Differences between Dijkastra and Prim

  • Thread starter Thread starter rootX
  • Start date Start date
AI Thread Summary
Dijkstra's algorithm and Prim's algorithm serve different purposes in graph theory, leading to potential discrepancies in their results. Dijkstra's algorithm finds the shortest path between two nodes, while Prim's algorithm constructs a minimum spanning tree (MST) that connects all nodes with the minimum total edge weight. In scenarios where multiple paths exist between two nodes, the paths identified by the two algorithms can differ. For instance, in a given undirected graph with edges A-B, B-C, C-D, and A-D, the shortest path from A to D is a direct edge with a cost of 4, while the MST formed by Prim's algorithm would include edges A-B, B-C, and C-D, resulting in a total weight of 6. This illustrates that the minimum spanning tree does not necessarily provide the shortest path between two specific nodes, confirming that the results from Dijkstra and Prim can indeed differ.
rootX
Messages
478
Reaction score
4
I understand both algorithms. But, I was wondering would there be a case where results between Dijkstra and Prim are different? I haven't found an example where this happens.
i.e. Would the path between A and B provided by the minimum spanning tree be always equal to the minimum distance between A and B from Dijkstra?
 
Technology news on Phys.org
If there are two minimum paths, the results could be different using the two different methods. Obviously, if there is only one minimum path with no alternative having the same total weight, they would be identical paths.
 
Nop, the Prim's algorithm only gives the set with minimum weight of edges connecting all nodes.

Imagine this undirected graph:

A-B weight 2
B-C " 2
C-D " 2
A-D " 4

The shortest path from A to D is using the direct edge with cost 4, while the spawning tree uses the other edges (total sum 6)
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top