4. Why is it that the best first search is more effective than hill climbing?
|
|
- Aron Watts
- 7 years ago
- Views:
Transcription
1 Abstract: The following questions and exercises are from chapter 3, Informed Search. This chapter covers the use of heuristics in search and how to evaluate the effectiveness of heuristics and search algorithms. Various algorithms are covered as well. It starts with hill climbing, best first search, and beam search. These algorithms are all similar in that they are forward looking, determining the best path based only on an estimation of the distance remaining to their goal. Branch and bound algorithms are covered next as well as the A* algorithms which are backward looking in that they keep track of and make use of the distance traveled to determine the best path to their goal. Finally constraint satisfaction search, using constraints to break a problem into multiple smaller problems, and bidirectional search, searching from both ends until you meet in the middle, are covered. uestions: 2. Explain why hill climbing would be classified as a greedy algorithm. Hill climbing is a greedy algorithm because the next move is governed by a single measurement. It also does not track past moves or have an ability to recover from bad moves. 4. Why is it that the best first search is more effective than hill climbing? It is more effective because it keeps a list of open nodes that are on the fringe of the search and that can be later explored if needed. So if the search heads down a path that ends up being bad then the algorithm can backtrack to previous nodes in order to find an alternate path. 5. Explain how beam search works. Beam search is a modification to breadth first search. It works the same way as breadth first search but adds some heuristics in order to limit the breadth of the search to a specific width for each level of the search. For example, if the beam width is 2 then the search will only follow the 2 best options at each level of the search. An infinite beam width would be the same as a breadth first search.
2 7. What does it mean for a heuristic to be more informed than another heuristic? When one heuristic is more informed than another it means that that heuristic saves us more effort in finding our goal than the other heuristic. For example it could allow us to solve a puzzle in fewer moves than another heuristic. 8. What is the idea behind branch and bound search? The idea behind branch and bound search is that the distance traveled is tracked and the shortest complete path so far is the one taken. As the search progresses if the current path becomes longer than a previous path, it can be abandoned while a previous and now shorter path is followed. It continues to expand only what is needed to know that it is currently still on the most optimal path. Exercises: 2. Explain why hill climbing is called a greedy algorithm. Hill climbing, at every step that it needs to make a choice will take the first path that is better than the current path. It also does not track past moves or have an ability to recover from bad moves. a. Describe some other algorithms that you know that are greedy. Dijkstra s shortest path algorithm is an example of a greedy algorithm. It always takes the shortest path found between two nodes until it reaches its destination. b. Explain how steepest ascent hill climbing is an improvement over simple hill climbing. Steepest ascent hill climbing is an improvement because it allows all successor nodes to be evaluated to see which is best rather than just taking the first one that is better. c. How does the best first search improve over hill climbing? Best first search maintains a list of open nodes that it can use to backtrack to a previous path that may be better than the current path. This allows it to recover from bad choices that end up not being fruitful.
3 3. Suggest an admissible heuristic, not mentioned in the text, for solving the 3 puzzle. An admissible heuristic would be to average the tiles out of place heuristic with the total manhattan distance heuristic. a. Employ your heuristic to conduct an A* search to solve the instance of the puzzle presented in this chapter. b. Is your heuristic more of less informed than the two heuristics that are presented?
