENEOUS CO-ORDINATES IN COMPUTER GRAPHICS PPT
 
Dijkstra’S Algorithm
Dijkstra’S AlgorithmDijkstra’S Algorithm
Dijkstra’S Algorithm
 
Dijkstra's Algorithm
Dijkstra's Algorithm Dijkstra's Algorithm
Dijkstra's Algorithm
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
Dijkstra s algorithm
Dijkstra s algorithmDijkstra s algorithm
Dijkstra s algorithm
 
Djikstra's Algorithm
Djikstra's Algorithm Djikstra's Algorithm
Djikstra's Algorithm
 
Application of Dijkstra Algorithm in Robot path planning
Application of Dijkstra Algorithm in Robot path planningApplication of Dijkstra Algorithm in Robot path planning
Application of Dijkstra Algorithm in Robot path planning
 
Discrete Mathematics Presentation
Discrete Mathematics PresentationDiscrete Mathematics Presentation
Discrete Mathematics Presentation
 
1 sollins algorithm
1 sollins algorithm1 sollins algorithm
1 sollins algorithm
 
Dijkstra algorithm
Dijkstra algorithmDijkstra algorithm
Dijkstra algorithm
 
Digital Logic Design-Lecture 5
Digital Logic Design-Lecture 5Digital Logic Design-Lecture 5
Digital Logic Design-Lecture 5
 
Graph Matching
Graph MatchingGraph Matching
Graph Matching
 
Networks dijkstra's algorithm- pgsr
Networks  dijkstra's algorithm- pgsrNetworks  dijkstra's algorithm- pgsr
Networks dijkstra's algorithm- pgsr
 
Double Patterning (3/31 update)
Double Patterning (3/31 update)Double Patterning (3/31 update)
Double Patterning (3/31 update)
 
Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)
 
UTSlides
UTSlidesUTSlides
UTSlides
 
Bt9301, computer graphics
Bt9301, computer graphicsBt9301, computer graphics
Bt9301, computer graphics
 
Lattice Network | Computer Science
Lattice Network | Computer ScienceLattice Network | Computer Science
Lattice Network | Computer Science
 
Geometry theory
Geometry theoryGeometry theory
Geometry theory
 

Similar to Connectivity - Graph Theory in Computer Applications

An Introduction to Graph Databases
An Introduction to Graph DatabasesAn Introduction to Graph Databases
An Introduction to Graph Databases
InfiniteGraph
 

Similar to Connectivity - Graph Theory in Computer Applications (20)

Map Coloring and Some of Its Applications
Map Coloring and Some of Its Applications Map Coloring and Some of Its Applications
Map Coloring and Some of Its Applications
 
An improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networksAn improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networks
 
Embedding bus and ring into hex cell
Embedding bus and ring into hex cellEmbedding bus and ring into hex cell
Embedding bus and ring into hex cell
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
 
Analysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing CountriesAnalysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing Countries
 
Analysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing CountriesAnalysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing Countries
 
An Introduction to Graph Databases
An Introduction to Graph DatabasesAn Introduction to Graph Databases
An Introduction to Graph Databases
 
Connectivity of graphs
Connectivity of graphsConnectivity of graphs
Connectivity of graphs
 
Scalable Online Betweenness Centrality in Evolving Graphs
Scalable Online Betweenness Centrality in Evolving GraphsScalable Online Betweenness Centrality in Evolving Graphs
Scalable Online Betweenness Centrality in Evolving Graphs
 
Application of Graph Theory in Computer science using Data Structure.pdf
Application of Graph Theory in Computer science using Data Structure.pdfApplication of Graph Theory in Computer science using Data Structure.pdf
Application of Graph Theory in Computer science using Data Structure.pdf
 
A Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph AnalysisA Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph Analysis
 
PPT on Graph Theory ( Tree, Cotree, nodes, branches, incidence , tie set and ...
PPT on Graph Theory ( Tree, Cotree, nodes, branches, incidence , tie set and ...PPT on Graph Theory ( Tree, Cotree, nodes, branches, incidence , tie set and ...
PPT on Graph Theory ( Tree, Cotree, nodes, branches, incidence , tie set and ...
 
A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routing
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
FREQUENT SUBGRAPH MINING ALGORITHMS - A SURVEY AND FRAMEWORK FOR CLASSIFICATION
FREQUENT SUBGRAPH MINING ALGORITHMS - A SURVEY AND FRAMEWORK FOR CLASSIFICATIONFREQUENT SUBGRAPH MINING ALGORITHMS - A SURVEY AND FRAMEWORK FOR CLASSIFICATION
FREQUENT SUBGRAPH MINING ALGORITHMS - A SURVEY AND FRAMEWORK FOR CLASSIFICATION
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...
 
