Problemas de Inteligencia Artificial Inglés (Curso ) Tercer curso del Grado en Ingeniería Informática, Universidad de Sevilla
|
|
- Alisha Ada Lambert
- 7 years ago
- Views:
Transcription
1 Problemas de Inteligencia Artificial Inglés (Curso 0 05) Tercer curso del Grado en Ingeniería Informática, Universidad de Sevilla Search in state spaces. Consider a problem formulated in the states space framework, having constant branching factor b and having a unique solution located at depth d. Calculate, both for the best and the worst cases, the number of nodes that need to be analyzed in order to find the solution when running a breadth-first search. Do the same for depth-first search. Calculate, both for the best and the worst cases, the maximum number of nodes that could be waiting to be analyzed in the OPEN queue when running a breadth-first search. Do the same for iterative deepening search.. Provide an example of a state space problem such that the CLOSED list is superfluous in depth-first and breadth-first search algorithms, explaining why it is so.. Consider a state space problem such that all the solutions, in case they exist, must have a fixed number of actions d. If we need to choose an uninformed searching algorithm, which one is more adequate? The answer should be justified.. Suppose we have two admissible heuristic functions, h and h, one of them being more informed than the other, and we want to apply the A algorithm. Are there any differences from a theoretical point of view between using one or the other? And from a practical point of view? 5. A group of 5 people are going to cross an old and narrow bridge. It is a dark night and the bridge cannot be crossed without a torch. The group has only one torch, whose battery will last only for 5 minutes. a) Person A can cross the bridge in 0 seconds, while B, C, D and E spend 0, 0, 80 and 0 seconds, respectively. b) The bridge can only hold two people at a time, and when two people cross the bridge together, they must move at the slower person s pace. c) The torch cannot be thrown from one end of the bridge to the other, therefore after two people cross, one of them should cross back to bring the torch to the rest, until all of them have crossed. a) Formulate this problem in the states space framework, describing precisely all the elements b) Define two different heuristics, reasoning for each one whether they are admissible. c) Apply the A algorithm with the best one of these heuristics. For the sake of simplicity, start building the search tree using as initial situation having A and C on the left (still have to cross), and B, D and E are on the right having the torch with them. The evolution of the search tree should be explained explicitly: order of analysis of the nodes; their values; justifying why new successors are not included, etc.
2 . We have a toaster that can work on one or two slices of bread at the same time. However, it does not work well and actually only one side of the slices gets toasted. The toaster timer lasts one minute. The goal is to get three slices of bread toasted on their two sides, and spending less than four minutes. Formulate this problem in the state space framework, describing precisely all the elements Indicate which of the studied algorithms is more suitable to solve the problem, explaining your choice. 7. The Missionaries and Cannibals problem can be stated as follows: M missionaries and C cannibals need to cross a river, and the only boat available has a capacity for P people. The problem is to find the way to transport everyone across the river, taking into account that when the boat leaves a bank, the missionaries remaining there cannot be outnumbered by the cannibals. Besides, want to minimize the sum of the total number of river-crossings of each person. Formulate the problem in the states space framework and indicate which informed algorithm (and which heuristic) you should use to find a solution. More info at: problems 8. We want to distribute several computation tasks among several processors. The tasks to be carried out are known a priori, and for each one of them we know exactly the amount of time required by a processor to acomplish it, with no interruptions from the beginning up to the completion of the task (the time is independent of the processor). Any processor can be used for any task, provided that it is not busy doing at this moment some other task. The goal is to minimize the global time for all tasks to be done, considering that processors can work in parallel. a) Formulate this problem in the states space framework, and design an admissible heuristic function allowing us to minimize the global processing time. b) Which search algorithm should be used? Explain your reasoning. 9. Consider the following puzzle: we have a linear board having black pieces (B), white pieces (W) and an empty space (E), in the following initial configuration: B B B W W W E The goal of the puzzle consists on placing all the white pieces to the left of all the black pieces, the position of the empty space is irrelevant. The legal moves are the following: A piece can be moved to an adjacent empty cell, with cost. A piece can go to the empty space by jumping over at most two adjacent pieces, with a cost equal to the length (number of pieces) of the jump. You should: Formulate this problem in the states space framework, describing precisely all the elements Define an admissible heuristic function for this problem, explaining why it is admissible. In order to solve the puzzle, would you use Best-first search algorithm, or A instead? Why?
