4. Why is it that the best first search is more effective than hill climbing?

Size: px
Start display at page:

Download "4. Why is it that the best first search is more effective than hill climbing?"

Transcription

1 Abstract: The following questions and exercises are from chapter 3, Informed Search. This chapter covers the use of heuristics in search and how to evaluate the effectiveness of heuristics and search algorithms. Various algorithms are covered as well. It starts with hill climbing, best first search, and beam search. These algorithms are all similar in that they are forward looking, determining the best path based only on an estimation of the distance remaining to their goal. Branch and bound algorithms are covered next as well as the A* algorithms which are backward looking in that they keep track of and make use of the distance traveled to determine the best path to their goal. Finally constraint satisfaction search, using constraints to break a problem into multiple smaller problems, and bidirectional search, searching from both ends until you meet in the middle, are covered. uestions: 2. Explain why hill climbing would be classified as a greedy algorithm. Hill climbing is a greedy algorithm because the next move is governed by a single measurement. It also does not track past moves or have an ability to recover from bad moves. 4. Why is it that the best first search is more effective than hill climbing? It is more effective because it keeps a list of open nodes that are on the fringe of the search and that can be later explored if needed. So if the search heads down a path that ends up being bad then the algorithm can backtrack to previous nodes in order to find an alternate path. 5. Explain how beam search works. Beam search is a modification to breadth first search. It works the same way as breadth first search but adds some heuristics in order to limit the breadth of the search to a specific width for each level of the search. For example, if the beam width is 2 then the search will only follow the 2 best options at each level of the search. An infinite beam width would be the same as a breadth first search.

2 7. What does it mean for a heuristic to be more informed than another heuristic? When one heuristic is more informed than another it means that that heuristic saves us more effort in finding our goal than the other heuristic. For example it could allow us to solve a puzzle in fewer moves than another heuristic. 8. What is the idea behind branch and bound search? The idea behind branch and bound search is that the distance traveled is tracked and the shortest complete path so far is the one taken. As the search progresses if the current path becomes longer than a previous path, it can be abandoned while a previous and now shorter path is followed. It continues to expand only what is needed to know that it is currently still on the most optimal path. Exercises: 2. Explain why hill climbing is called a greedy algorithm. Hill climbing, at every step that it needs to make a choice will take the first path that is better than the current path. It also does not track past moves or have an ability to recover from bad moves. a. Describe some other algorithms that you know that are greedy. Dijkstra s shortest path algorithm is an example of a greedy algorithm. It always takes the shortest path found between two nodes until it reaches its destination. b. Explain how steepest ascent hill climbing is an improvement over simple hill climbing. Steepest ascent hill climbing is an improvement because it allows all successor nodes to be evaluated to see which is best rather than just taking the first one that is better. c. How does the best first search improve over hill climbing? Best first search maintains a list of open nodes that it can use to backtrack to a previous path that may be better than the current path. This allows it to recover from bad choices that end up not being fruitful.

3 3. Suggest an admissible heuristic, not mentioned in the text, for solving the 3 puzzle. An admissible heuristic would be to average the tiles out of place heuristic with the total manhattan distance heuristic. a. Employ your heuristic to conduct an A* search to solve the instance of the puzzle presented in this chapter. b. Is your heuristic more of less informed than the two heuristics that are presented?

4 Given that it is the average of the 2 heuristics and given that the manhattan distance is more informed than the number of tiles out of place, this heuristic is in general more informed than the number of tiles out of place and less informed than the total manhattan distance. 6. Consider the following variation of the n ueens Problem: If some of the squares that would be attacked by the placement are obstructed by the placement of pawns on an n x n chessboard, can more than n ueens be placed on the partial board that remains? For example, if file pawns are added to a 3 x 3 chessboard, then four nonattacking ueens may be placed on the board (Figure 3.30). P P P P P For ueens on a 3 x 3 Chessboard with five Pawns strategically placed. How many nonattacking ueens may be placed on a 5 x 5 chessboard if one has 3 Pawns at one s disposal? There are a couple of different ways in which to look at this problem. If we are allowed to flood the board with Pawns similar to the 3 x 3 example then we can always fit ceil(n/2) 2 ueens on the board using the same pattern. If we must take a valid solution and try and add more queens to it then we can do so if the solution has 4 squares open in a corner. This will not be possible for all solutions but it is possible for some. For example,