Ijcnc050213
Ijcnc050213Ijcnc050213
Ijcnc050213
 
Graphs in Data Structure
 Graphs in Data Structure Graphs in Data Structure
Graphs in Data Structure
 
Application Of Graph Theory
Application Of Graph TheoryApplication Of Graph Theory
Application Of Graph Theory
 

More from Dr. Abdul Ahad Abro

More from Dr. Abdul Ahad Abro (9)

DBMS & RDBMS
DBMS & RDBMSDBMS & RDBMS
DBMS & RDBMS
 
Outlier Detection
Outlier DetectionOutlier Detection
Outlier Detection
 
AI vs Human
AI vs HumanAI vs Human
AI vs Human
 
Artificial intelligence - AI Complete Concept
Artificial intelligence - AI Complete ConceptArtificial intelligence - AI Complete Concept
Artificial intelligence - AI Complete Concept
 
Edge Coloring & K-tuple coloring
Edge Coloring & K-tuple coloringEdge Coloring & K-tuple coloring
Edge Coloring & K-tuple coloring
 
Graph Coloring
Graph ColoringGraph Coloring
Graph Coloring
 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
 
Regression with Microsoft Azure & Ms Excel
Regression with Microsoft Azure & Ms ExcelRegression with Microsoft Azure & Ms Excel
Regression with Microsoft Azure & Ms Excel
 
Expert System - Artificial intelligence
Expert System - Artificial intelligenceExpert System - Artificial intelligence
Expert System - Artificial intelligence
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Connectivity - Graph Theory in Computer Applications

  • 1. Present by: Abdul Ahad Abro 1 Graph Theory in Computer Applications Computer Engineering Department, Ege University, Turkey October 26-2017 Connectivity
  • 2. Connectivity Bağlantı The message can be sent between two computers using intermediate links can be studied with a graph model. Problems of efficiently planning routes for mail delivery, garbage pickup, diagnostics in computer networks and so on can be solved using models that that involve paths in graphs . 2 Fig: 01 Connectivity
  • 3. Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to vertex along edges of the graph. Vertices cannot repeat. Edges cannot repeat (Open) . Path of length 4 - 1,2,3,4,6 A closed path is called Cycle. (a-b-c-d-a) 3 Paths Yollar Fig: 02 Path
  • 4. A Path in which edges/nodes can be repeated. a-b-d-a-b-c Walk of length 5 - 1,2,5,2,3,4 Vertices may repeat. Edges may repeat (Closed or Open) 4 Walk Yürüme Fig: 03 Walk
  • 5. Trail: iz If all the edges (but not necessarily all the vertices) of a walk are different, then the walk is called a trail. No Edge can be repeat. a-b-c-d-e-b-d 5 Fig: 04 Trail
  • 6. A circuit is a path that begins and end at the same vertex. 6 In this graph a,d,c,f,e is a simple path of length 4, because {a,d}, {d,c}, {c,f} and {f,e} are all edges. However d,e,c,a is not a path because {e,c} is not an edge. Where as {b,c}, {c,f}, {f,e} and {e,b} are edges and this path begins and ends at b. Circuit Fig: 05 Simple Graph
  • 7. 7 When does a computer network have the property that every pair of computers can share information, if messages can be sent through one or more intermediate computers? When a graph is used to represent this computer network, where vertices represent the computers and edges represent the communication links. Connectedness in Undirected Graphs
  • 8. The graph H and its connected components H1, H2, H3 8 Any two computers in the network can communicate if and only if the graph of this network is connected . Fig: 06 Connected Components
  • 9. 9 A cut-edge or cut-vertex of a graph is an edge or vertex whose deletion increases the number of components. Cut Edge or Cut Vertex Fig: 07 Cut Edge or Cut Vertex
  • 10. 10 A directed graph is said to be strongly connected only if every pair of distinct vertices are connected. In a weakly connected graph the nodes cannot be visited by a single path. Strongly / Weakly Connected Directed Graphs Fig: 08 strong and weakly connected graph
  • 11. 11 Two graphs are isomorphic if and only if after recording the vertices their adjacency matrices are the same. Isomorphism Isomorphic Not Isomorphic Fig: 09 Isomorphism
  • 12. 12