4 Given that it is the average of the 2 heuristics and given that the manhattan distance is more informed than the number of tiles out of place, this heuristic is in general more informed than the number of tiles out of place and less informed than the total manhattan distance. 6. Consider the following variation of the n ueens Problem: If some of the squares that would be attacked by the placement are obstructed by the placement of pawns on an n x n chessboard, can more than n ueens be placed on the partial board that remains? For example, if file pawns are added to a 3 x 3 chessboard, then four nonattacking ueens may be placed on the board (Figure 3.30). P P P P P For ueens on a 3 x 3 Chessboard with five Pawns strategically placed. How many nonattacking ueens may be placed on a 5 x 5 chessboard if one has 3 Pawns at one s disposal? There are a couple of different ways in which to look at this problem. If we are allowed to flood the board with Pawns similar to the 3 x 3 example then we can always fit ceil(n/2) 2 ueens on the board using the same pattern. If we must take a valid solution and try and add more queens to it then we can do so if the solution has 4 squares open in a corner. This will not be possible for all solutions but it is possible for some. For example,
5 P P P 7. Use both the plain vanilla branch and bound, and branch and bound with dynamic programming, to get from the start node (S) to the goal node (G) in parts (a) and (b) of Figure When all else is equal, explore nodes in alphabetical order. Note: The graph for part a in the book lacks a value for the path between E and F, so a value of 1 was assumed. Note: The boxes illustrating the steps in the traversal diagram highlight the nodes revealed in that step, the common parent of those nodes is the node that was opened in that step. a) Plain Vanilla Branch and Bound
6
7 Step 1: We expand our start node S to find nodes B and C. Step 2: Node B is at the top of our list since it has the lowest cost, we expand it to find nodes A and D. Step 3: Node A has the lowest overall cost of 2 so we expand it to find node D. Step 4: Node D has an overall cost of 3 which is more than the previously seen node C, so we expand node C to find nodes E and F. Step 5: Nodes E and F both have an overall cost of 6 which is more than the 3 we hav previously seen with node D. We expand node D to find node C. Step 6: C, with a cost of 4, is still our lowest costing path. We expand C to find nodes E and F. Step 7: Node D with a cost of 5 is now our lowest costing path so we expand it to reveal node C. Step 8: The just revealed node C is tied for lowest costing path with E and F at 6. C is taken first and expanded to reveal nodes E and F. Step 9: E at a cost of 6 is now our best path, we expand it to reveal node F. Step 10: F at a cost of 6 is now our best path, we expand it to reveal node G. This is our goal node but there still exists paths that have a cost that is less than that if G at 11 so they must be expanded until we can see that they cost more or that they yield a better result. Step 11: F at 7 is expanded to reveal G with a cost of 12. This is more than our curren best goal of G with a cost of 12 so we can abandon this path. Step 12: E with a cost of 8 is now expanded to reveal F with a cost of 9. Step 13: F with a cost of 8 is now expanded to reveal G with a cost of 13. This is more than our current best cost of 11 so this branch can be abandoned. Step 14: F with a cost of 9 is now expanded to reveal G with a cost of 14. This is more than our current best cost of 11 so this branch can be abandoned. Step 15: E with a cost of 10 is now expanded to reveal F with a cost of 11. Step 16: F with a cost of 10 is now expanded to reveal G with a cost of 12. This is more than our current best cost of 11 so this branch can be abandoned. Step 17: F with a cost of 11 is the same as our best path of G at 11 but since F needs to be evaluated before G we expand it to reveal G with a cost of 16. This branch can
8 now be abandoned. All paths have now been evaluated to a point where they either terminate or cost more than our best path to G with a cost of 11. The goal node was found in step 10 with an optimal cost of 11. a) Branch and Bound with Dynamic Programming Step 1: We expand our start node S to find nodes B and C.
9 Step 2: Node B is at the top of our list since it has the lowest cost, we expand it to find nodes A and D. Step 3: Node A has the lowest overall cost of 2 so we expand it to find node D again. This path to D has an overall cost of 3 versus the previous path to D which had an overall cost of 5 so we abandon the previous path to D. Step 4: Node D has an overall cost of 3 which is more than the previously seen node C, so we expand node C to find nodes E and F. Step 5: Nodes E and F both have an overall cost of 6 which is more than the 3 we hav previously seen with node D. We expand node D to find node C again and reach the end of this subtree since we already have a shorter path to C. Step 6: Nodes E and F have the same overall cost and so we break the tie using alphabetical order. We expand node E to find node F again. Step 7: We continue back from our previous F since it was the shorter path and expand it to find node G. Node G is our goal with an overall cost of 11. The goal node was found in step 7 with an optimal cost of 11. b) Plain Vanilla Branch and Bound
10 Step 1: We expand node S to reveal nodes A and C.
11 Step 2: A and C have the same cost so we expand A to reveal B and C. Step 3: C has the lowest cost so we it to reveal B and D. Step 4: B is opened to reveal E. Step 5: B is opened again to reveal E. Step 6: C is opened again to reveal B and D. Step 7: B is opened again to reveal E. Step 8: D is opened to reveal E again and our goal node G. Step 9: E is opened to reveal C again. Step 10: E is opened again to reveal C again. Step 11: C is opened again to reveal B and D again. The cost to D is higher than the cost to our goal node so D will not be followed any further. Step 12: C is opened again to reveal B and D again. Step 13: D is opened to reveal E again and our goal node G. The cost of this path to G is higher than the previous path to G. Step 14: E is opened again to reveal C again. Step 15: E is opened again to reveal C again. Step 16: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further. Step 17: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further. Step 18: C is opened again to reveal B and D again. The cost to D is higher than the cost to our goal node so D will not be followed any further. Step 19: C is opened again to reveal B and D again. The cost to D is higher than the cost to our goal node so D will not be followed any further. Step 20: E is opened to reveal C again. Step 21: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further.
