search
HomeBackend DevelopmentC++Check if there is a cycle of length 3 in the graph that satisfies the given condition

Check if there is a cycle of length 3 in the graph that satisfies the given condition

Checks the graph for a loop of length 3 that satisfies the given criteria, preparing to repeatedly traverse each vertex and look at its neighboring vertices. If a vertex has two neighbors that are too connected, a cycle of length 3 exists. This condition guarantees that there is an edge between two neighbors, thus forming a triangle. By filtering all vertices and their neighboring vertices, we will identify whether such a cycle exists. If we find that a vertex has two related neighbors, we can conclude that the graph shows a cycle of length 3 that satisfies the given condition.

usage instructions

  • Adjacency matrix method

  • Adjacency list method

Adjacency method

To check if there is a cycle of length 3 in the graph that satisfies a given condition, we can make use of the contagious method. In this approach, we iterate for each vertex in the graph and check its neighboring vertices. For each vertex, we check whether any two of its neighboring vertices are too closely related. If such a match is found, we check whether the conditions for that match are met. If the condition is met, it indicates a loop of length 3 that is close to satisfying the given condition. By looking at all the vertices in the graph, we can determine if such a cycle exists.

algorithm

  • Initialize the Boolean variable named "cycleExists" to false.

  • Iterate over each vertex in the graph:

    • For each vertex, repeat its adjacent vertices.

    • For each adjacent vertex, emphasize its adjacent vertices (except the current vertex).

    • If any two adjacent vertices are related, continue to the next step.

  • Check whether the combination of associated vertices found in step 2c satisfies the condition.

    • If the condition is met, set "cycleExists" to true and break out of the loop.

  • After completing the cycle, check the value of "cycleExists".

    • If "cycleExists" is true, then there is a cycle of length 3 in the graph that satisfies the given condition.

    • If "cycleExists" is wrong, no such cycle exists.

  • Output results.

  • This calculation repeats the vertices of the graph, analyzes their adjacent vertices, and checks whether any matches of adjacent vertices form a cycle of length 3 that satisfies the given condition.

    李>

Example

#include <iostream>
#include <vector>

using namespace std;

bool checkCycle(vector<vector<int>>& graph, int v, vector<bool>& visited, int parent, int condition) {
    visited[v] = true;

    for (int u : graph[v]) {
        if (!visited[u]) {
            visited[u] = true;

            for (int w : graph[u]) {
                if (visited[w] && w != parent && condition == graph[v][u] + graph[u][w]) {
                    return true;
                }
            }

            visited[u] = false;
        }
    }

    return false;
}

bool hasCycleOfLength3(vector<vector<int>>& graph, int condition) {
    int numVertices = graph.size();
    vector<bool> visited(numVertices, false);

    for (int v = 0; v < numVertices; v++) {
        visited[v] = true;

        for (int u : graph[v]) {
            if (checkCycle(graph, u, visited, v, condition)) {
                return true;
            }
        }

        visited[v] = false;
    }

    return false;
}

int main() {
    int numVertices, numEdges;
    cout << "Enter the number of vertices and edges: ";
    cin >> numVertices >> numEdges;

    vector<vector<int>> graph(numVertices);

    cout << "Enter the connections between vertices (u, v) and their corresponding weights: " << endl;
    for (int i = 0; i < numEdges; i++) {
        int u, v, weight;
        cin >> u >> v >> weight;

        graph[u].push_back(v);
        graph[v].push_back(u);

        // Store the weight/condition between u and v
        graph[u][v] = weight;
        graph[v][u] = weight;
    }

    int condition;
    cout << "Enter the condition to be satisfied: ";
    cin >> condition;

    if (hasCycleOfLength3(graph, condition)) {
        cout << "Cycle of length 3 satisfying the condition exists." << endl;
    } else {
        cout << "Cycle of length 3 satisfying the condition does not exist." << endl;
    }

    return 0;
}


Output

Enter the number of vertices and edges:  

Adjacency list method

Adjacent list methods can be information structures used to talk to the diagram. In this approach, each vertex of the graph is associated with a list containing all its adjacent vertices. To check if there is a cycle of length 3 in the graph that satisfies the given condition, we will iterate over each vertex and its neighboring vertices. For each adjacent vertex, we check if it contains an adjacent vertex in common with the current vertex. If such a common vertex exists, then a ring of length 3 is found. This approach guarantees efficient investigation of the graph by storing essential data about almost all vertices in the infectious list and their associations.

algorithm

  • Make an infectious list that talks to the graph, where each vertex contains a list of its neighboring vertices.

  • Iterate over each vertex in the graph.

  • For each vertex, repeat its adjacent vertices.