5 P P P 7. Use both the plain vanilla branch and bound, and branch and bound with dynamic programming, to get from the start node (S) to the goal node (G) in parts (a) and (b) of Figure When all else is equal, explore nodes in alphabetical order. Note: The graph for part a in the book lacks a value for the path between E and F, so a value of 1 was assumed. Note: The boxes illustrating the steps in the traversal diagram highlight the nodes revealed in that step, the common parent of those nodes is the node that was opened in that step. a) Plain Vanilla Branch and Bound

6

7 Step 1: We expand our start node S to find nodes B and C. Step 2: Node B is at the top of our list since it has the lowest cost, we expand it to find nodes A and D. Step 3: Node A has the lowest overall cost of 2 so we expand it to find node D. Step 4: Node D has an overall cost of 3 which is more than the previously seen node C, so we expand node C to find nodes E and F. Step 5: Nodes E and F both have an overall cost of 6 which is more than the 3 we hav previously seen with node D. We expand node D to find node C. Step 6: C, with a cost of 4, is still our lowest costing path. We expand C to find nodes E and F. Step 7: Node D with a cost of 5 is now our lowest costing path so we expand it to reveal node C. Step 8: The just revealed node C is tied for lowest costing path with E and F at 6. C is taken first and expanded to reveal nodes E and F. Step 9: E at a cost of 6 is now our best path, we expand it to reveal node F. Step 10: F at a cost of 6 is now our best path, we expand it to reveal node G. This is our goal node but there still exists paths that have a cost that is less than that if G at 11 so they must be expanded until we can see that they cost more or that they yield a better result. Step 11: F at 7 is expanded to reveal G with a cost of 12. This is more than our curren best goal of G with a cost of 12 so we can abandon this path. Step 12: E with a cost of 8 is now expanded to reveal F with a cost of 9. Step 13: F with a cost of 8 is now expanded to reveal G with a cost of 13. This is more than our current best cost of 11 so this branch can be abandoned. Step 14: F with a cost of 9 is now expanded to reveal G with a cost of 14. This is more than our current best cost of 11 so this branch can be abandoned. Step 15: E with a cost of 10 is now expanded to reveal F with a cost of 11. Step 16: F with a cost of 10 is now expanded to reveal G with a cost of 12. This is more than our current best cost of 11 so this branch can be abandoned. Step 17: F with a cost of 11 is the same as our best path of G at 11 but since F needs to be evaluated before G we expand it to reveal G with a cost of 16. This branch can

8 now be abandoned. All paths have now been evaluated to a point where they either terminate or cost more than our best path to G with a cost of 11. The goal node was found in step 10 with an optimal cost of 11. a) Branch and Bound with Dynamic Programming Step 1: We expand our start node S to find nodes B and C.

9 Step 2: Node B is at the top of our list since it has the lowest cost, we expand it to find nodes A and D. Step 3: Node A has the lowest overall cost of 2 so we expand it to find node D again. This path to D has an overall cost of 3 versus the previous path to D which had an overall cost of 5 so we abandon the previous path to D. Step 4: Node D has an overall cost of 3 which is more than the previously seen node C, so we expand node C to find nodes E and F. Step 5: Nodes E and F both have an overall cost of 6 which is more than the 3 we hav previously seen with node D. We expand node D to find node C again and reach the end of this subtree since we already have a shorter path to C. Step 6: Nodes E and F have the same overall cost and so we break the tie using alphabetical order. We expand node E to find node F again. Step 7: We continue back from our previous F since it was the shorter path and expand it to find node G. Node G is our goal with an overall cost of 11. The goal node was found in step 7 with an optimal cost of 11. b) Plain Vanilla Branch and Bound

10 Step 1: We expand node S to reveal nodes A and C.

11 Step 2: A and C have the same cost so we expand A to reveal B and C. Step 3: C has the lowest cost so we it to reveal B and D. Step 4: B is opened to reveal E. Step 5: B is opened again to reveal E. Step 6: C is opened again to reveal B and D. Step 7: B is opened again to reveal E. Step 8: D is opened to reveal E again and our goal node G. Step 9: E is opened to reveal C again. Step 10: E is opened again to reveal C again. Step 11: C is opened again to reveal B and D again. The cost to D is higher than the cost to our goal node so D will not be followed any further. Step 12: C is opened again to reveal B and D again. Step 13: D is opened to reveal E again and our goal node G. The cost of this path to G is higher than the previous path to G. Step 14: E is opened again to reveal C again. Step 15: E is opened again to reveal C again. Step 16: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further. Step 17: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further. Step 18: C is opened again to reveal B and D again. The cost to D is higher than the cost to our goal node so D will not be followed any further. Step 19: C is opened again to reveal B and D again. The cost to D is higher than the cost to our goal node so D will not be followed any further. Step 20: E is opened to reveal C again. Step 21: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further.

