3.6 Dijkstra Algorithm - Single Source Shortest Path - Greedy Method

3.6 Dijkstra Algorithm - Single Source Shortest Path - Greedy Method

Abdul Bari

6 лет назад

3,460,754 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Sr Creations
Sr Creations - 30.10.2023 06:08

Sir what is the application of this algorithm
I mean where we can use this algorithm sir.


Could you please tell me in detail....

Ответить
Tanvir Ahmed
Tanvir Ahmed - 20.10.2023 04:01

I believe even Edsger Dijkstra would not be able to explain this so clearly

Ответить
Sanjay
Sanjay - 08.10.2023 06:44

Easy pzzy

Ответить
Ayman Alhadainy
Ayman Alhadainy - 07.10.2023 22:38

Thanks a lot for your explanation

Ответить
KILLER ÕP
KILLER ÕP - 05.10.2023 10:30

Thank you sir❤

Ответить
Mihir
Mihir - 04.10.2023 17:08

Thank you

Ответить
Efe
Efe - 24.09.2023 21:30

Thanks Sir for all your videos, this are helping me to know more about the pattern in solving algorithm.

Ответить
Learn-O-Land
Learn-O-Land - 22.09.2023 09:14

One of the best teachers in my life. Though he is not teaching offline but the way he explains and makes the difficult topics very easy is priceless. Thank you Sir.

Ответить
Salvakhir Aman
Salvakhir Aman - 17.09.2023 19:43

thanks

Ответить
DEAVER KEITH HERMANO MARQUEZ
DEAVER KEITH HERMANO MARQUEZ - 13.09.2023 23:01

Bro it so simple my prof cannot explain that good

Ответить
helthini keli
helthini keli - 03.09.2023 11:40

Huccha agud ond baki 🥲🥲🥲

Ответить
Ayushi
Ayushi - 02.09.2023 19:49

So basic difference between this and bellman ford is:

1) For Dijkstra, because of the limitation to explore only the unvisited nodes from current node( that we are considering) , the distance can be wrongly calculated (if edge is neg).

2) For bellman ford, we explore all the nodes reachable from the current considering node(weather they are visited or not), so it gives the correct answer( even if it has negative edge)


To Note : if the negative edge causes a negative Cycle then the bellman ford also identifies the occurrence , with its second check method) and throws an error(or notifies) and ends the algo.

Pls let me know if my understanding is correct (or if i'm missed something)

Ответить
Ryan Zogheib
Ryan Zogheib - 14.08.2023 21:40

this guys the goat for all comp sci and cyber security students truely the goat

Ответить
Blacklight
Blacklight - 10.08.2023 22:14

This channel is a cheatcode

Ответить
A..A..R..Y..A
A..A..R..Y..A - 10.08.2023 19:42

perfect teaching

Ответить
Waqar Ali
Waqar Ali - 10.08.2023 08:49

Five Year Ago The Playlist was Uploaded
But still no one can compete it
Thanks Alot For Such a WonderFul Playlist For Free

Ответить
Tav Walt
Tav Walt - 05.08.2023 03:14

Awesome job explaining this, it was very clear!!!

Ответить
Aditya P
Aditya P - 01.08.2023 08:54

can we start from node 6th. then the answer is different

Ответить
LazarMartin D
LazarMartin D - 22.07.2023 18:39

Well explained Sir

Ответить