This Java program,to describe the representation of graph using incident list. Vertices and edges are stored as records or objects. Each vertex stores its incident edges, and each edge stores its incident vertices. This data structure allows the storage of additional data on vertices and edges.
Here is the source code of the Java program to describe the representation of graph using incident list. The Java program is successfully compiled and run on a Linux system. The program output is also shown below.
import java.util.HashMap; import java.util.LinkedList; import java.util.List; import java.util.Map; import java.util.Scanner; public class IncidentList { private Map<Integer, List<Integer>> incidentList; private int numberOfVertices; public IncidentList(int numberOfVertices) { this.numberOfVertices = numberOfVertices; incidentList = new HashMap<Integer, List<Integer>>(); for (int vertex = 1; vertex <= numberOfVertices; vertex++) incidentList.put(vertex, new LinkedList<Integer>()); } public void setEdge(int sourcevertex, int destinationvertex, int edgeNumber) { List<Integer> slist = incidentList.get(sourcevertex); slist.add(edgeNumber); return; } public List<Integer> getEdge(int vertex) { return incidentList.get(vertex); } public void printIncidentList() { System.out.println("Vertex EdgeNumber"); for (int vertex = 1; vertex <= numberOfVertices; vertex++) { System.out.print(vertex + ":"); List<Integer> edgeList = getEdge(vertex); for (int j = 1; ; j++) { if (j != edgeList.size()) System.out.print(edgeList.get(j - 1) + "\t"); else { System.out.print(edgeList.get(j - 1)); break; } } System.out.println(); } } public static void main(String... arg) { int numberOfVertices, numberOfEdges; int source, destination, edgeNumber; int edgeCount = 1; Scanner scanner = new Scanner(System.in); System.out.println("Enter the number of vertices"); numberOfVertices = scanner.nextInt(); IncidentList incidentList = new IncidentList(numberOfVertices); System.out.println("Enter the number of edges"); numberOfEdges = scanner.nextInt(); System.out.println("Enter the edges format : <edgeNumber> <source> <destination>"); while (edgeCount <= numberOfEdges) { edgeNumber = scanner.nextInt(); source = scanner.nextInt(); destination = scanner.nextInt(); incidentList.setEdge(source, destination, edgeNumber); edgeCount++; } System.out.println("\nThe Incident List is "); incidentList.printIncidentList(); scanner.close(); } }
$javac IterativeDeepening.java $java IterativeDeepening Enter the number of vertices 5 Enter the number of edges 5 Enter the edges format : <edgeNumber> <source> <destination> 1 1 2 2 2 4 3 5 4 4 4 3 5 5 1 The Incident List is Vertex EdgeNumber 1 : 1 5 2 : 1 2 3 : 4 4 : 2 3 4 5 : 3 5
Related posts:
Java Concurrency Interview Questions and Answers
Java Program to Implement LinkedHashMap API
Java Program to Describe the Representation of Graph using Adjacency Matrix
Java Program to Implement Meldable Heap
Java – Reader to Byte Array
Java Program to Perform the Unique Factorization of a Given Number
Spring Data JPA and Null Parameters
Guide to Guava Multimap
Java CyclicBarrier vs CountDownLatch
Java Program to Implement Gaussian Elimination Algorithm
Từ khóa static và final trong java
Comparing Objects in Java
Java Program to Check Whether Graph is DAG
Java Program to Optimize Wire Length in Electrical Circuit
Check If a String Is Numeric in Java
Guide to Selenium with JUnit / TestNG
Finding the Differences Between Two Lists in Java
Guava Collections Cookbook
Java Program to Implement Affine Cipher
Java Program to Create a Random Linear Extension for a DAG
Java Program to Implement Gale Shapley Algorithm
Iterating over Enum Values in Java
A Guide to Java 9 Modularity
Spring Boot - Introduction
Java Program to Implement Hash Tables Chaining with List Heads
Spring Boot - Twilio
Java Program to Generate All Possible Subsets with Exactly k Elements in Each Subset
Introduction to Java Serialization
Java Program to Give an Implementation of the Traditional Chinese Postman Problem
Jackson – Marshall String to JsonNode
Java Program to Perform Deletion in a BST
Spring Cloud – Securing Services