  • For each adjacent vertex, emphasize its adjacent vertices (except the current vertex).

  • Check whether there is a common vertex between the current vertex and the adjacent vertex of the adjacent vertex.

  • If a common vertex is found, a cycle of length 3 exists. Return true.

  • If no ring of length 3 is found, return false.

Example

#include <iostream>
#include <vector>
#include <unordered_set>

using namespace std;

bool hasCycleOfLength3(vector<vector<int>>& graph) {
    int n = graph.size();
    
    for (int u = 0; u < n; ++u) {
        unordered_set<int> adjSet(graph[u].begin(), graph[u].end());

        for (int v : graph[u]) {
            for (int w : graph[v]) {
                if (w != u && adjSet.count(w) > 0) {
                    return true; // Cycle of length 3 found
                }
            }
        }
    }

    return false; // No cycle of length 3 found
}

int main() {
    // Create the graph as an adjacency list
    vector<vector<int>> graph = {
        {1, 2},
        {0, 2},
        {0, 1, 3},
        {2, 4},
        {3}
    };

    // Check if a cycle of length 3 exists
    bool cycleExists = hasCycleOfLength3(graph);

    // Print the result
    if (cycleExists) {
        cout << "A cycle of length 3 exists in the graph." << endl;
    } else {
        cout << "No cycle of length 3 exists in the graph." << endl;
    }

    return 0;
}

Output

A cycle of length 3 exists in the graph.

in conclusion

This article examines methods for checking whether there is a loop of length 3 in a graph that satisfies a given condition. It illustrates two approaches, specifically the contagious frame approach and the contagious list approach. This article traces the calculation process and gives bits of C code for both methods. The contagious network approach involves emphasizing each vertex and its neighboring vertices to identify cycles of length 3 that satisfy the condition. The contagious list method exploits information structures that talk to the graph and examines common vertices between adjacent vertices to determine the proximity of cycles.

The above is the detailed content of Check if there is a cycle of length 3 in the graph that satisfies the given condition. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:tutorialspoint. If there is any infringement, please contact admin@php.cn delete
How does the C   Standard Template Library (STL) work?How does the C Standard Template Library (STL) work?Mar 12, 2025 pm 04:50 PM

This article explains the C Standard Template Library (STL), focusing on its core components: containers, iterators, algorithms, and functors. It details how these interact to enable generic programming, improving code efficiency and readability t

How do I use algorithms from the STL (sort, find, transform, etc.) efficiently?How do I use algorithms from the STL (sort, find, transform, etc.) efficiently?Mar 12, 2025 pm 04:52 PM

This article details efficient STL algorithm usage in C . It emphasizes data structure choice (vectors vs. lists), algorithm complexity analysis (e.g., std::sort vs. std::partial_sort), iterator usage, and parallel execution. Common pitfalls like

How does dynamic dispatch work in C   and how does it affect performance?How does dynamic dispatch work in C and how does it affect performance?Mar 17, 2025 pm 01:08 PM

The article discusses dynamic dispatch in C , its performance costs, and optimization strategies. It highlights scenarios where dynamic dispatch impacts performance and compares it with static dispatch, emphasizing trade-offs between performance and

How do I use ranges in C  20 for more expressive data manipulation?How do I use ranges in C 20 for more expressive data manipulation?Mar 17, 2025 pm 12:58 PM

C 20 ranges enhance data manipulation with expressiveness, composability, and efficiency. They simplify complex transformations and integrate into existing codebases for better performance and maintainability.

How do I handle exceptions effectively in C  ?How do I handle exceptions effectively in C ?Mar 12, 2025 pm 04:56 PM

This article details effective exception handling in C , covering try, catch, and throw mechanics. It emphasizes best practices like RAII, avoiding unnecessary catch blocks, and logging exceptions for robust code. The article also addresses perf

How do I use move semantics in C   to improve performance?How do I use move semantics in C to improve performance?Mar 18, 2025 pm 03:27 PM

The article discusses using move semantics in C to enhance performance by avoiding unnecessary copying. It covers implementing move constructors and assignment operators, using std::move, and identifies key scenarios and pitfalls for effective appl

How do I use rvalue references effectively in C  ?How do I use rvalue references effectively in C ?Mar 18, 2025 pm 03:29 PM

Article discusses effective use of rvalue references in C for move semantics, perfect forwarding, and resource management, highlighting best practices and performance improvements.(159 characters)

How does C  's memory management work, including new, delete, and smart pointers?How does C 's memory management work, including new, delete, and smart pointers?Mar 17, 2025 pm 01:04 PM

C memory management uses new, delete, and smart pointers. The article discusses manual vs. automated management and how smart pointers prevent memory leaks.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version