12 Step 22: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further. Step 23: C is opened again to reveal B and D again. The cost to both B and D is highe than the cost to our goal node so neither node will not be followed any further. The goal node was found in step 8 with a optimal cost of 9. b) Branch and Bound with Dynamic Programming Step 1: We expand node S to reveal nodes A and C.

13 Step 2: A and C have the same cost so we expand A to reveal B and C. C has already been seen at a lower cost so we will not be following it again. Step 3: C has the lowest cost so we it to reveal B and D. B has already been seen at an equal value so we will not be following it again. Step 4: B has the lowest cost so we expand it to reveal 3. Step 5: D is tied with E but is opened first because ties are broken alphabetically. E and G are revealed. E has already been encountered at a lower cost. G is our goal node and was found with a cost of 9. Step 6: E is next to be evaluated since it still has a lower cost than our goal. C is revealed, since we have seen it before at a lower cost it ends our traversal. The goal node was found in step 5 with a optimal cost of Suggest an admissible heuristic for the Water Jug Problem. If the cost is equal to the amount of water moved then an admissible heuristic could be the absolute value of the goal subtracted from the value of the jug that can hold the goal. This is admissible because it is always less than or equal to the cost to the solution. a. Employ your heuristic to conduct an A* search to solve the instance of this problem presented in Chapter 1. h(n) = x 12 where x is the number of quarts of water in the 18 qt jug. f(n) = the number of quarts of water that have been moved. The possible moves at each step are filling the large container from the well (WA), filling the small container from the well (WB), pouring the large container into the small container (AB), pouring the small container into the large container (BA), dumping the large container into the well (AW), dumping the small container into the well (BW). The solution is found on step 17 and there are no competing paths that need to be evaluated.

14

AI: A Modern Approach, Chpts. 3-4 Russell and Norvig

AI: A Modern Approach, Chpts. 3-4 Russell and Norvig AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,

More information

Informed search algorithms. Chapter 4, Sections 1 2 1

Informed search algorithms. Chapter 4, Sections 1 2 1 Informed search algorithms Chapter 4, Sections 1 2 Chapter 4, Sections 1 2 1 Outline Best-first search A search Heuristics Chapter 4, Sections 1 2 2 Review: Tree search function Tree-Search( problem, fringe)

More information

An Introduction to The A* Algorithm

An Introduction to The A* Algorithm An Introduction to The A* Algorithm Introduction The A* (A-Star) algorithm depicts one of the most popular AI methods used to identify the shortest path between 2 locations in a mapped area. The A* algorithm

More information

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

Measuring the Performance of an Agent

Measuring the Performance of an Agent 25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational

More information

Smart Graphics: Methoden 3 Suche, Constraints

Smart Graphics: Methoden 3 Suche, Constraints Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated

More information

Search methods motivation 1

Search methods motivation 1 Suppose you are an independent software developer, and your software package Windows Defeater R, widely available on sourceforge under a GNU GPL license, is getting an international attention and acclaim.

More information

6.02 Practice Problems: Routing

6.02 Practice Problems: Routing 1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing

More information

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches. Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used

More information

BASIC RULES OF CHESS

BASIC RULES OF CHESS BASIC RULES OF CHESS Introduction Chess is a game of strategy believed to have been invented more then 00 years ago in India. It is a game for two players, one with the light pieces and one with the dark

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 7, July 23 ISSN: 2277 28X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Greedy Algorithm:

More information

Properties of Real Numbers

Properties of Real Numbers 16 Chapter P Prerequisites P.2 Properties of Real Numbers What you should learn: Identify and use the basic properties of real numbers Develop and use additional properties of real numbers Why you should

More information

West Virginia University College of Engineering and Mineral Resources. Computer Engineering 313 Spring 2010

West Virginia University College of Engineering and Mineral Resources. Computer Engineering 313 Spring 2010 College of Engineering and Mineral Resources Computer Engineering 313 Spring 2010 Laboratory #4-A (Micromouse Algorithms) Goals This lab introduces the modified flood fill algorithm and teaches how to

