Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: n vehicles occupy squares (1, 1) through (n, 1) (i.e., the bottom row) of an n × n grid. The vehicles must be moved to the top row but in reverse order; so the vehicle i that starts in (i, 1) must end up in (n - i + 1, n). On each time step, every one of the n vehicles can move one square up, down, left, or right, or stay put; but if a vehicle stays put, one other adjacent vehicle (but not more than one) can hop over it. Two vehicles cannot occupy the same square.

a) find out the size of the state space as a function of n.

b) find out the branching factor as a function of n.

c) Suppose that vehicle i is at (xi, yi); prepare a nontrivial admissible heuristic hi for the number of moves it will require to get to its goal location (n - i + 1, n), assuming no other vehicles are on the grid. Give a formula for hi in terms of xi, yi, and n.

d) Which of the following heuristics are admissible for the problem of moving all n vehicles to their destinations? describe.

929_heuristics.jpg

problem 2: Describe the search algorithm that results from each of the following special cases. How does it relate to other algorithms we have discussed.

a) Local beam search with k = 1.

b) Local beam search with one initial state and no limit on the number of states retained.

c) Simulated annealing with T = 0 at all times (and omitting the termination test).

d) Simulated annealing with T = ∞ at all times.

e) Genetic algorithm with population size N = 1.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91083

Have any Question? 


Related Questions in Computer Engineering

Metrics paperresearch the following topicmetricsreview nist

Metrics Paper Research the following topic: Metrics Review NIST SP 800-55 Rev. 1, Performance Measurement Guide for Information Security. Discuss measures you would be interested in finding the results, based on your hom ...

1 investigate how netscape navigator and internet explorer

1. Investigate how Netscape Navigator and Internet Explorer implemented SSL technology. 2. Study both SSL and S-HTTP. Show that these two protocols have a lot in common. However, the two protocols have some differences. ...

Consider a hash table of size 501 that contains 85 keysa

Consider a hash table of size 501 that contains 85 keys. (a) What is the load factor? (b) What is the average number of comparisons required to determine if the collection contains the key 73, if: i. linear probing is us ...

Term paper reengineering the course enrollment

Term Paper: Reengineering the Course Enrollment Process Consider Strayer University's current process of enrolling for courses through the use of the Web. Suppose that the University has contracted you to reengineer the ...

1 why is it important for organizations to have a business

1. Why is it important for organizations to have a business continuity plan in place? 2. Why is important for organizations to have a disaster recovery plan? 3. If companies have both a BCP and a DRP in place do they nee ...

1 how does a planner know when a task has been subdivided

1. How does a planner know when a task has been subdivided to an adequate degree and can be classified as an action step? 2. What is a deliverable? Name two uses for deliverables. 3. What is a resource? What are the two ...

Charlie was just getting ready to head home when the phone

Charlie was just getting ready to head home when the phone rang. Caller ID showed it was Peter. "Hi, Peter," he said into the receiver. "Want me to start the file cracker on your spreadsheet?" "No, thanks," Peter answere ...

1 write a program that can read an indefinite number of

1. Write a program that can read an indefinite number of lines of VB.NET code and store reserved words in one linked list and identifiers and literals in another linked list. When the program is finished reading input, d ...

1 do some research regarding tcp window scaling find out if

1. Do some research regarding TCP window scaling. Find out if the OS on your computer uses it by default and, if not, if there's a mechanism for configuring the OS to use it. 2. Do some research on distributed computing. ...

Perform a hierarchical clustering of the one-dimensional

Perform a hierarchical clustering of the one-dimensional set of points 1, 4, 9, 16, 25, 36, 49, 64, 81, assuming clusters are represented by their centroid (average), and at each step the clusters wit

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen