SlideShare a Scribd company logo
1 of 3
G REEDY-M ATCHING 1 (G)
                  M ←∅
                  while E(G) = ∅
                (*)    pick the lexicographically first e ∈ E(G)
                       M ← M ∪ {e}
                       remove e and all
                             edges adjacent to e
                             from E(G)
                  return M

Assume the edges in the given graph are ordered pairs (i.e. put a
top-down direction on them).

E(G) = {(1, 6), (1, 9), (1, 10), (2, 7), (2, 8), (2, 9), (2, 10), (3, 7), (3, 8), (4, 6), (4, 7), (4, 8), (5, 6)}



                                                2
The Hungarian algorithm
We will start today’s lecture by running through an example. Consider the
graph below. We will compare the results of G REEDY-M ATCHING 1 with
those of H UNGARIAN -M ATCHING.
                        1     2     3      4    5




                      10     9     8     7      6
You are warmly invited to try this at home with paper and pencil first.




                                    1
1    2   3       4   5




10   9   8       7   6

             4

More Related Content

What's hot

Darmon Points in mixed signature
Darmon Points in mixed signatureDarmon Points in mixed signature
Darmon Points in mixed signaturemmasdeu
 
Darmon Points for fields of mixed signature
Darmon Points for fields of mixed signatureDarmon Points for fields of mixed signature
Darmon Points for fields of mixed signaturemmasdeu
 
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...Editor IJCATR
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS IAEME Publication
 
Some Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious GraphsSome Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious Graphsrahulmonikasharma
 
Dobule and triple integral
Dobule and triple integralDobule and triple integral
Dobule and triple integralsonendra Gupta
 
Discrete-Chapter 11 Graphs Part III
Discrete-Chapter 11 Graphs Part IIIDiscrete-Chapter 11 Graphs Part III
Discrete-Chapter 11 Graphs Part IIIWongyos Keardsri
 
Ppt fiske daels mei drisa desain media komputer
Ppt fiske daels mei drisa desain media komputerPpt fiske daels mei drisa desain media komputer
Ppt fiske daels mei drisa desain media komputerArdianPratama22
 
Discrete-Chapter 11 Graphs Part I
Discrete-Chapter 11 Graphs Part IDiscrete-Chapter 11 Graphs Part I
Discrete-Chapter 11 Graphs Part IWongyos Keardsri
 
Mathematical Methods in Physics-7 Pages 1012-1112
Mathematical Methods in Physics-7 Pages 1012-1112Mathematical Methods in Physics-7 Pages 1012-1112
Mathematical Methods in Physics-7 Pages 1012-1112Rajput Abdul Waheed Bhatti
 
Indefinite Integral
Indefinite IntegralIndefinite Integral
Indefinite IntegralJelaiAujero
 

What's hot (18)

Darmon Points in mixed signature
Darmon Points in mixed signatureDarmon Points in mixed signature
Darmon Points in mixed signature
 
Darmon Points for fields of mixed signature
Darmon Points for fields of mixed signatureDarmon Points for fields of mixed signature
Darmon Points for fields of mixed signature
 
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
 
Aj26225229
Aj26225229Aj26225229
Aj26225229
 
Some Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious GraphsSome Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious Graphs
 
Dobule and triple integral
Dobule and triple integralDobule and triple integral
Dobule and triple integral
 
Bc4103338340
Bc4103338340Bc4103338340
Bc4103338340
 
Graphs
GraphsGraphs
Graphs
 
Discrete-Chapter 11 Graphs Part III
Discrete-Chapter 11 Graphs Part IIIDiscrete-Chapter 11 Graphs Part III
Discrete-Chapter 11 Graphs Part III
 
Math1000 section2.6
Math1000 section2.6Math1000 section2.6
Math1000 section2.6
 
Ppt fiske daels mei drisa desain media komputer
Ppt fiske daels mei drisa desain media komputerPpt fiske daels mei drisa desain media komputer
Ppt fiske daels mei drisa desain media komputer
 