More information

Random Map Generator v1.0 User s Guide

Random Map Generator v1.0 User s Guide Random Map Generator v1.0 User s Guide Jonathan Teutenberg 2003 1 Map Generation Overview...4 1.1 Command Line...4 1.2 Operation Flow...4 2 Map Initialisation...5 2.1 Initialisation Parameters...5 -w xxxxxxx...5

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

POLYNOMIAL FUNCTIONS

POLYNOMIAL FUNCTIONS POLYNOMIAL FUNCTIONS Polynomial Division.. 314 The Rational Zero Test.....317 Descarte s Rule of Signs... 319 The Remainder Theorem.....31 Finding all Zeros of a Polynomial Function.......33 Writing a

More information

Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R

Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent

More information

Scheduling. Getting Started. Scheduling 79

Scheduling. Getting Started. Scheduling 79 Scheduling 9 Scheduling An event planner has to juggle many workers completing different tasks, some of which must be completed before others can begin. For example, the banquet tables would need to be

More information

Y. Xiang, Constraint Satisfaction Problems

Y. Xiang, Constraint Satisfaction Problems Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are

More information

Genetic Algorithms and Sudoku

Genetic Algorithms and Sudoku Genetic Algorithms and Sudoku Dr. John M. Weiss Department of Mathematics and Computer Science South Dakota School of Mines and Technology (SDSM&T) Rapid City, SD 57701-3995 john.weiss@sdsmt.edu MICS 2009

More information

Introduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four

Introduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four March 9, 2010 is a tic-tac-toe like game in which two players drop discs into a 7x6 board. The first player to get four in a row (either vertically, horizontally, or diagonally) wins. The game was first

More information

Cpt S 223. School of EECS, WSU

Cpt S 223. School of EECS, WSU The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring

More information

The Taxman Game. Robert K. Moniot September 5, 2003

The Taxman Game. Robert K. Moniot September 5, 2003 The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game

More information

CAB TRAVEL TIME PREDICTI - BASED ON HISTORICAL TRIP OBSERVATION

CAB TRAVEL TIME PREDICTI - BASED ON HISTORICAL TRIP OBSERVATION CAB TRAVEL TIME PREDICTI - BASED ON HISTORICAL TRIP OBSERVATION N PROBLEM DEFINITION Opportunity New Booking - Time of Arrival Shortest Route (Distance/Time) Taxi-Passenger Demand Distribution Value Accurate

More information

Dynamic Programming. Lecture 11. 11.1 Overview. 11.2 Introduction

Dynamic Programming. Lecture 11. 11.1 Overview. 11.2 Introduction Lecture 11 Dynamic Programming 11.1 Overview Dynamic Programming is a powerful technique that allows one to solve many different types of problems in time O(n 2 ) or O(n 3 ) for which a naive approach

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

6.099, Spring Semester, 2006 Assignment for Week 13 1

6.099, Spring Semester, 2006 Assignment for Week 13 1 6.099, Spring Semester, 2006 Assignment for Week 13 1 MASSACHVSETTS INSTITVTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.099 Introduction to EECS I Spring Semester, 2006

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

SUPPLY CHAIN OPTIMIZATION MODELS IN THE AREA OF OPERATION

SUPPLY CHAIN OPTIMIZATION MODELS IN THE AREA OF OPERATION SUPPLY CHAIN OPTIMIZATION MODELS IN THE AREA OF OPERATION Tomáš DVOŘÁK, Martin VLKOVSKÝ Abstract: Main idea of this paper is to choose both suitable and applicable operations research methods for military

More information

Operations: search;; min;; max;; predecessor;; successor. Time O(h) with h height of the tree (more on later).

Operations: search;; min;; max;; predecessor;; successor. Time O(h) with h height of the tree (more on later). Binary search tree Operations: search;; min;; max;; predecessor;; successor. Time O(h) with h height of the tree (more on later). Data strutcure fields usually include for a given node x, the following

More information

Chinese postman problem

Chinese postman problem PTR hinese postman problem Learning objectives fter studying this chapter, you should be able to: understand the hinese postman problem apply an algorithm to solve the problem understand the importance

More information

Answer Key for California State Standards: Algebra I

Answer Key for California State Standards: Algebra I Algebra I: Symbolic reasoning and calculations with symbols are central in algebra. Through the study of algebra, a student develops an understanding of the symbolic language of mathematics and the sciences.