3 0. Explain, without getting into implementation details, how to formulate the following problem in the states space framework. Provide the representation for the states (specifying initial state and final states) and the actions (applicability conditions, how the actions are applied over a state, and cost of such application). Define also an admissible heuristic function, explaining why it is admissible. The problem can be stated as follows: given four natural numbers n, m, r and T, find the minimal sequence of basic arithmetic operations (addition, subtraction, multiplication and division) starting from 0 and getting T as final result, in such a way that using only numbers n and m are used in the operations, having the additional constraint that neither n or m can be used more than r times. For example, let n =, m =, r = and T = 8, a possible solution (not necessarily minimal) is ((((((0 + ) ) ) ) ) ), since the total result is 8 and neither nor have been used more than three times each.. Consider the problem of the -puzzle, a reduced version of the 8-puzzle, where there are three tiles (tagged with,, ) in a board (hence there is a blank space). Initial and final states are, respectively: Initial state Final state The actions to be considered are: moving the space up, moving the space down, moving the space left, and moving the space right (exactly in this order), and the cost of application for all of them is. Represent graphically the search trees corresponding to: a) Depth-first search. b) A search using heuristic h = Manhattan distance from the current position of the space to its position in the final state. c) Best-first search using heuristic h = number of tiles which are not in the same position as in the final state. For each of them, indicate by each node the order of analysis, and if it the case, its heuristic value (or cost+heuristic). In case of nodes with the same values, select the node which has been longer in the open queue. Is h admissible? Is h admissible? Which one is more informed?
4 . Let us consider a robot that can navigate through the following net, where each edge is meter long. The position of the robot is determined by the coordinates (i, j) of the node where it is currently, together with the orientation info: North, South, East, West. For example, the location of the robot in the previous picture is (,), orientation West. At each instant, the robot can: move forward according to its current orientation until the next node, or rotate 90 degrees clockwise or counterclockwise, staying at the same coordinates. Besides, we know that it: spends s. in completing a 90 degrees rotation. runs at 0.5 m/s speed along the thick edges. runs at m/s speed along the thin edges. (a) Formulate the problem of sending the robot from a location to a different one spending the minimum possible time in the framework of states space search. (b) For the particular case of sending the robot from location L ((, ), orientation West), to location L ((, ), orientation North): Define an admissible heuristic function, as informed as possible, and justify why it is admissible. Apply the A* algorithm, using the heuristic function defined in the previous item, and draw the search tree indicating the order of generation and order of analysis of the nodes. Describe the solution found and its cost. Is the solution found the one having minimum path length? Explain your answer. Note:In case of nodes with the same values, sort them according to the list (E, S, W, N).. Formulate the following problem in the states space framework, describing precisely all the elements required for the representation, and indicating also which algorithm should be applied to solve it (just name the algorithm, do not run it). In case of an heuristic been needed, define one and indicate whether it is admissible or not (if this makes sense in the context of the chosen representation). Two bike travellers start their trip simultaeously, one of them from La Coruña, and the other one from Almería. At each stage of their journey, a traveller can move from his/her current city to any other capital among the neighbouring provinces. We want to find a route for the travellers such that they finally meet at some city. Besides, the goal is to minimize the time until they meet, taking into account that they always synchronize their stages (i.e. they start a stage from a city to a neighbouring one simultaneously, and when they complete a stage they make sure by exchanging messages that the other traveller also completed his/her stage before starting the next). Assume that we know for every city the duration of the trip to each of its neighbours.