The integral
The integralThe integral
The integral
 
Discrete-Chapter 11 Graphs Part I
Discrete-Chapter 11 Graphs Part IDiscrete-Chapter 11 Graphs Part I
Discrete-Chapter 11 Graphs Part I
 
graph theory
graph theorygraph theory
graph theory
 
Mathematical Methods in Physics-7 Pages 1012-1112
Mathematical Methods in Physics-7 Pages 1012-1112Mathematical Methods in Physics-7 Pages 1012-1112
Mathematical Methods in Physics-7 Pages 1012-1112
 
Indefinite Integral
Indefinite IntegralIndefinite Integral
Indefinite Integral
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 

Viewers also liked

How to Find Clients & Keep Them - Terry August
How to Find Clients & Keep Them - Terry AugustHow to Find Clients & Keep Them - Terry August
How to Find Clients & Keep Them - Terry AugustDebbie Pietro-Quintana
 
What freelance copywriting services should you offer?
What freelance copywriting services should you offer?What freelance copywriting services should you offer?
What freelance copywriting services should you offer?Heather Lloyd-Martin
 
Find clients fast: 3 steps to define your ideal client
Find clients fast: 3 steps to define your ideal clientFind clients fast: 3 steps to define your ideal client
Find clients fast: 3 steps to define your ideal clientFabienne Fredrickson
 
Social media to reach clients
Social media to reach clientsSocial media to reach clients
Social media to reach clientsChris Dattilo
 
Killer Content Marketing
Killer Content MarketingKiller Content Marketing
Killer Content MarketingHiten Shah
 
Killer Marketing Bonus
Killer Marketing BonusKiller Marketing Bonus
Killer Marketing BonusHiten Shah
 
Basic blueprint reading
Basic blueprint readingBasic blueprint reading
Basic blueprint readingJames Shearer
 
10 step sales process
10 step sales process10 step sales process
10 step sales processeconnexx
 

Viewers also liked (13)

How to Find Clients & Keep Them - Terry August
How to Find Clients & Keep Them - Terry AugustHow to Find Clients & Keep Them - Terry August
How to Find Clients & Keep Them - Terry August
 
What freelance copywriting services should you offer?
What freelance copywriting services should you offer?What freelance copywriting services should you offer?
What freelance copywriting services should you offer?
 
Find clients fast: 3 steps to define your ideal client
Find clients fast: 3 steps to define your ideal clientFind clients fast: 3 steps to define your ideal client
Find clients fast: 3 steps to define your ideal client
 
Killer list blueprint
Killer list blueprintKiller list blueprint
Killer list blueprint
 
Social media to reach clients
Social media to reach clientsSocial media to reach clients
Social media to reach clients
 
Target audience
Target audienceTarget audience
Target audience
 
Killer Content Marketing
Killer Content MarketingKiller Content Marketing
Killer Content Marketing
 
Lecture 6
Lecture    6 Lecture    6
Lecture 6
 
Killer Marketing Bonus
Killer Marketing BonusKiller Marketing Bonus
Killer Marketing Bonus
 
Product Positioning
Product PositioningProduct Positioning
Product Positioning
 
Sales flowchart
Sales flowchartSales flowchart
Sales flowchart
 
Basic blueprint reading
Basic blueprint readingBasic blueprint reading
Basic blueprint reading
 
10 step sales process
10 step sales process10 step sales process
10 step sales process
 

Similar to Working Smarter By Using Technology

Elements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptxElements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptxmiki304759
 
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESTHE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESgraphhoc
 
Graph Dynamical System on Graph Colouring
Graph Dynamical System on Graph ColouringGraph Dynamical System on Graph Colouring
Graph Dynamical System on Graph ColouringClyde Shen
 
Ppt of graph theory
Ppt of graph theoryPpt of graph theory
Ppt of graph theoryArvindBorge
 
Problem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element MethodProblem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element MethodPeter Herbert
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetrygraphhoc
 
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to MatchingsMaximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchingssagark4
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYFransiskeran
 
Applied Graph Theory Applications
Applied Graph Theory ApplicationsApplied Graph Theory Applications
Applied Graph Theory Applicationsvipin3195
 

Similar to Working Smarter By Using Technology (20)

Lingerie Shoot
Lingerie ShootLingerie Shoot
Lingerie Shoot
 
Rv2
Rv2Rv2
Rv2
 
10.1.1.226.4381
10.1.1.226.438110.1.1.226.4381
10.1.1.226.4381
 
Isograph
IsographIsograph
Isograph
 
Elements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptxElements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptx
 