More information

Session 7 Bivariate Data and Analysis

Session 7 Bivariate Data and Analysis Session 7 Bivariate Data and Analysis Key Terms for This Session Previously Introduced mean standard deviation New in This Session association bivariate analysis contingency table co-variation least squares

More information

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.

More information

Geometry Solve real life and mathematical problems involving angle measure, area, surface area and volume.

Geometry Solve real life and mathematical problems involving angle measure, area, surface area and volume. Performance Assessment Task Pizza Crusts Grade 7 This task challenges a student to calculate area and perimeters of squares and rectangles and find circumference and area of a circle. Students must find

More information

PCB ROUTERS AND ROUTING METHODS

PCB ROUTERS AND ROUTING METHODS PCB ROUTERS AND ROUTING METHODS BY: LEE W. RITCHEY, SPEEDING EDGE, COPYRIGHT SPEEDING EDGE DECEMBER 1999 FOR PUBLICATION IN FEBRUARY ISSUE OF PC DESIGN MAGAZINE INTRODUCTION Routing of printed circuit

More information

Networks and Paths. The study of networks in mathematics began in the middle 1700 s with a famous puzzle called the Seven Bridges of Konigsburg.

Networks and Paths. The study of networks in mathematics began in the middle 1700 s with a famous puzzle called the Seven Bridges of Konigsburg. ame: Day: etworks and Paths Try This: For each figure,, and, draw a path that traces every line and curve exactly once, without lifting your pencil.... Figures,, and above are examples of ETWORKS. network

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

Complete Solution of the Eight-Puzzle and the Benefit of Node Ordering in IDA*

Complete Solution of the Eight-Puzzle and the Benefit of Node Ordering in IDA* Complete Solution of the Eight-Puzzle and the Benefit of Node Ordering in IDA* Alexander Reinefeld Paderborn Center for Parallel Computing Waxburger Str. 100, D-33095 Paderborn, Germany Abstract The 8-puzzle

More information

Dynamic programming. Doctoral course Optimization on graphs - Lecture 4.1. Giovanni Righini. January 17 th, 2013

Dynamic programming. Doctoral course Optimization on graphs - Lecture 4.1. Giovanni Righini. January 17 th, 2013 Dynamic programming Doctoral course Optimization on graphs - Lecture.1 Giovanni Righini January 1 th, 201 Implicit enumeration Combinatorial optimization problems are in general NP-hard and we usually

More information

Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.

Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that

More information

SEARCHING AND KNOWLEDGE REPRESENTATION. Angel Garrido

SEARCHING AND KNOWLEDGE REPRESENTATION. Angel Garrido Acta Universitatis Apulensis ISSN: 1582-5329 No. 30/2012 pp. 147-152 SEARCHING AND KNOWLEDGE REPRESENTATION Angel Garrido ABSTRACT. The procedures of searching of solutions of problems, in Artificial Intelligence

More information

Project Scheduling: PERT/CPM

Project Scheduling: PERT/CPM Project Scheduling: PERT/CPM Project Scheduling with Known Activity Times (as in exercises 1, 2, 3 and 5 in the handout) and considering Time-Cost Trade-Offs (as in exercises 4 and 6 in the handout). This

More information

A. O. Odior Department of Production Engineering University of Benin, Edo State. E-mail: waddnis@yahoo.com

A. O. Odior Department of Production Engineering University of Benin, Edo State. E-mail: waddnis@yahoo.com 2012 Cenresin Publications www.cenresinpub.org APPLICATION OF PROJECT MANAGEMENT TECHNIQUES IN A CONSTRUCTION FIRM Department of Production Engineering University of Benin, Edo State. E-mail: waddnis@yahoo.com

More information

Binary Search Trees CMPSC 122

Binary Search Trees CMPSC 122 Binary Search Trees CMPSC 122 Note: This notes packet has significant overlap with the first set of trees notes I do in CMPSC 360, but goes into much greater depth on turning BSTs into pseudocode than

More information

Area and Perimeter: The Mysterious Connection TEACHER EDITION

Area and Perimeter: The Mysterious Connection TEACHER EDITION Area and Perimeter: The Mysterious Connection TEACHER EDITION (TC-0) In these problems you will be working on understanding the relationship between area and perimeter. Pay special attention to any patterns

More information

A Strategy for Teaching Finite Element Analysis to Undergraduate Students

A Strategy for Teaching Finite Element Analysis to Undergraduate Students A Strategy for Teaching Finite Element Analysis to Undergraduate Students Gordon Smyrell, School of Computing and Mathematics, University of Teesside The analytical power and design flexibility offered

