1. The document discusses various search strategies including uninformed strategies like breadth-first search, depth-first search, iterative deepening search, and uniform cost search as well as informed strategies like greedy best-first search and A* search.
2. It explains how A* search uses both the cost to reach a node (g(n)) and an admissible heuristic estimate of the cost to reach the goal from that node (h(n)) to efficiently guide the search towards optimal solutions.
3. For A* to be optimal, the heuristic must be admissible, meaning it cannot overestimate actual costs. If the heuristic is also consistent, A* is guaranteed to find optimal solutions for graph search problems
Types of inference engines
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification
Types of inference engines
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
As Expert Systems evolved many new techniques were incorporated into various types of inference engines. Some of the most important of these were:
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification.
Truth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology ClassificationTruth Maintenance.
Hypothetical Reasoning.
Fuzzy Logic.
Ontology Classification
Abstract: This PDSG workship introduces basic concepts on Greedy and A-STAR search. Examples are given pictorially, as pseudo code and in Python.
Level: Fundamental
Requirements: Should have prior familiarity with Graph Search. No prior programming knowledge is required.
Lecture slides by Mustafa Jarrar at Birzeit University, Palestine.
See the course webpage at: http://jarrar-courses.blogspot.com/2012/04/aai-spring-jan-may-2012.html
and http://www.jarrar.info
and on Youtube:
http://www.youtube.com/watch?v=aNpLekq6-oA&list=PL44443F36733EF123
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Abstract: This PDSG workship introduces basic concepts on Greedy and A-STAR search. Examples are given pictorially, as pseudo code and in Python.
Level: Fundamental
Requirements: Should have prior familiarity with Graph Search. No prior programming knowledge is required.
Lecture slides by Mustafa Jarrar at Birzeit University, Palestine.
See the course webpage at: http://jarrar-courses.blogspot.com/2012/04/aai-spring-jan-may-2012.html
and http://www.jarrar.info
and on Youtube:
http://www.youtube.com/watch?v=aNpLekq6-oA&list=PL44443F36733EF123
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
2. 2
Review: Tree search
• Initialize the frontier using the starting state
• While the frontier is not empty
– Choose a frontier node to expand according to search strategy
and take it off the frontier
– If the node contains the goal state, return solution
– Else expand the node and add its children to the frontier
• To handle repeated states:
– Keep an explored set; add each node to the explored set every
time you expand it
– Every time you add a node to the frontier, check whether it
already exists in the frontier with a higher path cost, and if yes,
replace that node with the new one
5. 5
Review: Uninformed search strategies
• A search strategy is defined by picking the order of
node expansion
• Uninformed search strategies use only the information
available in the problem definition
• only considers “already visited” path
• without edge cost, guided by
– path length as number of nodes
– successor relationships and structure (leftmost,…)
• with edge cost, guided by
– path length as cost of visited path
7. 7
Informed search strategies
• Informed search strategies use problem specific
knowledge beyond the definition of the problem
itself
• Idea: give the algorithm “hints” about the
desirability of different states
– Use an evaluation function to rank nodes and select the
most promising one for expansion
• Greedy best-first search
• A* search
8. 8
Spring
Best-first search
• Idea: use an evaluation function f(n) to select the node for
expansion
– estimate of "desirability"
Expand most desirable unexpanded node
• Implementation:
Order the nodes in fringe in decreasing order of desirability
11. 11
Heuristic Function
Heuristic – several meanings
- To find, or discover (Heureka, Archimedes)
- Computers, Mathematics. pertaining to a trial-and-error
method of problem solving used when an algorithmic
approach is impractical.
h cannot be computed solely from the states and transitions
in the current problem -> If we could, we would already
know the optimal path!
h(.) is based on external knowledge about the problem ->
informed search
12. 12
Spring
Greedy best-first search
• Greedy best-first search expands the node that
appears to be closest to goal
• Evaluation function f(n) = h(n) (heuristic)
• = estimate of cost from n to goal
• e.g., hSLD(n) = straight-line distance from n to
Bucharest
• Note that, hSLD cannot be computed from the problem
description itself. It takes a certain amount of
experience to know that it is correlated with actual
road distances, and therefore it is a useful heuristic
14. 14
Spring
Romania with step costs in km
e.g. For Romania, cost of the cheapest path from Arad to
Bucharest can be estimated via the straight line distance
26. 26
Properties of greedy best-first search
• Complete?
