SlideShare a Scribd company logo
1 of 16
Welcome To 
Our Presentation 
Course: 
CSE 221/222 Summer 2014 
1
Course Teacher: 
Nasrin Hakim Mithila 
Lecturer 
Dept. of Computer Science and Engineering(CSE) 
Faculty of Science & Information Technology (FSIT) 
Daffodil International University 
2
Our Group Name: Silent Hunter 
Members: 
 1. Syed Ahmed Zaki (ID:131-15-2169) 
 2. Md. Sazzad Hossain (ID:131-15-2368) 
3
Our Topic 
Project No. 1 in the project list 
Question: 
There are n SMTP servers connected by network cables. Each 
of the m cables connects two computers and has a certain 
latency measured in milliseconds required to send an email 
message. What is the shortest time required to send a 
message from server S to server T along a sequence of 
cables? Assume that there is no delay incurred at any of the 
servers. 
4
Input 
Input 
The first line of input gives the number of cases, N. N test 
cases follow. Each one starts with a line containing n 
(2<=n<20000), m (0<=m<50000), S (0<=S<n) and T 
(0<=T<n). S!=T. The next m lines will each contain 3 
integers: 2 different servers (in the range [0, n-1]) that are 
connected by a bidirectional cable and the latency, w, along 
this cable (0<=w<=10000). 
5
Output 
Output 
For each test case, output the line "Case #x:" followed 
by the number of milliseconds required to send a 
message from S to T. Print "unreachable" if there is no 
route from S to T. 
6
In console method representation 
Sample Input Sample Output 
3 
2 1 0 1 
0 1 100 
3 3 2 0 
0 1 100 
0 2 200 
1 2 50 
2 0 0 1 
Case #1: 100 
Case #2: 150 
Case #3: unreachable 
7
Input: 
Graphical Representation 
N // N = Test Case Number 
n m S T 
int int w 
//n =SMTP servers on the network (2<=n<20000), m=cables connects two 
computers(0<=m<50000), S=Source server (0<=S<n) , T=Target Server 
(0<=T<n) (where S!=T) 
//int=integer value, int=integer value, w=latency/weight of the 
bidirectional cable 
8
Graphical Representation 
Case #1: 
1 0 
w=100 
m 
S T 
w=100 
Case #2: 0 1 
S 
m T 
2 
Case # 3: unreachable 
Output: 
0 
0 1 
S 
0 
T 
9
Algorithm 
As from the input description we have found that we 
have to iterate through all vertex but in minimum 
shortest path from one source.So that We have used 
Dijkstra algorithm here.As Dijkstra algorithm is single 
source shortest path algorithm. 
10
Dijkstra Algorithm 
11
Eclipse View 
Code: 
12
UVA Submission 
13
Future Plan 
We have a plan to make it more frequently and user 
friendly. 
And will make available this code for open source 
community. 
14
Bug/Error/Limitations 
 We have to use here delimiter “[]+” in Java’s built in 
input/output system in BufferedReader 
throwsException() function to avoid unexpected 
integer or string error. 
We will fix this bug in future version . 
15
Implementing and focusing on the code was our main 
objective and we tried our best. 
Thank you Mam for staying with us. 
Thank you all. 
Conclusion 
16

More Related Content

What's hot

Data Communication And Networking - ERROR DETECTION AND CORRECTION
Data Communication And Networking - ERROR DETECTION AND CORRECTIONData Communication And Networking - ERROR DETECTION AND CORRECTION
Data Communication And Networking - ERROR DETECTION AND CORRECTIONAvijeet Negel
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
 
Error detection &amp; correction presentation
Error detection &amp; correction presentationError detection &amp; correction presentation
Error detection &amp; correction presentationShamim Hossain
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communicationswatihalunde
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionCathryn Kuteesa
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)Karam Munir Butt
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerAbdullaziz Tagawy
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionJeoffnaRuth
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionRusty Millabas
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication SystemIshan Sharma
 
An optimal algorithm for mutual exclusion in computer networks
An optimal algorithm for mutual exclusion in computer networksAn optimal algorithm for mutual exclusion in computer networks
An optimal algorithm for mutual exclusion in computer networksSampson Akwafuo
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy CheckRajan Shah
 

What's hot (20)

Data Communication And Networking - ERROR DETECTION AND CORRECTION
Data Communication And Networking - ERROR DETECTION AND CORRECTIONData Communication And Networking - ERROR DETECTION AND CORRECTION
Data Communication And Networking - ERROR DETECTION AND CORRECTION
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Error detection &amp; correction presentation
Error detection &amp; correction presentationError detection &amp; correction presentation
Error detection &amp; correction presentation
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Full error detection and correction
Full error detection and correctionFull error detection and correction
Full error detection and correction
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication System
 