More information

TEACHER S GUIDE TO RUSH HOUR

TEACHER S GUIDE TO RUSH HOUR Using Puzzles to Teach Problem Solving TEACHER S GUIDE TO RUSH HOUR Includes Rush Hour 2, 3, 4, Rush Hour Jr., Railroad Rush Hour and Safari Rush Hour BENEFITS Rush Hour is a sliding piece puzzle that

More information

Graph Theory Problems and Solutions

Graph Theory Problems and Solutions raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is

More information

MEASURES OF VARIATION

MEASURES OF VARIATION NORMAL DISTRIBTIONS MEASURES OF VARIATION In statistics, it is important to measure the spread of data. A simple way to measure spread is to find the range. But statisticians want to know if the data are

More information

Analysis of Micromouse Maze Solving Algorithms

Analysis of Micromouse Maze Solving Algorithms 1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.

More information

USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE

USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE Keith Brandt, Kevin R. Burger, Jason Downing, Stuart Kilzer Mathematics, Computer Science, and Physics Rockhurst University, 1100 Rockhurst Road,

More information

Question 2: How will changes in the objective function s coefficients change the optimal solution?

Question 2: How will changes in the objective function s coefficients change the optimal solution? Question 2: How will changes in the objective function s coefficients change the optimal solution? In the previous question, we examined how changing the constants in the constraints changed the optimal

More information

A new Branch-and-Price Algorithm for the Traveling Tournament Problem (TTP) Column Generation 2008, Aussois, France

A new Branch-and-Price Algorithm for the Traveling Tournament Problem (TTP) Column Generation 2008, Aussois, France A new Branch-and-Price Algorithm for the Traveling Tournament Problem (TTP) Column Generation 2008, Aussois, France Stefan Irnich 1 sirnich@or.rwth-aachen.de RWTH Aachen University Deutsche Post Endowed

More information

Fast Sequential Summation Algorithms Using Augmented Data Structures

Fast Sequential Summation Algorithms Using Augmented Data Structures Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik vadim.stadnik@gmail.com Abstract This paper provides an introduction to the design of augmented data structures that offer

More information

for the Bill Hanlon bill@hanlonmath.com

for the Bill Hanlon bill@hanlonmath.com Strategies for Learning the Math Facts Bill Hanlon bill@hanlonmath.com The more sophisticated mental operations in mathematics of analysis, synthesis, and evaluation are impossible without rapid and accurate

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Decision Mathematics 1 TUESDAY 22 JANUARY 2008

Decision Mathematics 1 TUESDAY 22 JANUARY 2008 ADVANCED SUBSIDIARY GCE 4736/01 MATHEMATICS Decision Mathematics 1 TUESDAY 22 JANUARY 2008 Additional materials: Answer Booklet (8 pages) Graph paper Insert for Questions 3 and 4 List of Formulae (MF1)

More information

25 Integers: Addition and Subtraction

25 Integers: Addition and Subtraction 25 Integers: Addition and Subtraction Whole numbers and their operations were developed as a direct result of people s need to count. But nowadays many quantitative needs aside from counting require numbers

More information

Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit

Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,

More information

1. I have 4 sides. My opposite sides are equal. I have 4 right angles. Which shape am I?

1. I have 4 sides. My opposite sides are equal. I have 4 right angles. Which shape am I? Which Shape? This problem gives you the chance to: identify and describe shapes use clues to solve riddles Use shapes A, B, or C to solve the riddles. A B C 1. I have 4 sides. My opposite sides are equal.

More information

Factorizations: Searching for Factor Strings

Factorizations: Searching for Factor Strings " 1 Factorizations: Searching for Factor Strings Some numbers can be written as the product of several different pairs of factors. For example, can be written as 1, 0,, 0, and. It is also possible to write

More information

4 UNIT FOUR: Transportation and Assignment problems

4 UNIT FOUR: Transportation and Assignment problems 4 UNIT FOUR: Transportation and Assignment problems 4.1 Objectives By the end of this unit you will be able to: formulate special linear programming problems using the transportation model. define a balanced

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Layout Design Post Woods Apartment Complex

Layout Design Post Woods Apartment Complex Layout Design Some of these slides are courtesy of Professor Paul Griffin Post Woods partment Complex tlanta Zoo Lenox Mall, tlanta Hospital floor plan Guildcrest Homes Factory floor plan 6 Furniture parts

