Skip to main content

Dijkstra’s Algorithm Explained


Dijkstra’s Algorithm Explained

Dijkstra’s algorithm is used to find the minimum cost path from a single source node to all other nodes in a graph with non-negative edge weights.

Unlike Floyd–Warshall (all pairs), Dijkstra focuses on one starting point.

For Example

  • Each letter (az) is a node
  • Each allowed transformation is a directed edge
  • Each edge has a cost
  • We want the cheapest cost from a source letter to all others

1. Think of Letters as Cities

Imagine each letter is a city and each transformation is a one-way road with a toll.

a → b (2)
a → c (4)
b → c (1)
c → d (3)

You start in city a and want to find the cheapest way to reach every other city.

2. Distance Array

We maintain an array:

dist[x] = minimum cost to reach x from the source

Initial setup:

  • dist[source] = 0
  • All other distances = infinity (∞)
  • No node has been visited yet

Example (source = a):

a: 0
b: ∞
c: ∞
d: ∞

3. The Core Idea

Always expand the currently cheapest unvisited node.

  1. Pick the unvisited node with the smallest known distance
  2. Try to improve distances to its neighbors
  3. Mark the node as visited (finalized)

Once a node is visited, its shortest distance is guaranteed.

4. Relaxation Step

When we move from node u to neighbor v:

if dist[u] + cost(u → v) < dist[v]:
    dist[v] = dist[u] + cost(u → v)

This process is called relaxation.

5. Step-by-Step Example

Graph:

a → b (2)
a → c (4)
b → c (1)
c → d (3)

Step 1: Start at a

dist[a] = 0
dist[b] = 2
dist[c] = 4
dist[d] = ∞

Mark a as visited.

Step 2: Visit b

Check b → c:

2 + 1 = 3 < 4

Update:

dist[c] = 3

Mark b as visited.

Step 3: Visit c

Check c → d:

3 + 3 = 6

Update:

dist[d] = 6

6. Final Distances

a → a = 0
a → b = 2
a → c = 3
a → d = 6

7. Why It Always Works

  • Edge costs are non-negative
  • The smallest unvisited distance is always optimal
  • Once a node is finalized, no cheaper path can appear later

This greedy choice is provably correct.

8. Pseudocode

initialize dist[] with infinity
dist[source] = 0
priority queue pq
pq.push(source, 0)

while pq not empty:
    u = node with smallest dist
    if u is visited:
        continue
    mark u as visited

    for each neighbor v of u:
        if dist[u] + cost(u → v) < dist[v]:
            dist[v] = dist[u] + cost(u → v)
            pq.push(v, dist[v])

9. When to Use Dijkstra

Use Dijkstra when:

  • You need shortest paths from one source
  • All edge weights are non-negative

Do NOT use when:

  • Negative edge weights exist (use Bellman–Ford)
  • You need all-pairs shortest paths (use Floyd–Warshall)

Further Reading

People are good at skipping over material they already know!

View Related Topics to







Contact Us

Name

Email *

Message *

Popular Posts

Online Simulator for ASK, FSK, and PSK

Try our new Digital Signal Processing Simulator!   Start Simulator for binary ASK Modulation Message Bits (e.g. 1,0,1,0) Carrier Frequency (Hz) Sampling Frequency (Hz) Run Simulation Simulator for binary FSK Modulation Input Bits (e.g. 1,0,1,0) Freq for '1' (Hz) Freq for '0' (Hz) Sampling Rate (Hz) Visualize FSK Signal Simulator for BPSK Modulation ...

Constellation Diagrams of ASK, PSK, and FSK

๐Ÿ“˜ Overview of Energy per Bit (Eb / N0) ๐Ÿงฎ Online Simulator for constellation diagrams of ASK, FSK, and PSK ๐Ÿงฎ Theory behind Constellation Diagrams of ASK, FSK, and PSK ๐Ÿงฎ MATLAB Codes for Constellation Diagrams of ASK, FSK, and PSK ๐Ÿ“š Further Reading ๐Ÿ“‚ Other Topics on Constellation Diagrams of ASK, PSK, and FSK ... ๐Ÿงฎ Simulator for constellation diagrams of m-ary PSK ๐Ÿงฎ Simulator for constellation diagrams of m-ary QAM BASK (Binary ASK) Modulation: Transmits one of two signals: 0 or -√Eb, where Eb​ is the energy per bit. These signals represent binary 0 and 1.    BFSK (Binary FSK) Modulation: Transmits one of two signals: +√Eb​ ( On the y-axis, the phase shift of 90 degrees with respect to the x-axis, which is also termed phase offset ) or √Eb (on x-axis), where Eb​ is the energy per bit. These signals represent binary 0 and 1.  BPSK (Binary PSK) Modulation: Transmits one of two signals...

BER vs SNR for M-ary QAM, M-ary PSK, QPSK, BPSK, ...

๐Ÿ“˜ Overview of BER and SNR ๐Ÿงฎ Online Simulator for BER calculation of m-ary QAM and m-ary PSK ๐Ÿงฎ MATLAB Code for BER calculation of M-ary QAM, M-ary PSK, QPSK, BPSK, ... ๐Ÿ“š Further Reading ๐Ÿ“‚ View Other Topics on M-ary QAM, M-ary PSK, QPSK ... ๐Ÿงฎ Online Simulator for Constellation Diagram of m-ary QAM ๐Ÿงฎ Online Simulator for Constellation Diagram of m-ary PSK ๐Ÿงฎ MATLAB Code for BER calculation of ASK, FSK, and PSK ๐Ÿงฎ MATLAB Code for BER calculation of Alamouti Scheme ๐Ÿงฎ Different approaches to calculate BER vs SNR What is Bit Error Rate (BER)? The abbreviation BER stands for Bit Error Rate, which indicates how many corrupted bits are received (after the demodulation process) compared to the total number of bits sent in a communication process. BER = (number of bits received in error) / (total number of tran...

