Heuristic Search Overview Deskripsi Limitations of Uninformed Search

Total Page:16

File Type:pdf, Size:1020Kb

Heuristic Search Overview Deskripsi Limitations of Uninformed Search 2/13/2012 Jurusan Teknik Informatika – Universitas Widyatama Overview • Deskripsi • Heuristic Search Heuristic Search – Generate-and Test – Hill Climbing – Best-First Search Pertemuan : 3 – Greedy Best-First-Search – A* Dosen Pembina : – Iterative Deeping A* Sriyani Violina • Latihan Praktikum III Danang Junaedi • Tugas Rumah III Susetyo Bagas Baskoro IF-UTAMA 1 IF-UTAMA 2 Deskripsi Limitations of uninformed search • Pertemuan ini mempelajari bagaimana memecahkan • 8-puzzle suatu masalah dengan teknik searching. – Avg. solution cost is about 22 steps • Metode searching yang dibahas pada pertemuan ini – branching factor ~ 3 adalah heuristic search atau informed search yang – Exhaustive search to depth 22: terdiri dari: • 3.1 x 10 10 states – Generate-and Test – E.g., d=12, IDS expands 3.6 million states on average – Hill Climbing – Best-First Search [24 puzzle has 10 24 states (much worse)] – Greedy Best-First-Search – A* – Iterative Deeping A* IF-UTAMA 3 IF-UTAMA 4 IF-UTAMA 1 2/13/2012 Recall tree search… Recall tree search… This “strategy” is what differentiates different search algorithms IF-UTAMA 5 IF-UTAMA 6 Informed methods add Heuristic domain-specific information Merriam-Webster's Online Dictionary • Add domain-specific information to select the best Heuristic (pron. \hy u-’ris-tik\): adj. [from Greek heuriskein to discover.] involving or serving as an aid to learning, discovery, or problem-solving by experimental and path along which to continue searching especially trial-and-error methods The Free On-line Dictionary of Computing (15Feb98) • Define a heuristic function h(n) that estimates the heuristic 1. <programming> A rule of thumb, simplification or educated guess that reduces or limits the search for solutions in domains that are difficult and poorly “goodness” of a node n. understood. Unlike algorithms, heuristics do not guarantee feasible solutions and – Specifically, h(n) = estimated cost (or distance) of minimal are often used with no theoretical guarantee. 2. <algorithm> approximation algorithm. cost path from n to a goal state . From WordNet (r) 1.6 • The heuristic function is an estimate of how close we heuristic adj 1: (computer science) relating to or using a heuristic rule 2: of or relating to a general formulation that serves to guide investigation [ant: algorithmic] n : a are to a goal, based on domain-specific information commonsense rule (or set of rules) intended to increase the probability of solving some problem [syn: heuristic rule, heuristic program] that is computable from the current state description. IF-UTAMA 7 IF-UTAMA 8 IF-UTAMA 2 2/13/2012 Heuristic function Heuristic functions for 8-puzzle • Heuristic: • 8-puzzle – Definition: “using rules of thumb to find answers” – Avg. solution cost is about 22 steps – branching factor ~ 3 • Heuristic function h(n) – Exhaustive search to depth 22: – Estimate of (optimal) cost from n to goal • 3.1 x 10 10 states. – h(n) = 0 if n is a goal node – A good heuristic function can reduce the search process. – Example: straight line distance from n to Bucharest • Note that this is not the true state-space distance • Two commonly used heuristics • It is an estimate – actual state-space distance can be higher – h1 = the number of misplaced tiles • h (s)=8 – Provides problem-specific knowledge to the search algorithm 1 – h2 = the sum of the distances of the tiles from their goal positions (Manhattan distance). • h2(s)=3+1+2+2+2+3+3+2=18 IF-UTAMA 9 IF-UTAMA 10 Heuristics Weak vs. strong methods • All domain knowledge used in the search is encoded in the heuristic function h() . • We use the term weak methods to refer to methods that are • Heuristic search is an example of a “ weak method ” because of extremely general and not tailored to a specific situation. the limited way that domain-specific information is used to • Examples of weak methods include solve the problem. – Means-ends analysis is a strategy in which we try to represent the current • Examples: situation and where we want to end up and then look for ways to shrink the differences between the two. – Missionaries and Cannibals: Number of people on starting river bank – Space splitting is a strategy in which we try to list the possible solutions to – 8-puzzle: Number of tiles out of place a problem and then try to rule out classes of these possibilities. – 8-puzzle: Sum of distances each tile is from its goal position – Subgoaling means to split a large problem into several smaller ones that • In general: can be solved one at a time. – h(n) ≥ 0 for all nodes n • Called “weak” methods because they do not take advantage of – h(n) = 0 implies that n is a goal node more powerful domain-specific heuristics – h(n) = ∞ implies that n is a dead-end that can never lead to a goal IF-UTAMA 11 IF-UTAMA 12 IF-UTAMA 3 2/13/2012 When to use ? Advantages • The input data are limited or inexact. • Simple to