No – can get stuck in loops
start
goal
Path through Faragas is not the optimal
In getting Iasi to Faragas, it will expand Neamt first but it is a dead end
27. 27
Properties of greedy best-first search
• Complete?
No – can get stuck in loops
• Optimal?
No
28. 28
Properties of greedy best-first search
• Complete?
No – can get stuck in loops
• Optimal?
No
• Time?
Worst case: O(bm)
Can be much better with a good heuristic
• Space?
Worst case: O(bm)
keeps all nodes in memory
29. 29
How can we fix the greedy problem?
• How about keeping track of the distance already
traveled in addition to the distance remaining?
31. 31
Spring
A* search
• Idea: avoid expanding paths that are already
expensive
• The evaluation function f(n) is the estimated total
cost of the path through node n to the goal:
f(n) = g(n) + h(n)
g(n) = cost so far to reach n
h(n) = estimated cost from n to goal
52. 53
Admissible heuristics
• An admissible heuristic never overestimates the
cost to reach the goal, i.e., it is optimistic
• A heuristic h(n) is admissible if for every node n,
h(n) ≤ h*(n), where h*(n) is the true cost to reach
the goal state from n
• Consequence: f(n) never over estimates the true
cost of a solution through n since g(n) is the exact
cost to reach n
• Example: straight line distance never
overestimates the actual road distance
• Theorem: If h(n) is admissible, A* is optimal
55. 56
Spring
Consistent heuristics
• A heuristic is consistent if for every node n, every successor n' of n
generated by any action a,
h(n) ≤ c(n,a,n') + h(n')
n' = successor of n generated by action a
• The estimated cost of reaching the goal from n is no greater than the step
cost of getting to n' plus the estimated cost of reaching the goal from n'
• If h is consistent, we have
f(n') = g(n') + h(n')
= g(n) + c(n,a,n') + h(n')
≥ g(n) + h(n)
≥ f(n)
• if h(n) is consistent then the values of f(n) along any path are non-
decreasing
• Theorem: If h(n) is consistent, A* using GRAPH-SEARCH is optimal
56. 57
Optimality of A*
• Tree search (i.e., search without repeated state
detection):
– A* is optimal if heuristic is admissible (and non-
negative)
• Graph search (i.e., search with repeated state
detection)
– A* optimal if heuristic is consistent
• Consistency implies admissibility
– In general, most natural admissible heuristics tend to be
consistent, especially if they come from relaxed
problems
Source: Berkeley CS188x
57. 58
Spring
Optimality of A*
• Monotonicity: A* expands nodes in order of increasing f value
• Gradually adds "f-contours" of nodes
• Contour i has all nodes with f=fi, where fi < fi+1
• A* expands all nodes with f(n) < C*
• A* might then expand some of the nodes right on the goal contour (where
f(n) = C*) before selecting a goal state
• A* expands no nodes with f(n) > C* (e.g. the subtree under Timisoara)
58. 60
Spring
Optimality of A* (proof)
• Suppose some suboptimal goal G2 has been generated and is in the fringe.
Let the cost of the optimal solution to goal G is C*
f = g + h
• f(G2) = g(G2) since h(G2) = 0
• g(G2) > C* since G2 is suboptimal
• f(G) = g(G) since h(G) = 0
• f(G2) > f(G) from above
Let n be an unexpanded node in the fringe such that n is on a shortest
path to an optimal goal G (e.g. Pitesti).
• If h(n) does not overestimate the cost of completing the solution path, then
• f(n) = g(n) + h(n) ≤ C*
• f(n) ≤ f(G)
• f(G2) > f(G) from above
• Hence f(G2) > f(G) >= f(n) , and A* will never select G2 for expansion
59. 61
Optimality of A*
• A* is optimally efficient – no other tree-based
algorithm that uses the same heuristic can expand
fewer nodes and still be guaranteed to find the
optimal solution
– A* expands all nodes for which f(n) ≤ C*. Any
algorithm that does not risks missing the optimal
solution
60. 62
Spring
Properties of A*
• Complete? Yes (unless there are infinitely many
nodes with f ≤ f(G)
• Time? Exponential
• Space? Keeps all nodes in memory
• Optimal? Yes
• Alternative:
• Memory bounded heuristic search :
• IDA*: adapt the idea of iterative deepening search, use cut-off as f-
cost rather than the depth.
• Recursive best-first search
61. 63
Spring
Admissible heuristics
E.g., for the 8-puzzle:
• h1(n) = number of misplaced tiles
• h2(n) = total Manhattan distance – the sum of the distances of the tiles from
their goal positions
• h1(S) = ?