MATLAB Code for Rms Delay Spread

RMS delay spread is crucial when you need to know how much the signal is dispersed in time due to multipath propagation, the spread (variance) around the average. In high-data-rate systems like LTE, 5G, or Wi-Fi, even small time dispersions can cause ISI. RMS delay spread is directly related to the amount of ISI in such systems. RMS Delay Spread [↗] Delay Spread Calculator Enter delays (ns) separated by commas: Enter powers (dB) separated by commas: Calculate   The above calculator Converts Power to Linear Scale: It correctly converts the power values from decibels (dB) to a linear scale. Calculates Mean Delay: It accurately computes the mean excess delay, which is the first moment of the power delay profile. Calculates RMS Delay Spread: It correctly calculates the RMS delay spread, defined as the square root of the second central moment of the power delay profile.   MATLAB Code  clc...

Alamouti Scheme for 2x2 MIMO in MATLAB

๐Ÿ“˜ Overview & Theory ๐Ÿงฎ MATLAB Code for Alamouti Scheme ๐Ÿงฎ MATLAB Code for BER vs. SNR for Alamouti Scheme ๐Ÿงฎ Alamouti Scheme Simulator ๐Ÿงฎ Alamouti Scheme Transmission Table ๐Ÿ“š Further Reading    Read about the Alamouti Scheme first MATLAB Code for Alamouti's Precoding Matrix for 2 X 2 MIMO % Clear any existing data and figures clc; clear; close all; % Define system parameters transmitAntennas = 2; % Number of antennas at the transmitter receiveAntennas = 2; % Number of antennas at the receiver symbolCount = 1000000; % Number of symbols to transmit SNR_dB = 15; % Signal-to-Noise Ratio in decibels % Generate random binary data for transmission rng(10); % Set seed for reproducibility transmitData = randi([0, 1], transmitAntennas, symbolCount); % Perform Binary Phase Shift Keying (BPSK) modulation modulatedSymbols = 1 - 2 * transmitData; % Define Alamouti's Precoding Matrix precodingMatrix = [1 1; -1i 1i]; % Encode and transmit dat...

RMS Delay Spread, Excess Delay Spread and Multi-path ...

๐Ÿ“˜ Overview of Delay Spread and Multi-path ๐Ÿงฎ Excess Delay spread ๐Ÿงฎ Power delay Profile ๐Ÿงฎ RMS Delay Spread ๐Ÿ“š Further Reading ๐Ÿ“‚ Other Topics on RMS Delay Spread, Excess Delay ... ๐Ÿงฎ Multipath Components or MPCs ๐Ÿงฎ Online Simulator for Calculating RMS Delay Spread ๐Ÿงฎ Why is there significant multipath in the case of very high frequencies? ๐Ÿงฎ Why RMS Delay Spread is essential for wireless communication? ๐Ÿงฎ Why the Power Delay Profile is essential? ๐Ÿงฎ MATLAB Codes for Calculating Different Types of delay Spreads Delay Spread, Excess Delay Spread, and Multipath (MPCs) The fundamental distinction between wireless and wired connections is that in wireless connections signal reaches at receiver thru multipath signal propagation rather than directed transmission like co-axial cable. Wireless Communication has no set communication path between the transmitter and the receiver. The line...

Comparisons among ASK, PSK, and FSK | And the definitions of each

๐Ÿ“˜ Comparisons among ASK, FSK, and PSK ๐Ÿงฎ Online Simulator for calculating Bandwidth of ASK, FSK, and PSK ๐Ÿงฎ MATLAB Code for BER vs. SNR Analysis of ASK, FSK, and PSK ๐Ÿ“š Further Reading ๐Ÿ“‚ View Other Topics on Comparisons among ASK, PSK, and FSK ... ๐Ÿงฎ Comparisons of Noise Sensitivity, Bandwidth, Complexity, etc. ๐Ÿงฎ MATLAB Code for Constellation Diagrams of ASK, FSK, and PSK ๐Ÿงฎ Online Simulator for ASK, FSK, and PSK Generation ๐Ÿงฎ Online Simulator for ASK, FSK, and PSK Constellation ๐Ÿงฎ Some Questions and Answers Modulation ASK, FSK & PSK Constellation MATLAB Simulink MATLAB Code Comparisons among ASK, PSK, and FSK    Comparisons among ASK, PSK, and FSK Comparison among ASK, FSK, and PSK Parameters ASK FSK PSK Variable Characteristics Amplitude Frequency ...

ASK, FSK, and PSK

๐Ÿ“˜ Overview ๐Ÿ“˜ Amplitude Shift Keying (ASK) ๐Ÿ“˜ Frequency Shift Keying (FSK) ๐Ÿ“˜ Phase Shift Keying (PSK) ๐Ÿ“˜ Which of the modulation techniques—ASK, FSK, or PSK—can achieve higher bit rates? ๐Ÿงฎ MATLAB Codes ๐Ÿ“˜ Simulator for binary ASK, FSK, and PSK Modulation ๐Ÿ“š Further Reading ASK or OFF ON Keying ASK is a simple (less complex) Digital Modulation Scheme where we vary the modulation signal's amplitude or voltage by the message signal's amplitude or voltage. We select two levels (two different voltage levels) for transmitting modulated message signals. For example, "+5 Volt" (upper level) and "0 Volt" (lower level). To transmit binary bit "1", the transmitter sends "+5 Volts", and for bit "0", it sends no power. The receiver uses filters to detect whether a binary "1" or "0" was transmitted. ...