Ch3 datalink
Ch3 datalinkCh3 datalink
Ch3 datalink
 
An optimal algorithm for mutual exclusion in computer networks
An optimal algorithm for mutual exclusion in computer networksAn optimal algorithm for mutual exclusion in computer networks
An optimal algorithm for mutual exclusion in computer networks
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy Check
 

Similar to Algorithm Presentation

Data and computer communication exam lll
Data and computer communication exam lllData and computer communication exam lll
Data and computer communication exam lllAndrew Ibrahim
 
Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...
Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...
Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...jinsdavis
 
Notes mid uet solution
Notes mid uet solutionNotes mid uet solution
Notes mid uet solutionAli Jt
 
Answers computer networks 159334 assignment_2_2010
Answers computer networks 159334 assignment_2_2010Answers computer networks 159334 assignment_2_2010
Answers computer networks 159334 assignment_2_2010Lakshmi Gupta
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionEngr. Md. Jamal Uddin Rayhan
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switchingSuneel Varma
 
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...IRJET Journal
 
Interconnect timing model
Interconnect  timing modelInterconnect  timing model
Interconnect timing modelPrachi Pandey
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkBADALKUMAR56
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksOptimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksAndrea Tassi
 
Data and computer communication exam i
Data and computer communication exam iData and computer communication exam i
Data and computer communication exam iAndrew Ibrahim
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...TELKOMNIKA JOURNAL
 

Similar to Algorithm Presentation (20)

Jy3517271730
Jy3517271730Jy3517271730
Jy3517271730
 
Data and computer communication exam lll
Data and computer communication exam lllData and computer communication exam lll
Data and computer communication exam lll
 
Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...
Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...
Thesis : Simulation Based Power Estimation Techniques for Digital CMOS Techno...
 
Notes mid uet solution
Notes mid uet solutionNotes mid uet solution
Notes mid uet solution
 
Dds
DdsDds
Dds
 
wireless proj 2
wireless proj 2wireless proj 2
wireless proj 2
 
Answers computer networks 159334 assignment_2_2010
Answers computer networks 159334 assignment_2_2010Answers computer networks 159334 assignment_2_2010
Answers computer networks 159334 assignment_2_2010
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
 
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
 
Interconnect timing model
Interconnect  timing modelInterconnect  timing model
Interconnect timing model
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor network
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksOptimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
 
Net
NetNet
Net
 
Cdc18 dg lee
Cdc18 dg leeCdc18 dg lee
Cdc18 dg lee
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
Data and computer communication exam i
Data and computer communication exam iData and computer communication exam i
Data and computer communication exam i
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
 

More from Syed Ahmed Zaki

Assignment on Numerical Method C Code
Assignment on Numerical Method C CodeAssignment on Numerical Method C Code
Assignment on Numerical Method C CodeSyed Ahmed Zaki
 
Presentation on Numerical Method (Trapezoidal Method)
Presentation on Numerical Method (Trapezoidal Method)Presentation on Numerical Method (Trapezoidal Method)
Presentation on Numerical Method (Trapezoidal Method)Syed Ahmed Zaki
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission MediaSyed Ahmed Zaki
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessorSyed Ahmed Zaki
 
Importance of Electric Device Knowledge in Computer Science Education
Importance of Electric Device Knowledge in Computer Science EducationImportance of Electric Device Knowledge in Computer Science Education
Importance of Electric Device Knowledge in Computer Science EducationSyed Ahmed Zaki
 
Presentation on bernoulli
Presentation on bernoulliPresentation on bernoulli
Presentation on bernoulliSyed Ahmed Zaki
 
Presentation on inverse matrix
Presentation on inverse matrixPresentation on inverse matrix
Presentation on inverse matrixSyed Ahmed Zaki
 
Project Report - Diabetic Profile Management System : Structured Programming ...
Project Report - Diabetic Profile Management System : Structured Programming ...Project Report - Diabetic Profile Management System : Structured Programming ...
Project Report - Diabetic Profile Management System : Structured Programming ...Syed Ahmed Zaki
 
History and Real Life Applications of Fourier Analaysis
History and Real Life Applications of Fourier AnalaysisHistory and Real Life Applications of Fourier Analaysis
History and Real Life Applications of Fourier AnalaysisSyed Ahmed Zaki
 

