This is a java program to check whether a graph is strongly connected or weakly connected. If graph has more than one connected components it is weakly connected. If graph has only one connected component it is strongly connected.
Here is the source code of the Java Program to Check Whether it is Weakly Connected or Strongly Connected for a Directed Graph. The Java program is successfully compiled and run on a Windows system. The program output is also shown below.
package com.maixuanviet.graph;
import java.util.ArrayList;
import java.util.Iterator;
import java.util.List;
import java.util.Scanner;
import java.util.Stack;
public class StronglyorWeaklyConnectedDigraphs
{
private int V;
private int preCount;
private int[] low;
private boolean[] visited;
private List<Integer>[] graph;
private List<List<Integer>> sccComp;
private Stack<Integer> stack;
/** function to get all strongly connected components **/
public List<List<Integer>> getSCComponents(List<Integer>[] graph)
{
V = graph.length;
this.graph = graph;
low = new int[V];
visited = new boolean[V];
stack = new Stack<Integer>();
sccComp = new ArrayList<>();
for (int v = 0; v < V; v++)
if (!visited[v])
dfs(v);
return sccComp;
}
/** function dfs **/
public void dfs(int v)
{
low[v] = preCount++;
visited[v] = true;
stack.push(v);
int min = low[v];
for (int w : graph[v])
{
if (!visited[w])
dfs(w);
if (low[w] < min)
min = low[w];
}
if (min < low[v])
{
low[v] = min;
return;
}
List<Integer> component = new ArrayList<Integer>();
int w;
do
{
w = stack.pop();
component.add(w);
low[w] = V;
}
while (w != v);
sccComp.add(component);
}
@SuppressWarnings("unchecked")
public static void main(String[] args)
{
Scanner scan = new Scanner(System.in);
System.out.println("Enter number of Vertices");
/** number of vertices **/
int V = scan.nextInt();
/** make graph **/
List<Integer>[] g = new List[V];
for (int i = 0; i < V; i++)
g[i] = new ArrayList<Integer>();
/** accept all edges **/
System.out.println("Enter number of edges");
int E = scan.nextInt();
/** all edges **/
System.out.println("Enter the edges in the graph : <from> <to>");
for (int i = 0; i < E; i++)
{
int x = scan.nextInt();
int y = scan.nextInt();
g[x].add(y);
}
StronglyConnectedGraph t = new StronglyConnectedGraph();
System.out.print("The graph is : ");
/** print all strongly connected components **/
List<List<Integer>> scComponents = t.getSCComponents(g);
Iterator<List<Integer>> iterator = scComponents.iterator();
boolean weaklyConnected = false;
while (iterator.hasNext())
{
if (iterator.next().size() <= 1)
{
weaklyConnected = true;
}
}
if (weaklyConnected == true)
System.out.println("Weakly Connected");
else
System.out.println("Strongly Connected");
scan.close();
}
}
Output:
$ javac StronglyorWeaklyConnectedDigraphs.java $ java StronglyorWeaklyConnectedDigraphs Enter number of Vertices 6 Enter number of edges 7 Enter the edges in the graph : <from> <to> 0 1 1 2 1 3 3 4 4 5 5 3 5 2 The graph is : Weakly Connected
Related posts:
Assert an Exception is Thrown in JUnit 4 and 5
Connect through a Proxy
Jackson – Bidirectional Relationships
Java Deep Learning Essentials - Yusuke Sugomori
List Interface trong Java
A Guide to Apache Commons Collections CollectionUtils
Java Program to Implement Uniform-Cost Search
Java Program to Represent Graph Using Adjacency Matrix
Java Program to Implement Find all Cross Edges in a Graph
An Intro to Spring Cloud Security
Java Program to Implement Hash Tables Chaining with List Heads
Display Auto-Configuration Report in Spring Boot
Spring WebFlux Filters
Transactions with Spring and JPA
Converting String to Stream of chars
A Guide to LinkedHashMap in Java
Introduction to the Java NIO2 File API
Receive email using IMAP
OAuth2 Remember Me with Refresh Token
Java Program to Implement Interpolation Search Algorithm
Java Program to Create a Minimal Set of All Edges Whose Addition will Convert it to a Strongly Conne...
How to Manually Authenticate User with Spring Security
Java Program to Implement AttributeList API
Java 14 Record Keyword
Explain about URL and HTTPS protocol
Java Program to Implement Gauss Seidel Method
Spring Security Basic Authentication
Template Engines for Spring
Convert XML to JSON Using Jackson
Java Program to Implement SynchronosQueue API
Intro to Inversion of Control and Dependency Injection with Spring
Java Program to Perform Left Rotation on a Binary Search Tree