5 . Given a set of integer numbers I = {i, i, i,..., i N }, find a non-empty subset S I such that its elements add up exactly zero. a) Formulate this problem in the states space framework, describing precisely all the elements b) If we wish to find a solution minimizing the sum of the square values of the elements in S, which algorithm guarantees to find it? (Extend the representation by providing the additional information required by the algorithm, if needed) 5. Problem of the towers of Hanoi: The legend says that there is a secret Hindu temple where there are three spikes of platinum. On one of them, disks of gold (all of them of different sizes) are piled with the largest on the bottom and the smallest on top. The monks of this temple have the duty to transfer all disks to the third spike, using the second one as an auxiliary intermediate location, and under the following conditions: Only one disk can be moved at a time A larger disk may never be placed on top of a smaller one, in none of the spikes a) Formulate this problem in the states space framework, describing precisely all the elements b) Define an admissible heuristic that allows to find an optimal solution (considering that the cost of applying movements is always ). c) Which search algorithm should be used? The answer should be justified.. The following graph represents a states space for a problem. Nodes of the graph are the states of the problem, the edges connect the states to their successors, and the number on each edge stands for the cost of going from a state to its successor. The initial state is I, and the only final state is F. We consider the heuristic functions H and H given by the following table: I E A B 5 C 8 5 G 87 F D State H H I 0 A 8 8 B 0 C D E 9 9 F 0 0 G a) Build the search trees generated by the depth-first search and by the optimum search. Indicate in each case the order in which nodes are analyzed, the solutions found and their cost. b) Analogously for the A search algorithm, using the two heuristics H and H previously defined. Are they admissible? The answer should be justified. Note: When calculating successors of a node, consider them in alphabetical order. 5
6 7. The following graph represents a states space for a problem. Nodes of the graph are the states of the problem, the edges connect the states to their successors, and the number on each edge stands for the cost of going from a state to its successor. The initial state of the problem is A, and the final states are H and I. We consider the heuristic function h given by the following table: A B D H 9 C G I 0 5 E F Node Heuristic A 7 B 7 C D 7 E F 9 G H 0 I 0 (a) Build the search trees generated by the best-first search and by the optimum search. (b) Indicate in each case the number of nodes analyzed, the solutions found and their cost. Is any of the solutions found optimal? Which one? Why the other one is non-optimal? (c) Analogously for the A search algorithm. Taking into account the solution found, is h admissible? Make a small modification on the definition of the heuristic such that A finds an optimal solution. Note: When calculating successors of a node, consider them in alphabetical order. In case of nodes with the same value on the OPEN queue, also sort them alphabetically. 8. The following graph represents a states space for a problem. Nodes of the graph are the states of the problem, the edges connect the states to their successors, and the number on each edge stands for the cost of going from a state to its successor. The initial state is A, and the only final state is L. A 5 B C D 7 E F G I J K H 5 L
7 a) Find the shortest path (in number of actions) to go from A to L, by using either Depth-first search or Iterative deepening depth-first search algorithm. Explain your choice. b) Is it possible to find the same shortest solution by using any other searching algorithm? Which one(s)? c) Run the optimal search algorithm. c) Run the A search using the heuristic of the following table: A B C D E F G H I J K L h Does the obtained solution have the minimal cost? How many nodes less have been analyzed (wrt optimal search)? Once the result obtained by A is known, can we claim that the heuristic h is admissible? Note: The evolution of the search trees should be indicated explicitly: order of analysis of the nodes; their evaluation; justifying if some successors are discarded; etc. In case of having nodes with the same value, sort them alphabetically. Analogously with the successors of a node. 9. The following graph represents a states space for a problem. Nodes of the graph are the states of the problem, the edges connect the states to their successors (in both directions), and the number on each edge stands for the cost of going from a state to its successor. The initial state is A, and the only final state is I. E H A B C 5 5 F G I 5 D a) Find the shortest path (in number of actions) to go from A to I, by using some uninformed search algorithm that guarantees to find it. b) Run the A search using the heuristic of the following table: A B C D E F G H I h Note: The evolution of the search trees should be indicated explicitly: order of analysis of the nodes; their evaluation; justifying if some successors are discarded; etc. In case of having nodes with the same value, sort them alphabetically. Analogously with the successors of a node. 7