More information

Multiplying and Dividing Signed Numbers. Finding the Product of Two Signed Numbers. (a) (3)( 4) ( 4) ( 4) ( 4) 12 (b) (4)( 5) ( 5) ( 5) ( 5) ( 5) 20

Multiplying and Dividing Signed Numbers. Finding the Product of Two Signed Numbers. (a) (3)( 4) ( 4) ( 4) ( 4) 12 (b) (4)( 5) ( 5) ( 5) ( 5) ( 5) 20 SECTION.4 Multiplying and Dividing Signed Numbers.4 OBJECTIVES 1. Multiply signed numbers 2. Use the commutative property of multiplication 3. Use the associative property of multiplication 4. Divide signed

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Decision Mathematics D1. Advanced/Advanced Subsidiary. Friday 12 January 2007 Morning Time: 1 hour 30 minutes. D1 answer book

Decision Mathematics D1. Advanced/Advanced Subsidiary. Friday 12 January 2007 Morning Time: 1 hour 30 minutes. D1 answer book Paper Reference(s) 6689/01 Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Friday 12 January 2007 Morning Time: 1 hour 30 minutes Materials required for examination Nil Items included

More information

Chapter 4 Online Appendix: The Mathematics of Utility Functions

Chapter 4 Online Appendix: The Mathematics of Utility Functions Chapter 4 Online Appendix: The Mathematics of Utility Functions We saw in the text that utility functions and indifference curves are different ways to represent a consumer s preferences. Calculus can

More information

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A

More information

Learning to Search More Efficiently from Experience: A Multi-Heuristic Approach

Learning to Search More Efficiently from Experience: A Multi-Heuristic Approach Proceedings of the Eighth International Symposium on Combinatorial Search (SoCS-2015) Learning to Search More Efficiently from Experience: A Multi-Heuristic Approach Sandip Aine Indraprastha Institute

More information

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92. Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure

More information

Enumerating possible Sudoku grids

Enumerating possible Sudoku grids Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany bf@mail.inf.tu-dresden.de Frazer Jarvis Department of Pure Mathematics University of Sheffield,

More information

Traffic Engineering Management Concepts

Traffic Engineering Management Concepts 3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page

More information

Network Planning and Analysis

Network Planning and Analysis 46 Network Planning and Analysis 1. Objective: What can you tell me about the project? When will the project finish? How long will the project take (project total duration)? 2. Why is this topic Important

More information

Session 6 Number Theory

Session 6 Number Theory Key Terms in This Session Session 6 Number Theory Previously Introduced counting numbers factor factor tree prime number New in This Session composite number greatest common factor least common multiple

More information

What is a parabola? It is geometrically defined by a set of points or locus of points that are

What is a parabola? It is geometrically defined by a set of points or locus of points that are Section 6-1 A Parable about Parabolas Name: What is a parabola? It is geometrically defined by a set of points or locus of points that are equidistant from a point (the focus) and a line (the directrix).

More information

2 SYSTEM DESCRIPTION TECHNIQUES

2 SYSTEM DESCRIPTION TECHNIQUES 2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange

More information

Sudoku puzzles and how to solve them

Sudoku puzzles and how to solve them Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned

More information

Introduction to Project Management

Introduction to Project Management L E S S O N 1 Introduction to Project Management Suggested lesson time 50-60 minutes Lesson objectives To be able to identify the steps involved in project planning, you will: a b c Plan a project. You

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

A Review on Load Balancing In Cloud Computing 1

A Review on Load Balancing In Cloud Computing 1 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 6 June 2015, Page No. 12333-12339 A Review on Load Balancing In Cloud Computing 1 Peenaz Pathak, 2 Er.Kamna

More information

7 Literal Equations and

7 Literal Equations and CHAPTER 7 Literal Equations and Inequalities Chapter Outline 7.1 LITERAL EQUATIONS 7.2 INEQUALITIES 7.3 INEQUALITIES USING MULTIPLICATION AND DIVISION 7.4 MULTI-STEP INEQUALITIES 113 7.1. Literal Equations

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

SUPPLEMENT TO CHAPTER 6 MINIMUM SPANNING-TREE PROBLEMS

SUPPLEMENT TO CHAPTER 6 MINIMUM SPANNING-TREE PROBLEMS S h 6- SUPPLMNT TO HPTR 6 MINIMUM SPNNIN-TR PROLMS hapter 6 focuses on network optimization problems. These are problems that can be described in terms of a complete network that has both nodes and links