12 Step 22: B is opened again to reveal E again. The cost to E is higher than the cost to our goal node so E will not be followed any further. Step 23: C is opened again to reveal B and D again. The cost to both B and D is highe than the cost to our goal node so neither node will not be followed any further. The goal node was found in step 8 with a optimal cost of 9. b) Branch and Bound with Dynamic Programming Step 1: We expand node S to reveal nodes A and C.
13 Step 2: A and C have the same cost so we expand A to reveal B and C. C has already been seen at a lower cost so we will not be following it again. Step 3: C has the lowest cost so we it to reveal B and D. B has already been seen at an equal value so we will not be following it again. Step 4: B has the lowest cost so we expand it to reveal 3. Step 5: D is tied with E but is opened first because ties are broken alphabetically. E and G are revealed. E has already been encountered at a lower cost. G is our goal node and was found with a cost of 9. Step 6: E is next to be evaluated since it still has a lower cost than our goal. C is revealed, since we have seen it before at a lower cost it ends our traversal. The goal node was found in step 5 with a optimal cost of Suggest an admissible heuristic for the Water Jug Problem. If the cost is equal to the amount of water moved then an admissible heuristic could be the absolute value of the goal subtracted from the value of the jug that can hold the goal. This is admissible because it is always less than or equal to the cost to the solution. a. Employ your heuristic to conduct an A* search to solve the instance of this problem presented in Chapter 1. h(n) = x 12 where x is the number of quarts of water in the 18 qt jug. f(n) = the number of quarts of water that have been moved. The possible moves at each step are filling the large container from the well (WA), filling the small container from the well (WB), pouring the large container into the small container (AB), pouring the small container into the large container (BA), dumping the large container into the well (AW), dumping the small container into the well (BW). The solution is found on step 17 and there are no competing paths that need to be evaluated.
14
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,
More informationInformed search algorithms. Chapter 4, Sections 1 2 1
Informed search algorithms Chapter 4, Sections 1 2 Chapter 4, Sections 1 2 1 Outline Best-first search A search Heuristics Chapter 4, Sections 1 2 2 Review: Tree search function Tree-Search( problem, fringe)
More informationAn Introduction to The A* Algorithm
An Introduction to The A* Algorithm Introduction The A* (A-Star) algorithm depicts one of the most popular AI methods used to identify the shortest path between 2 locations in a mapped area. The A* algorithm
More informationSeminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it
Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
More informationMeasuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
More informationSmart Graphics: Methoden 3 Suche, Constraints
Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated
More informationSearch methods motivation 1
Suppose you are an independent software developer, and your software package Windows Defeater R, widely available on sourceforge under a GNU GPL license, is getting an international attention and acclaim.
More information6.02 Practice Problems: Routing
1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing
More informationWAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.
Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used
More informationBASIC RULES OF CHESS
BASIC RULES OF CHESS Introduction Chess is a game of strategy believed to have been invented more then 00 years ago in India. It is a game for two players, one with the light pieces and one with the dark
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 7, July 23 ISSN: 2277 28X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Greedy Algorithm:
More informationProperties of Real Numbers
16 Chapter P Prerequisites P.2 Properties of Real Numbers What you should learn: Identify and use the basic properties of real numbers Develop and use additional properties of real numbers Why you should
More informationWest Virginia University College of Engineering and Mineral Resources. Computer Engineering 313 Spring 2010
College of Engineering and Mineral Resources Computer Engineering 313 Spring 2010 Laboratory #4-A (Micromouse Algorithms) Goals This lab introduces the modified flood fill algorithm and teaches how to
More informationRandom Map Generator v1.0 User s Guide
Random Map Generator v1.0 User s Guide Jonathan Teutenberg 2003 1 Map Generation Overview...4 1.1 Command Line...4 1.2 Operation Flow...4 2 Map Initialisation...5 2.1 Initialisation Parameters...5 -w xxxxxxx...5
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More information2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
More informationPOLYNOMIAL FUNCTIONS
POLYNOMIAL FUNCTIONS Polynomial Division.. 314 The Rational Zero Test.....317 Descarte s Rule of Signs... 319 The Remainder Theorem.....31 Finding all Zeros of a Polynomial Function.......33 Writing a
More informationBinary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
More informationScheduling. Getting Started. Scheduling 79
Scheduling 9 Scheduling An event planner has to juggle many workers completing different tasks, some of which must be completed before others can begin. For example, the banquet tables would need to be
More informationY. Xiang, Constraint Satisfaction Problems
Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are
More informationGenetic Algorithms and Sudoku
Genetic Algorithms and Sudoku Dr. John M. Weiss Department of Mathematics and Computer Science South Dakota School of Mines and Technology (SDSM&T) Rapid City, SD 57701-3995 john.weiss@sdsmt.edu MICS 2009
More informationIntroduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four
March 9, 2010 is a tic-tac-toe like game in which two players drop discs into a 7x6 board. The first player to get four in a row (either vertically, horizontally, or diagonally) wins. The game was first
More informationCpt S 223. School of EECS, WSU
The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring
More informationThe Taxman Game. Robert K. Moniot September 5, 2003
The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game
More informationCAB TRAVEL TIME PREDICTI - BASED ON HISTORICAL TRIP OBSERVATION
CAB TRAVEL TIME PREDICTI - BASED ON HISTORICAL TRIP OBSERVATION N PROBLEM DEFINITION Opportunity New Booking - Time of Arrival Shortest Route (Distance/Time) Taxi-Passenger Demand Distribution Value Accurate
More informationDynamic Programming. Lecture 11. 11.1 Overview. 11.2 Introduction
Lecture 11 Dynamic Programming 11.1 Overview Dynamic Programming is a powerful technique that allows one to solve many different types of problems in time O(n 2 ) or O(n 3 ) for which a naive approach
More informationIE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
More information6.099, Spring Semester, 2006 Assignment for Week 13 1
6.099, Spring Semester, 2006 Assignment for Week 13 1 MASSACHVSETTS INSTITVTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.099 Introduction to EECS I Spring Semester, 2006
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationSUPPLY CHAIN OPTIMIZATION MODELS IN THE AREA OF OPERATION
SUPPLY CHAIN OPTIMIZATION MODELS IN THE AREA OF OPERATION Tomáš DVOŘÁK, Martin VLKOVSKÝ Abstract: Main idea of this paper is to choose both suitable and applicable operations research methods for military
More informationOperations: search;; min;; max;; predecessor;; successor. Time O(h) with h height of the tree (more on later).
Binary search tree Operations: search;; min;; max;; predecessor;; successor. Time O(h) with h height of the tree (more on later). Data strutcure fields usually include for a given node x, the following
More informationChinese postman problem
PTR hinese postman problem Learning objectives fter studying this chapter, you should be able to: understand the hinese postman problem apply an algorithm to solve the problem understand the importance
More informationAnswer Key for California State Standards: Algebra I
Algebra I: Symbolic reasoning and calculations with symbols are central in algebra. Through the study of algebra, a student develops an understanding of the symbolic language of mathematics and the sciences.
More informationSession 7 Bivariate Data and Analysis
Session 7 Bivariate Data and Analysis Key Terms for This Session Previously Introduced mean standard deviation New in This Session association bivariate analysis contingency table co-variation least squares
More informationCS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139
CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.
More informationGeometry Solve real life and mathematical problems involving angle measure, area, surface area and volume.
Performance Assessment Task Pizza Crusts Grade 7 This task challenges a student to calculate area and perimeters of squares and rectangles and find circumference and area of a circle. Students must find
More informationPCB ROUTERS AND ROUTING METHODS
PCB ROUTERS AND ROUTING METHODS BY: LEE W. RITCHEY, SPEEDING EDGE, COPYRIGHT SPEEDING EDGE DECEMBER 1999 FOR PUBLICATION IN FEBRUARY ISSUE OF PC DESIGN MAGAZINE INTRODUCTION Routing of printed circuit
More informationNetworks and Paths. The study of networks in mathematics began in the middle 1700 s with a famous puzzle called the Seven Bridges of Konigsburg.