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,
More informationMeasuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
More informationCSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
More informationBPMN Business Process Modeling Notation
BPMN (BPMN) is a graphical notation that describes the logic of steps in a business process. This notation has been especially designed to coordinate the sequence of processes and messages that flow between
More informationAn Introduction to The A* Algorithm
An Introduction to The A* Algorithm Introduction The A* (A-Star) algorithm depicts one of the most popular AI methods used to identify the shortest path between 2 locations in a mapped area. The A* algorithm
More informationComputational Geometry. Lecture 1: Introduction and Convex Hulls
Lecture 1: Introduction and convex hulls 1 Geometry: points, lines,... Plane (two-dimensional), R 2 Space (three-dimensional), R 3 Space (higher-dimensional), R d A point in the plane, 3-dimensional space,
More informationIntroduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four
March 9, 2010 is a tic-tac-toe like game in which two players drop discs into a 7x6 board. The first player to get four in a row (either vertically, horizontally, or diagonally) wins. The game was first
More informationIE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
More informationAnswer Key for California State Standards: Algebra I
Algebra I: Symbolic reasoning and calculations with symbols are central in algebra. Through the study of algebra, a student develops an understanding of the symbolic language of mathematics and the sciences.
More informationRegular Expressions and Automata using Haskell
Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions
More information5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.
1. The advantage of.. is that they solve the problem if sequential storage representation. But disadvantage in that is they are sequential lists. [A] Lists [B] Linked Lists [A] Trees [A] Queues 2. The
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More informationPatterns in Pascal s Triangle
Pascal s Triangle Pascal s Triangle is an infinite triangular array of numbers beginning with a at the top. Pascal s Triangle can be constructed starting with just the on the top by following one easy
More informationChapter 15: Dynamic Programming
Chapter 15: Dynamic Programming Dynamic programming is a general approach to making a sequence of interrelated decisions in an optimum way. While we can describe the general characteristics, the details
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationGraph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
More informationSpecial Situations in the Simplex Algorithm
Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the
More information1(a). How many ways are there to rearrange the letters in the word COMPUTER?
CS 280 Solution Guide Homework 5 by Tze Kiat Tan 1(a). How many ways are there to rearrange the letters in the word COMPUTER? There are 8 distinct letters in the word COMPUTER. Therefore, the number of
More informationKrishna Institute of Engineering & Technology, Ghaziabad Department of Computer Application MCA-213 : DATA STRUCTURES USING C
Tutorial#1 Q 1:- Explain the terms data, elementary item, entity, primary key, domain, attribute and information? Also give examples in support of your answer? Q 2:- What is a Data Type? Differentiate
More informationcsci 210: Data Structures Recursion
csci 210: Data Structures Recursion Summary Topics recursion overview simple examples Sierpinski gasket Hanoi towers Blob check READING: GT textbook chapter 3.5 Recursion In general, a method of defining
More informationMagic Word. Possible Answers: LOOSER WINNER LOTTOS TICKET. What is the magic word?
Magic Word A magic word is needed to open a box. A secret code assigns each letter of the alphabet to a unique number. The code for the magic word is written on the outside of the box. What is the magic
More informationALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite
ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,
More informationProcess Scheduling. Process Scheduler. Chapter 7. Context Switch. Scheduler. Selection Strategies
Chapter 7 Process Scheduling Process Scheduler Why do we even need to a process scheduler? In simplest form, CPU must be shared by > OS > Application In reality, [multiprogramming] > OS : many separate
More informationThe 2010 British Informatics Olympiad
Time allowed: 3 hours The 2010 British Informatics Olympiad Instructions You should write a program for part (a) of each question, and produce written answers to the remaining parts. Programs may be used
More informationLinear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.