More information

Network Load Balancing Using Ant Colony Optimization

Network Load Balancing Using Ant Colony Optimization Network Load Balancing Using Ant Colony Optimization Mr. Ujwal Namdeo Abhonkar 1, Mr. Swapnil Mohan Phalak 2, Mrs. Pooja Ujwal Abhonkar 3 1,3 Lecturer in Computer Engineering Department 2 Lecturer in Information

More information

Series and Parallel Circuits

Series and Parallel Circuits Direct Current (DC) Direct current (DC) is the unidirectional flow of electric charge. The term DC is used to refer to power systems that use refer to the constant (not changing with time), mean (average)

More information

Contents. Sample worksheet from www.mathmammoth.com

Contents. Sample worksheet from www.mathmammoth.com Contents Introduction... 4 Warmup: Mental Math 1... 8 Warmup: Mental Math 2... 10 Review: Addition and Subtraction... 12 Review: Multiplication and Division... 15 Balance Problems and Equations... 19 More

More information

Chapter 10: Network Flow Programming

Chapter 10: Network Flow Programming Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,

More information

CMPSCI611: Approximating MAX-CUT Lecture 20

CMPSCI611: Approximating MAX-CUT Lecture 20 CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to

More information

CRITICAL PATH ANALYSIS AND GANTT CHARTS

CRITICAL PATH ANALYSIS AND GANTT CHARTS CRITICAL PATH ANALYSIS AND GANTT CHARTS 1. An engineering project is modelled by the activity network shown in the figure above. The activities are represented by the arcs. The number in brackets on each

More information

Operation Count; Numerical Linear Algebra

Operation Count; Numerical Linear Algebra 10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point

More information

FP1. HiSET TM Mathematics Practice Test

FP1. HiSET TM Mathematics Practice Test FP1 HiSET TM Mathematics Practice Test Copyright 013 Educational Testing Service. All rights reserved. E T S and the E T S logo are registered trademarks of Educational Testing Service (E T S) in the United

More information

4003-440/4003-713 Operating Systems I. Process Scheduling. Warren R. Carithers (wrc@cs.rit.edu) Rob Duncan (rwd@cs.rit.edu)

4003-440/4003-713 Operating Systems I. Process Scheduling. Warren R. Carithers (wrc@cs.rit.edu) Rob Duncan (rwd@cs.rit.edu) 4003-440/4003-713 Operating Systems I Process Scheduling Warren R. Carithers (wrc@cs.rit.edu) Rob Duncan (rwd@cs.rit.edu) Review: Scheduling Policy Ideally, a scheduling policy should: Be: fair, predictable

More information

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy BMI Paper The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy Faculty of Sciences VU University Amsterdam De Boelelaan 1081 1081 HV Amsterdam Netherlands Author: R.D.R.

More information

Rational Exponents. Squaring both sides of the equation yields. and to be consistent, we must have

Rational Exponents. Squaring both sides of the equation yields. and to be consistent, we must have 8.6 Rational Exponents 8.6 OBJECTIVES 1. Define rational exponents 2. Simplify expressions containing rational exponents 3. Use a calculator to estimate the value of an expression containing rational exponents

More information

Krishna Institute of Engineering & Technology, Ghaziabad Department of Computer Application MCA-213 : DATA STRUCTURES USING C

Krishna Institute of Engineering & Technology, Ghaziabad Department of Computer Application MCA-213 : DATA STRUCTURES USING C Tutorial#1 Q 1:- Explain the terms data, elementary item, entity, primary key, domain, attribute and information? Also give examples in support of your answer? Q 2:- What is a Data Type? Differentiate

More information

Definition 8.1 Two inequalities are equivalent if they have the same solution set. Add or Subtract the same value on both sides of the inequality.

Definition 8.1 Two inequalities are equivalent if they have the same solution set. Add or Subtract the same value on both sides of the inequality. 8 Inequalities Concepts: Equivalent Inequalities Linear and Nonlinear Inequalities Absolute Value Inequalities (Sections 4.6 and 1.1) 8.1 Equivalent Inequalities Definition 8.1 Two inequalities are equivalent

More information

Chapter 6. Decoding. Statistical Machine Translation

Chapter 6. Decoding. Statistical Machine Translation Chapter 6 Decoding Statistical Machine Translation Decoding We have a mathematical model for translation p(e f) Task of decoding: find the translation e best with highest probability Two types of error

More information