• h2(S) = ?
62. 64
Spring
Admissible heuristics
E.g., for the 8-puzzle:
• h1(n) = number of misplaced tiles
• h2(n) = total Manhattan distance
• h1(S) = ? 8
• h2(S) = ? 3+1+2+2+2+3+3+2 = 18
63. 65
Spring
Quality of a heuristic
• Effective branching factor b*
• If N is the number of nodes generated by A*, and the solution depth is d, then
– N+1 = 1 + b* + (b*)^2 + … + (b*)^d
• E.g. If A* finds a solution at depth 5 using 52 nodes, then b* = 1.92
• The average solution cost for randomly generated 8-puzzle instance is about 22
steps. The branching factor is 3 (when the tile is in middle it is 4, when in the
corner it is 2, when it is along the edge it is 3)
• Typical search costs (average number of nodes expanded):
• d=12IDS = 3,644,035 nodes
A*(h1) = 227 nodes, b* =1,42
A*(h2) = 73 nodes, b* = 1.24
• d=24 IDS = too many nodes
A*(h1) = 39,135 nodes, b* = 1.48
A*(h2) = 1,641 nodes, b* = 1.26
64. 66
Spring
Dominance
• If h2(n) ≥ h1(n) for all n (both admissible)
• then h2 dominates h1
• h2 is better for search
• It is always better to use a heuristic function with
higher values, provided it does not overestimate and
that the computation time for the heuristic is not too
large
Why?
Every node with f(n) < C* will be expanded
i.e. every node with h(n) < C* - g(n) will be expanded
Since h2 is at least as big as h1 for all nodes, every node that is
expanded by h2, will be also expanded by h1, and h1 may also
cause other nodes to be expanded
65. 67
Spring
Inventing admissible heuristic functions
• h1 and h2 estimates perfectly accurate path length for
simplified versions of 8-puzzle
• If a tile can move anywhere, then h1 would give the exact
number of steps in the shortest solution.
• If a tile can move to any adjacent square, even onto an
occupied square, then h2 would give the exact number of
steps in the shortest solution.
66. 68
Spring
Relaxed problems
• A problem with fewer restrictions on the actions is
called a relaxed problem
• The cost of an optimal solution to a relaxed problem
is an admissible heuristic for the original problem
• The heuristic is admissible because the optimal
solution in the original problem is also a solution in
the relaxed problem and therefore must be at least as
expensive as the optimal solution in the relaxed
problem
67. 69
Spring
Inventing admissible heuristic functions
• If a problem definition is written down in a formal language, it is possible to
construct relaxed problems automatically (ABSOLVER)
– If 8-puzzle is described as
• A tile can move from square A to square B if
– A is horizontally or vertically adjacent to B and B is blank
– A relaxed problem can be generated by removing one or both of the conditions
• (a) A tile can move from square A to square B if A is adjacent to B
• (b) A tile can move from square A to square B if B is blank
• (c) A tile can move from square A to square B
– h2 can be derived from (a) – h2 is the proper score if we move each tile into its
destination
– h1 can be derived from (c) – it is the proper score if tiles could move to their
intended destination in one step
• Admissible heuristics can also be derived from the solution cost of a subproblem of
a given problem
68. 71
Combining heuristics
• Suppose we have a collection of admissible
heuristics h1(n), h2(n), …, hm(n), but none of them
dominates the others
• How can we combine them?
h(n) = max{h1(n), h2(n), …, hm(n)}
69. 72
Weighted A* search
• Idea: speed up search at the expense of optimality
• Take an admissible heuristic, “inflate” it by a
multiple α > 1, and then perform A* search as
usual
• Fewer nodes tend to get expanded, but the
resulting solution may be suboptimal (its cost will
be at most α times the cost of the optimal solution)
70. 73
Example of weighted A* search
Heuristic: 5 * Euclidean distance
from goal
Source: Wikipedia
Compare: Exact A*
71. 74
All search strategies
Algorithm Complete? Optimal?
Time
complexity
Space
complexity
BFS
DFS
IDS
UCS
Greedy
A*
No No
Worst case: O(bm)
Yes
Yes
(if heuristic is
admissible)
Best case: O(bd)
Number of nodes with
g(n)+h(n) ≤ C*
Yes
Yes
No
Yes
If all step
costs are equal
If all step
costs are equal
Yes
No
O(bd)
O(bm)
O(bd)
O(bd)
O(bm)
O(bd)
Number of nodes with
g(n) ≤ C*