Graph theory
Graph theoryGraph theory
Graph theory
 
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESTHE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
 
Graph Dynamical System on Graph Colouring
Graph Dynamical System on Graph ColouringGraph Dynamical System on Graph Colouring
Graph Dynamical System on Graph Colouring
 
Graph ds
Graph dsGraph ds
Graph ds
 
graph_theory_ch_3_20201124.ppt
graph_theory_ch_3_20201124.pptgraph_theory_ch_3_20201124.ppt
graph_theory_ch_3_20201124.ppt
 
FDP-libre(1)
FDP-libre(1)FDP-libre(1)
FDP-libre(1)
 
Merrk
MerrkMerrk
Merrk
 
MMath
MMathMMath
MMath
 
Ppt of graph theory
Ppt of graph theoryPpt of graph theory
Ppt of graph theory
 
Problem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element MethodProblem Solving by Computer Finite Element Method
Problem Solving by Computer Finite Element Method
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
 
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to MatchingsMaximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 
Applied Graph Theory Applications
Applied Graph Theory ApplicationsApplied Graph Theory Applications
Applied Graph Theory Applications
 
FCS (graphs).pptx
FCS (graphs).pptxFCS (graphs).pptx
FCS (graphs).pptx
 

More from Oregon Law Practice Management

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Oregon Law Practice Management
 

More from Oregon Law Practice Management (20)