More from Syed Ahmed Zaki (11)

Networking Lab Report
Networking Lab ReportNetworking Lab Report
Networking Lab Report
 
Lab report assembly
Lab report assemblyLab report assembly
Lab report assembly
 
Assignment on Numerical Method C Code
Assignment on Numerical Method C CodeAssignment on Numerical Method C Code
Assignment on Numerical Method C Code
 
Presentation on Numerical Method (Trapezoidal Method)
Presentation on Numerical Method (Trapezoidal Method)Presentation on Numerical Method (Trapezoidal Method)
Presentation on Numerical Method (Trapezoidal Method)
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
 
Importance of Electric Device Knowledge in Computer Science Education
Importance of Electric Device Knowledge in Computer Science EducationImportance of Electric Device Knowledge in Computer Science Education
Importance of Electric Device Knowledge in Computer Science Education
 
Presentation on bernoulli
Presentation on bernoulliPresentation on bernoulli
Presentation on bernoulli
 
Presentation on inverse matrix
Presentation on inverse matrixPresentation on inverse matrix
Presentation on inverse matrix
 
Project Report - Diabetic Profile Management System : Structured Programming ...
Project Report - Diabetic Profile Management System : Structured Programming ...Project Report - Diabetic Profile Management System : Structured Programming ...
Project Report - Diabetic Profile Management System : Structured Programming ...
 
History and Real Life Applications of Fourier Analaysis
History and Real Life Applications of Fourier AnalaysisHistory and Real Life Applications of Fourier Analaysis
History and Real Life Applications of Fourier Analaysis
 

Recently uploaded

Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectssuserb6619e
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 

Recently uploaded (20)

Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 

Algorithm Presentation

  • 1. Welcome To Our Presentation Course: CSE 221/222 Summer 2014 1
  • 2. Course Teacher: Nasrin Hakim Mithila Lecturer Dept. of Computer Science and Engineering(CSE) Faculty of Science & Information Technology (FSIT) Daffodil International University 2
  • 3. Our Group Name: Silent Hunter Members:  1. Syed Ahmed Zaki (ID:131-15-2169)  2. Md. Sazzad Hossain (ID:131-15-2368) 3
  • 4. Our Topic Project No. 1 in the project list Question: There are n SMTP servers connected by network cables. Each of the m cables connects two computers and has a certain latency measured in milliseconds required to send an email message. What is the shortest time required to send a message from server S to server T along a sequence of cables? Assume that there is no delay incurred at any of the servers. 4
  • 5. Input Input The first line of input gives the number of cases, N. N test cases follow. Each one starts with a line containing n (2<=n<20000), m (0<=m<50000), S (0<=S<n) and T (0<=T<n). S!=T. The next m lines will each contain 3 integers: 2 different servers (in the range [0, n-1]) that are connected by a bidirectional cable and the latency, w, along this cable (0<=w<=10000). 5
  • 6. Output Output For each test case, output the line "Case #x:" followed by the number of milliseconds required to send a message from S to T. Print "unreachable" if there is no route from S to T. 6
  • 7. In console method representation Sample Input Sample Output 3 2 1 0 1 0 1 100 3 3 2 0 0 1 100 0 2 200 1 2 50 2 0 0 1 Case #1: 100 Case #2: 150 Case #3: unreachable 7
  • 8. Input: Graphical Representation N // N = Test Case Number n m S T int int w //n =SMTP servers on the network (2<=n<20000), m=cables connects two computers(0<=m<50000), S=Source server (0<=S<n) , T=Target Server (0<=T<n) (where S!=T) //int=integer value, int=integer value, w=latency/weight of the bidirectional cable 8
  • 9. Graphical Representation Case #1: 1 0 w=100 m S T w=100 Case #2: 0 1 S m T 2 Case # 3: unreachable Output: 0 0 1 S 0 T 9
  • 10. Algorithm As from the input description we have found that we have to iterate through all vertex but in minimum shortest path from one source.So that We have used Dijkstra algorithm here.As Dijkstra algorithm is single source shortest path algorithm. 10
  • 14. Future Plan We have a plan to make it more frequently and user friendly. And will make available this code for open source community. 14
  • 15. Bug/Error/Limitations  We have to use here delimiter “[]+” in Java’s built in input/output system in BufferedReader throwsException() function to avoid unexpected integer or string error. We will fix this bug in future version . 15
  • 16. Implementing and focusing on the code was our main objective and we tried our best. Thank you Mam for staying with us. Thank you all. Conclusion 16