ame: Day: etworks and Paths Try This: For each figure,, and, draw a path that traces every line and curve exactly once, without lifting your pencil.... Figures,, and above are examples of ETWORKS. network
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationComplete Solution of the Eight-Puzzle and the Benefit of Node Ordering in IDA*
Complete Solution of the Eight-Puzzle and the Benefit of Node Ordering in IDA* Alexander Reinefeld Paderborn Center for Parallel Computing Waxburger Str. 100, D-33095 Paderborn, Germany Abstract The 8-puzzle
More informationDynamic programming. Doctoral course Optimization on graphs - Lecture 4.1. Giovanni Righini. January 17 th, 2013
Dynamic programming Doctoral course Optimization on graphs - Lecture.1 Giovanni Righini January 1 th, 201 Implicit enumeration Combinatorial optimization problems are in general NP-hard and we usually
More informationLinear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.
1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that
More informationSEARCHING AND KNOWLEDGE REPRESENTATION. Angel Garrido
Acta Universitatis Apulensis ISSN: 1582-5329 No. 30/2012 pp. 147-152 SEARCHING AND KNOWLEDGE REPRESENTATION Angel Garrido ABSTRACT. The procedures of searching of solutions of problems, in Artificial Intelligence
More informationProject Scheduling: PERT/CPM
Project Scheduling: PERT/CPM Project Scheduling with Known Activity Times (as in exercises 1, 2, 3 and 5 in the handout) and considering Time-Cost Trade-Offs (as in exercises 4 and 6 in the handout). This
More informationA. O. Odior Department of Production Engineering University of Benin, Edo State. E-mail: waddnis@yahoo.com
2012 Cenresin Publications www.cenresinpub.org APPLICATION OF PROJECT MANAGEMENT TECHNIQUES IN A CONSTRUCTION FIRM Department of Production Engineering University of Benin, Edo State. E-mail: waddnis@yahoo.com
More informationBinary Search Trees CMPSC 122
Binary Search Trees CMPSC 122 Note: This notes packet has significant overlap with the first set of trees notes I do in CMPSC 360, but goes into much greater depth on turning BSTs into pseudocode than
More informationArea and Perimeter: The Mysterious Connection TEACHER EDITION
Area and Perimeter: The Mysterious Connection TEACHER EDITION (TC-0) In these problems you will be working on understanding the relationship between area and perimeter. Pay special attention to any patterns
More informationA Strategy for Teaching Finite Element Analysis to Undergraduate Students
A Strategy for Teaching Finite Element Analysis to Undergraduate Students Gordon Smyrell, School of Computing and Mathematics, University of Teesside The analytical power and design flexibility offered
More informationTEACHER S GUIDE TO RUSH HOUR
Using Puzzles to Teach Problem Solving TEACHER S GUIDE TO RUSH HOUR Includes Rush Hour 2, 3, 4, Rush Hour Jr., Railroad Rush Hour and Safari Rush Hour BENEFITS Rush Hour is a sliding piece puzzle that
More informationGraph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
More informationMEASURES OF VARIATION
NORMAL DISTRIBTIONS MEASURES OF VARIATION In statistics, it is important to measure the spread of data. A simple way to measure spread is to find the range. But statisticians want to know if the data are
More informationAnalysis of Micromouse Maze Solving Algorithms
1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.
More informationUSING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE
USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE Keith Brandt, Kevin R. Burger, Jason Downing, Stuart Kilzer Mathematics, Computer Science, and Physics Rockhurst University, 1100 Rockhurst Road,
More informationQuestion 2: How will changes in the objective function s coefficients change the optimal solution?