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 

Working Smarter By Using Technology

  • 1. G REEDY-M ATCHING 1 (G) M ←∅ while E(G) = ∅ (*) pick the lexicographically first e ∈ E(G) M ← M ∪ {e} remove e and all edges adjacent to e from E(G) return M Assume the edges in the given graph are ordered pairs (i.e. put a top-down direction on them). E(G) = {(1, 6), (1, 9), (1, 10), (2, 7), (2, 8), (2, 9), (2, 10), (3, 7), (3, 8), (4, 6), (4, 7), (4, 8), (5, 6)} 2
  • 2. The Hungarian algorithm We will start today’s lecture by running through an example. Consider the graph below. We will compare the results of G REEDY-M ATCHING 1 with those of H UNGARIAN -M ATCHING. 1 2 3 4 5 10 9 8 7 6 You are warmly invited to try this at home with paper and pencil first. 1
  • 3. 1 2 3 4 5 10 9 8 7 6 4
  • 4. 1 2 3 4 5 10 9 8 7 6 3
  • 5. 1 2 3 4 5 10 9 8 7 6 6
  • 6. 1 2 3 4 5 10 9 8 7 6 5
  • 7. 1 2 3 4 5 10 9 8 7 6 8
  • 8. 1 2 3 4 5 10 9 8 7 6 7
  • 9. Hungarian algorithm The approach given below seems to have first appeared in the work of K¨ nig (1916, 1931, 1936) and Egerv´ ry (1931) who reduced the problem o a with general non-negative weights on the edges to the unweighted case. H UNGARIAN -M ATCHING (G) let M be any matching in G repeat form a maximal forest F having properties 1. and 2. if there is an edge joining V (F ) ∩ V1 to a vertex in U2 M ← Augment(M, F ) else return M until T RUE 10
  • 10. 1 2 3 4 5 10 9 8 7 6 9
  • 11. 1 2 3 4 5 U1 U2 10 9 8 7 6 12
  • 12. 1 2 3 4 5 U1 U2 10 9 8 7 6 11
  • 13. 1 2 3 4 5 10 9 8 7 6 14
  • 14. 1 2 3 4 5 U1 U2 10 9 8 7 6 13
  • 15. Edmonds’ algorithm The first polynomial time matching algorithm for general graphs was constructed by Edmonds. In this algorithm the key idea of “shrinking” certain odd cycles was introduced. Up to the present time most matching algorithms – certainly the most successful ones – are based (implicitly or explicitly) on this idea. We begin with a lemma which will enable us to reduce the size of the graph under consideration in many cases. The lemma help us understand the crucial step of “cycle shrinking” and lends us confidence that we are not losing necessary information when carrying out such shrinking. 16
  • 16. Maximum matching in general graphs We presented an algorithm for finding a maximum matching in a bipartite graph. From a mathematical point of view, this algorithm is essentially no more involved than the proof of K¨ nig’s equality. o For non-bipartite graphs the situation is quite different. Known poly-time algorithms for finding a maximum matching in a general graph are among the most involved combinatorial algorithms. Most of them are based on augmentation along alternating paths. But important new ideas are needed to turn these tricks into polynomial time algorithms. 15
  • 17. Proof (|M | = ν(G ) ⇒ |M | = ν(G)) Assume that |M | < ν(G). Then there exists an augmenting path P relative to M . Two cases arise: P vertex-disjoint from Z In such case P is also an M -augmenting path, and hence |M | < ν(G ). Contradiction! P does intersect Z W.l.o.g. there must be an endpoint, say x, of P that is not in Z. Let z be the first vertex in the path P which also belongs to Z. The path Q from x to z is mapped onto an M -augmenting path when Z is contracted. Hence |M | < ν(G ). Contradiction! (|M | = ν(G) ⇒ |M | = ν(G )) This time assume M is not maximum. Take a maximum matching N in G . Then expand Z and define a matching N in G. Then |N | = |N | + k > |M | + k = |M |, i.e. M is not a maximum matching. Contradiction! 18
  • 18. Shrinking Lemma. Let G be a graph and M a matching in G. Let Z be a cycle of length 2k + 1 which contains k lines of M and is vertex-disjoint from the rest of M . Let G be the graph obtained from G by shrinking Z to a single vertex. Then M = M E(Z) is a maximum matching in G if and only if M is a maximum matching in G. 17
  • 19. 19-1
  • 20. Algorithm description We now turn to an informal description of Edmonds Matching Algorithm. We are given a graph G. Let M be a matching in G. If M is perfect we are done! Otherwise let S be the set of vertices that are not covered by M . Construct (as in the bipartite case) a forest F such that every connected component of F contains exactly one vertexa of S, every point of S belongs to exactly one component of F , and every edge of F which is at an odd distance from a point in S belongs to M . a It may be defined as the root of the component under consideration. 19
  • 21. “External” outer vertices Next we consider the neighbours of outer vertices. If we find an outer vertex x adjacent to a vertex y not in F , then we can enlarge F by adding the edges {x, y} and {y, z} ∈ M . 21
  • 22. Properties of F Every vertex of F which is at an odd distance from S has degree two in F . Such vertices will be called inner vertices, while the remaining vertices in F will be called outer vertices (in particular all vertices in S are outer). Such a forest is called M -alternating forest. Clearly, the (trivial) forest with vertex set S and no line is an M -alternating forest (although not a very useful one!). 20
  • 23. “Adjacent” outer vertices in the same component Alternating path after switching x y Blossom before shrinking 23
  • 24. “Adjacent” outer vertices in different components If F has two adjacent outer vertices x and y belonging to different components of F , then the roots of these two components of F are connected by an M -augmenting path. We can obtain a larger matching! And after this we restart the process by constructing a new (smaller) F . 22
  • 25. Finally, if every outer vertex has only inner vertices as neighbours, then we claim that the matching M is already maximum. For suppose that F contains m inner vertices and n outer vertices. Clearly |S| = n − m. Furthermore if we delete all the inner vertices of F from G, the remaining graph will contain all the outer vertices of F as isolated points. Hence def(G) ≥ n − m = |S|. But M misses exactly |S| vertices, and so it must be a maximum matching. 25
  • 26. If F has two outer vertices x and y in the same connected component which are adjacent in G, then let C be the cycle formed by the line {x, y} and the path from x to y in F . Let P denote the (unique) patha in F connecting C to a root of F . Clearly P is an M -alternating path, so if we “switch” on P , we obtain another matching M1 of the same size as M . But M1 and C satisfy the conditions of the shrinking Lemma, and so if we shrink C to a single point to obtain a new graph G , we have reduced the task of finding a matching larger than M in G to the task of finding a matching larger than M1 E(C) in the smaller graph G . a We allow C to pass through the root, in which case P consists of a single point. 24
  • 27.
  • 28. In summary we can always do one of the following: • enlarge F , • enlarge M , • decrease |V (G)|, or • stop with a maximum matching! Thus it is clear that the algorithm terminates in polynomial time with a maximum matching in G. 26