1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that
More informationLoad balancing Static Load Balancing
Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
More informationRegular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
More informationLoad Balancing and Termination Detection
Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
More informationUsing Microsoft Word. Working With Objects
Using Microsoft Word Many Word documents will require elements that were created in programs other than Word, such as the picture to the right. Nontext elements in a document are referred to as Objects
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationGraph Theory Origin and Seven Bridges of Königsberg -Rhishikesh
Graph Theory Origin and Seven Bridges of Königsberg -Rhishikesh Graph Theory: Graph theory can be defined as the study of graphs; Graphs are mathematical structures used to model pair-wise relations between
More informationWest Virginia University College of Engineering and Mineral Resources. Computer Engineering 313 Spring 2010
College of Engineering and Mineral Resources Computer Engineering 313 Spring 2010 Laboratory #4-A (Micromouse Algorithms) Goals This lab introduces the modified flood fill algorithm and teaches how to
More informationAPP INVENTOR. Test Review
APP INVENTOR Test Review Main Concepts App Inventor Lists Creating Random Numbers Variables Searching and Sorting Data Linear Search Binary Search Selection Sort Quick Sort Abstraction Modulus Division
More informationMATHEMATICS Unit Decision 1
General Certificate of Education January 2008 Advanced Subsidiary Examination MATHEMATICS Unit Decision 1 MD01 Tuesday 15 January 2008 9.00 am to 10.30 am For this paper you must have: an 8-page answer
More informationInteger Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions
Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.
More informationSession 6 Number Theory
Key Terms in This Session Session 6 Number Theory Previously Introduced counting numbers factor factor tree prime number New in This Session composite number greatest common factor least common multiple
More informationThe number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 72.
ADVANCED SUBSIDIARY GCE UNIT 4736/01 MATHEMATICS Decision Mathematics 1 THURSDAY 14 JUNE 2007 Afternoon Additional Materials: Answer Booklet (8 pages) List of Formulae (MF1) Time: 1 hour 30 minutes INSTRUCTIONS
More information1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D.
1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D. base address 2. The memory address of fifth element of an array can be calculated
More informationInternational Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
More information26 Integers: Multiplication, Division, and Order
26 Integers: Multiplication, Division, and Order Integer multiplication and division are extensions of whole number multiplication and division. In multiplying and dividing integers, the one new issue
More information6.02 Practice Problems: Routing
1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationLinear Programming. Solving LP Models Using MS Excel, 18
SUPPLEMENT TO CHAPTER SIX Linear Programming SUPPLEMENT OUTLINE Introduction, 2 Linear Programming Models, 2 Model Formulation, 4 Graphical Linear Programming, 5 Outline of Graphical Procedure, 5 Plotting
More informationEdExcel Decision Mathematics 1
EdExcel Decision Mathematics 1 Linear Programming Section 1: Formulating and solving graphically Notes and Examples These notes contain subsections on: Formulating LP problems Solving LP problems Minimisation
More informationProblem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
More informationCurrent California Math Standards Balanced Equations
Balanced Equations Current California Math Standards Balanced Equations Grade Three Number Sense 1.0 Students understand the place value of whole numbers: 1.1 Count, read, and write whole numbers to 10,000.
More informationLecture 2. Binary and Hexadecimal Numbers
Lecture 2 Binary and Hexadecimal Numbers Purpose: Review binary and hexadecimal number representations Convert directly from one base to another base Review addition and subtraction in binary representations
More informationSudoku puzzles and how to solve them
Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned
More informationCPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313]
CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313] File Structures A file is a collection of data stored on mass storage (e.g., disk or tape) Why on mass storage? too big to fit
More informationVISUAL ALGEBRA FOR COLLEGE STUDENTS. Laurie J. Burton Western Oregon University
VISUAL ALGEBRA FOR COLLEGE STUDENTS Laurie J. Burton Western Oregon University VISUAL ALGEBRA FOR COLLEGE STUDENTS TABLE OF CONTENTS Welcome and Introduction 1 Chapter 1: INTEGERS AND INTEGER OPERATIONS
More informationThe Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
More information1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++
Answer the following 1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ 2) Which data structure is needed to convert infix notations to postfix notations? Stack 3) The
More informationOutline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
More information2) What is the structure of an organization? Explain how IT support at different organizational levels.