Question 2: How will changes in the objective function s coefficients change the optimal solution? In the previous question, we examined how changing the constants in the constraints changed the optimal
More informationA new Branch-and-Price Algorithm for the Traveling Tournament Problem (TTP) Column Generation 2008, Aussois, France
A new Branch-and-Price Algorithm for the Traveling Tournament Problem (TTP) Column Generation 2008, Aussois, France Stefan Irnich 1 sirnich@or.rwth-aachen.de RWTH Aachen University Deutsche Post Endowed
More informationFast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik vadim.stadnik@gmail.com Abstract This paper provides an introduction to the design of augmented data structures that offer
More informationfor the Bill Hanlon bill@hanlonmath.com
Strategies for Learning the Math Facts Bill Hanlon bill@hanlonmath.com The more sophisticated mental operations in mathematics of analysis, synthesis, and evaluation are impossible without rapid and accurate
More informationIntroduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
More informationDecision Mathematics 1 TUESDAY 22 JANUARY 2008
ADVANCED SUBSIDIARY GCE 4736/01 MATHEMATICS Decision Mathematics 1 TUESDAY 22 JANUARY 2008 Additional materials: Answer Booklet (8 pages) Graph paper Insert for Questions 3 and 4 List of Formulae (MF1)
More information25 Integers: Addition and Subtraction
25 Integers: Addition and Subtraction Whole numbers and their operations were developed as a direct result of people s need to count. But nowadays many quantitative needs aside from counting require numbers
More informationHome Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit
Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,
More information1. I have 4 sides. My opposite sides are equal. I have 4 right angles. Which shape am I?
Which Shape? This problem gives you the chance to: identify and describe shapes use clues to solve riddles Use shapes A, B, or C to solve the riddles. A B C 1. I have 4 sides. My opposite sides are equal.
More informationFactorizations: Searching for Factor Strings
" 1 Factorizations: Searching for Factor Strings Some numbers can be written as the product of several different pairs of factors. For example, can be written as 1, 0,, 0, and. It is also possible to write
More information4 UNIT FOUR: Transportation and Assignment problems
4 UNIT FOUR: Transportation and Assignment problems 4.1 Objectives By the end of this unit you will be able to: formulate special linear programming problems using the transportation model. define a balanced
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationLayout Design Post Woods Apartment Complex
Layout Design Some of these slides are courtesy of Professor Paul Griffin Post Woods partment Complex tlanta Zoo Lenox Mall, tlanta Hospital floor plan Guildcrest Homes Factory floor plan 6 Furniture parts
More informationMultiplying and Dividing Signed Numbers. Finding the Product of Two Signed Numbers. (a) (3)( 4) ( 4) ( 4) ( 4) 12 (b) (4)( 5) ( 5) ( 5) ( 5) ( 5) 20
SECTION.4 Multiplying and Dividing Signed Numbers.4 OBJECTIVES 1. Multiply signed numbers 2. Use the commutative property of multiplication 3. Use the associative property of multiplication 4. Divide signed
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationDecision Mathematics D1. Advanced/Advanced Subsidiary. Friday 12 January 2007 Morning Time: 1 hour 30 minutes. D1 answer book
Paper Reference(s) 6689/01 Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Friday 12 January 2007 Morning Time: 1 hour 30 minutes Materials required for examination Nil Items included
More informationChapter 4 Online Appendix: The Mathematics of Utility Functions
Chapter 4 Online Appendix: The Mathematics of Utility Functions We saw in the text that utility functions and indifference curves are different ways to represent a consumer s preferences. Calculus can
More informationCS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team
CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A
More informationLearning to Search More Efficiently from Experience: A Multi-Heuristic Approach
Proceedings of the Eighth International Symposium on Combinatorial Search (SoCS-2015) Learning to Search More Efficiently from Experience: A Multi-Heuristic Approach Sandip Aine Indraprastha Institute
More informationCSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
More informationEnumerating possible Sudoku grids
Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany bf@mail.inf.tu-dresden.de Frazer Jarvis Department of Pure Mathematics University of Sheffield,
More informationTraffic Engineering Management Concepts
3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page
More informationNetwork Planning and Analysis
46 Network Planning and Analysis 1. Objective: What can you tell me about the project? When will the project finish? How long will the project take (project total duration)? 2. Why is this topic Important
More informationSession 6 Number Theory
Key Terms in This Session Session 6 Number Theory Previously Introduced counting numbers factor factor tree prime number New in This Session composite number greatest common factor least common multiple
More informationWhat is a parabola? It is geometrically defined by a set of points or locus of points that are
Section 6-1 A Parable about Parabolas Name: What is a parabola? It is geometrically defined by a set of points or locus of points that are equidistant from a point (the focus) and a line (the directrix).