(PGDIT 01) Paper - I : BASICS OF INFORMATION TECHNOLOGY 1) What is an information technology? Why you need to know about IT. 2) What is the structure of an organization? Explain how IT support at different
More informationDecision Mathematics 1 TUESDAY 22 JANUARY 2008
ADVANCED SUBSIDIARY GCE 4736/01 MATHEMATICS Decision Mathematics 1 TUESDAY 22 JANUARY 2008 Additional materials: Answer Booklet (8 pages) Graph paper Insert for Questions 3 and 4 List of Formulae (MF1)
More informationChapter 11 Number Theory
Chapter 11 Number Theory Number theory is one of the oldest branches of mathematics. For many years people who studied number theory delighted in its pure nature because there were few practical applications
More informationCurrent Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary
Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:
More informationLoad Balancing and Termination Detection
Chapter 7 slides7-1 Load Balancing and Termination Detection slides7-2 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination
More informationSolving Quadratic Equations
9.3 Solving Quadratic Equations by Using the Quadratic Formula 9.3 OBJECTIVES 1. Solve a quadratic equation by using the quadratic formula 2. Determine the nature of the solutions of a quadratic equation
More informationA number of tasks executing serially or in parallel. Distribute tasks on processors so that minimal execution time is achieved. Optimal distribution
Scheduling MIMD parallel program A number of tasks executing serially or in parallel Lecture : Load Balancing The scheduling problem NP-complete problem (in general) Distribute tasks on processors so that
More informationWeek_11: Network Models
Week_11: Network Models 1 1.Introduction The network models include the traditional applications of finding the most efficient way to link a number of locations directly or indirectly, finding the shortest
More informationA SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS
A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS B. Kanagasabapathi 1 and K. Ananthanarayanan 2 Building Technology and Construction Management Division, Department of Civil
More informationMidterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
More informationCoordination in vehicle routing
Coordination in vehicle routing Catherine Rivers Mathematics Massey University New Zealand 00.@compuserve.com Abstract A coordination point is a place that exists in space and time for the transfer of
More informationA Computer Application for Scheduling in MS Project
Comput. Sci. Appl. Volume 1, Number 5, 2014, pp. 309-318 Received: July 18, 2014; Published: November 25, 2014 Computer Science and Applications www.ethanpublishing.com Anabela Tereso, André Guedes and
More informationFull and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
More informationINTRODUCTION TO MATHEMATICAL MODELLING
306 MATHEMATICS APPENDIX 2 INTRODUCTION TO MATHEMATICAL MODELLING A2.1 Introduction Right from your earlier classes, you have been solving problems related to the real-world around you. For example, you
More informationBatch Production Scheduling in the Process Industries. By Prashanthi Ravi
Batch Production Scheduling in the Process Industries By Prashanthi Ravi INTRODUCTION Batch production - where a batch means a task together with the quantity produced. The processing of a batch is called
More informationAnalysis of Micromouse Maze Solving Algorithms
1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.
More information3D Interactive Information Visualization: Guidelines from experience and analysis of applications
3D Interactive Information Visualization: Guidelines from experience and analysis of applications Richard Brath Visible Decisions Inc., 200 Front St. W. #2203, Toronto, Canada, rbrath@vdi.com 1. EXPERT
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More informationLoad Balancing and Termination Detection
Chapter 7 Slide 1 Slide 2 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination
More informationCommon sense, and the model that we have used, suggest that an increase in p means a decrease in demand, but this is not the only possibility.
Lecture 6: Income and Substitution E ects c 2009 Je rey A. Miron Outline 1. Introduction 2. The Substitution E ect 3. The Income E ect 4. The Sign of the Substitution E ect 5. The Total Change in Demand
More informationTesting LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
More informationA linear combination is a sum of scalars times quantities. Such expressions arise quite frequently and have the form
Section 1.3 Matrix Products A linear combination is a sum of scalars times quantities. Such expressions arise quite frequently and have the form (scalar #1)(quantity #1) + (scalar #2)(quantity #2) +...
More informationThree Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
More informationLecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method
Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming
More informationNetworks and Paths. The study of networks in mathematics began in the middle 1700 s with a famous puzzle called the Seven Bridges of Konigsburg.
ame: Day: etworks and Paths Try This: For each figure,, and, draw a path that traces every line and curve exactly once, without lifting your pencil.... Figures,, and above are examples of ETWORKS. network
More informationQuiz for Chapter 6 Storage and Other I/O Topics 3.10
Date: 3.10 Not all questions are of equal difficulty. Please review the entire quiz first and then budget your time carefully. Name: Course: Solutions in Red 1. [6 points] Give a concise answer to each
More informationRandom Map Generator v1.0 User s Guide
Random Map Generator v1.0 User s Guide Jonathan Teutenberg 2003 1 Map Generation Overview...4 1.1 Command Line...4 1.2 Operation Flow...4 2 Map Initialisation...5 2.1 Initialisation Parameters...5 -w xxxxxxx...5
More informationSolving Simultaneous Equations and Matrices
Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering
More informationFactorizations: Searching for Factor Strings
" 1 Factorizations: Searching for Factor Strings Some numbers can be written as the product of several different pairs of factors. For example, can be written as 1, 0,, 0, and. It is also possible to write
More informationAn excerpt from The Every Computer Performance Book. The Four Numbers of Capacity Planning 1
The Four Numbers of Capacity Planning: Capacity planning for any given resource boils down to finding four numbers and doing a bit of multiplication. By: Bob Wescott Summary Capacity planning for any computing
More informationEfficient Data Structures for Decision Diagrams
Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationSystem Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1
System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect
More informationTHE APPLICATION OF ARTIFICIAL INTELLIGENCE TO SOLVE A PHYSICAL PUZZLE. Dana Cremer
THE APPLICATION OF ARTIFICIAL INTELLIGENCE TO SOLVE A PHYSICAL PUZZLE Dana Cremer Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Master
More informationCall Admission Control and Routing in Integrated Service Networks Using Reinforcement Learning
Call Admission Control and Routing in Integrated Service Networks Using Reinforcement Learning Peter Marbach LIDS MIT, Room 5-07 Cambridge, MA, 09 email: marbach@mit.edu Oliver Mihatsch Siemens AG Corporate
More informationBicolored Shortest Paths in Graphs with Applications to Network Overlay Design
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,
More informationBranch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
More informationCSE 4351/5351 Notes 7: Task Scheduling & Load Balancing
CSE / Notes : Task Scheduling & Load Balancing Task Scheduling A task is a (sequential) activity that uses a set of inputs to produce a set of outputs. A task (precedence) graph is an acyclic, directed
More informationMathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
More informationData Structures and Algorithms Written Examination
Data Structures and Algorithms Written Examination 22 February 2013 FIRST NAME STUDENT NUMBER LAST NAME SIGNATURE Instructions for students: Write First Name, Last Name, Student Number and Signature where
More informationA Tool for Generating Partition Schedules of Multiprocessor Systems
A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.
More informationSmart Graphics: Methoden 3 Suche, Constraints
Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated
More informationLEARNING OBJECTIVES FOR THIS CHAPTER
CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional
More informationM. Sugumaran / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 1001-1006
A Design of Centralized Meeting Scheduler with Distance Metrics M. Sugumaran Department of Computer Science and Engineering,Pondicherry Engineering College, Puducherry, India. Abstract Meeting scheduling
More informationClock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system
CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical
More informationOperation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
More information6.099, Spring Semester, 2006 Assignment for Week 13 1
6.099, Spring Semester, 2006 Assignment for Week 13 1 MASSACHVSETTS INSTITVTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.099 Introduction to EECS I Spring Semester, 2006
More information