More information2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
More informationSudoku puzzles and how to solve them
Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned
More informationIntroduction to Project Management
L E S S O N 1 Introduction to Project Management Suggested lesson time 50-60 minutes Lesson objectives To be able to identify the steps involved in project planning, you will: a b c Plan a project. You
More informationYou can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
More informationA Review on Load Balancing In Cloud Computing 1
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 6 June 2015, Page No. 12333-12339 A Review on Load Balancing In Cloud Computing 1 Peenaz Pathak, 2 Er.Kamna
More information7 Literal Equations and
CHAPTER 7 Literal Equations and Inequalities Chapter Outline 7.1 LITERAL EQUATIONS 7.2 INEQUALITIES 7.3 INEQUALITIES USING MULTIPLICATION AND DIVISION 7.4 MULTI-STEP INEQUALITIES 113 7.1. Literal Equations
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More informationSUPPLEMENT TO CHAPTER 6 MINIMUM SPANNING-TREE PROBLEMS
S h 6- SUPPLMNT TO HPTR 6 MINIMUM SPNNIN-TR PROLMS hapter 6 focuses on network optimization problems. These are problems that can be described in terms of a complete network that has both nodes and links
More informationNetwork Load Balancing Using Ant Colony Optimization
Network Load Balancing Using Ant Colony Optimization Mr. Ujwal Namdeo Abhonkar 1, Mr. Swapnil Mohan Phalak 2, Mrs. Pooja Ujwal Abhonkar 3 1,3 Lecturer in Computer Engineering Department 2 Lecturer in Information
More informationSeries and Parallel Circuits
Direct Current (DC) Direct current (DC) is the unidirectional flow of electric charge. The term DC is used to refer to power systems that use refer to the constant (not changing with time), mean (average)
More informationContents. Sample worksheet from www.mathmammoth.com
Contents Introduction... 4 Warmup: Mental Math 1... 8 Warmup: Mental Math 2... 10 Review: Addition and Subtraction... 12 Review: Multiplication and Division... 15 Balance Problems and Equations... 19 More
More informationChapter 10: Network Flow Programming
Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,
More informationCMPSCI611: Approximating MAX-CUT Lecture 20
CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to
More informationCRITICAL PATH ANALYSIS AND GANTT CHARTS
CRITICAL PATH ANALYSIS AND GANTT CHARTS 1. An engineering project is modelled by the activity network shown in the figure above. The activities are represented by the arcs. The number in brackets on each
More informationOperation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
More informationFP1. HiSET TM Mathematics Practice Test
FP1 HiSET TM Mathematics Practice Test Copyright 013 Educational Testing Service. All rights reserved. E T S and the E T S logo are registered trademarks of Educational Testing Service (E T S) in the United
More information4003-440/4003-713 Operating Systems I. Process Scheduling. Warren R. Carithers (wrc@cs.rit.edu) Rob Duncan (rwd@cs.rit.edu)
4003-440/4003-713 Operating Systems I Process Scheduling Warren R. Carithers (wrc@cs.rit.edu) Rob Duncan (rwd@cs.rit.edu) Review: Scheduling Policy Ideally, a scheduling policy should: Be: fair, predictable
More informationThe Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy
BMI Paper The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy Faculty of Sciences VU University Amsterdam De Boelelaan 1081 1081 HV Amsterdam Netherlands Author: R.D.R.
More informationRational Exponents. Squaring both sides of the equation yields. and to be consistent, we must have
8.6 Rational Exponents 8.6 OBJECTIVES 1. Define rational exponents 2. Simplify expressions containing rational exponents 3. Use a calculator to estimate the value of an expression containing rational exponents
More informationKrishna Institute of Engineering & Technology, Ghaziabad Department of Computer Application MCA-213 : DATA STRUCTURES USING C
Tutorial#1 Q 1:- Explain the terms data, elementary item, entity, primary key, domain, attribute and information? Also give examples in support of your answer? Q 2:- What is a Data Type? Differentiate
More informationDefinition 8.1 Two inequalities are equivalent if they have the same solution set. Add or Subtract the same value on both sides of the inequality.
8 Inequalities Concepts: Equivalent Inequalities Linear and Nonlinear Inequalities Absolute Value Inequalities (Sections 4.6 and 1.1) 8.1 Equivalent Inequalities Definition 8.1 Two inequalities are equivalent
More informationChapter 6. Decoding. Statistical Machine Translation
Chapter 6 Decoding Statistical Machine Translation Decoding We have a mathematical model for translation p(e f) Task of decoding: find the translation e best with highest probability Two types of error
More information