understand. • Optimization model can not be used as for complex • Easier to implement and explain. reality. • Save formulation time. • Reliable and exact algorithm is not available. • Save computer programming and storage requirements. • Save computational time and thus real time in decision making. • It is possible to improve the efficiency of the • Often produce multiple acceptable solution. optimization process. • Usually it is possible to state a theoretical or empirical measure of • Symbolic rather than numerical processing is involved. the solution quality. • Quick decision must be made . • Incorporate intellegence to guide the search. • Computerization is not feasible. • It is possible to apply efficient heuristics to models that could be solved with mathematical programming. IF-UTAMA 13 IF-UTAMA 14 Disadvantages Generate-and-Test • An optimal solution can not be guaranteed. • It is a depth first search procedure since complete solutions must be generated before they can be tested. • There may be too many exceptions to the rules. • In its most systematic form, it is simply an exhaustive search of the problem space. • Sequential decision choices may fail to anticipate • Operate by generating solutions randomly. the future consequences of each choice. • Also called as British Museum algorithm • The interdependencies of one part pf a system • If a sufficient number of monkeys were placed in front of a set of typewriters, and left alone long enough, then they would can sometime have a profound influence on the eventually produce all the works of shakespeare. whole system. • Dendral: which infers the struture of organic compounds using NMR spectrogram. It uses plan-generate-test. IF-UTAMA 15 IF-UTAMA 16 IF-UTAMA 4 2/13/2012 Generate-and-Test Algorithm Hill Climbing 1. Generate a possible solution. For some problems, this • Is a variant of generate-and test in which feedback from the test procedure is used to help the generator decide means generating a particular point in the problem which direction to move in search space. space. For others it means generating a path from a • The test function is augmented with a heuristic function start state that provides an estimate of how close a given state is to 2. Test to see if this is actually a solution by comparing the goal state. the chosen point or the endpoint of the chosen path to • Computation of heuristic function can be done with the set of acceptable goal states. negligible amount of computation. • Hill climbing is often used when a good heuristic 3. If a solution has been found, quit, Otherwise return to function is available for evaluating states but when no step 1. other useful knowledge is available. IF-UTAMA 17 IF-UTAMA 18 Hill climbing Hill climbing algorithm • Example: using the straight-line distance: 1. QUEUE <<----path only containing the root; SS 2. WHILE QUEUE is not empty • Perform depth-first, AND goal is not reached AA 10.4 DD 8.98.9 BUT : DODO remove the first path from the QUEUE ;; • instead of left-to-right create new paths (to all children); 6.96.9 selection, AA 10.4 EE reject the new paths with loops; • FIRST select the child sort new paths (HEURISTIC) ;; with the best heuristic add the new paths to front of QUEUE ;; 6.76.7BB FF 3.03.0 value GG 3. IFIF goal reached THEN success; ELSE failure; IF-UTAMA 19 IF-UTAMA 20 IF-UTAMA 5 2/13/2012 Simple Hill Climbing Algorithm Simple Hill Climbing 1. Evaluate the initial state. If it is also goal state, then return it and • The key difference between Simple Hill climbing quit. Otherwise continue with the initial state as the current state. and Generate-and-test is the use of evaluation 2. Loop until a solution is found or until there are no new function as a way to inject task specific operators left to be applied in the current state: a. Select an operator that has not yet been applied to the current state and knowledge into the control process. apply it to produce a new state • Is on state better than another ? For this algorithm b. Evaluate the new state i. If it is the goal state, then return it and quit. to work, precise definition of better must be ii. If it is not a goal state but it is better than the current state, then make it the current state. provided. iii. If it is not better than the current state, then continue in the loop. IF-UTAMA 21 IF-UTAMA 22 Algorithm: Steepest -Ascent Hill Steepest-Ascent Hill Climbing Climbing • This is a variation of simple hill climbing which 1. Evaluate the initial state. If it is also a goal state, then return it and quit.
Recommended publications
  • NI\SI\ I-J!'.~!.:}',-~)N, Vifm:Nu\ National Aeronautics and Space Administration Langley Research Center Hampton, Virginia 23665
    https://ntrs.nasa.gov/search.jsp?R=19830020606 2020-03-21T01:58:58+00:00Z NASA Technical Memorandum 83216 NASA-TM-8321619830020606 DECISION-MAKING AND PROBLEM SOLVING METHODS IN AUTOMATION TECHNOLOGY W. W. HANKINS) J. E. PENNINGTON) AND L. K. BARKER MAY 1983 : "J' ,. (,lqir; '.I '. .' I_ \ i !- ,( ~, . L!\NGLEY F~I:~~~:r.. r~CH (TN! El~ L1B!(,!\,f(,(, NA~;I\ NI\SI\ I-J!'.~!.:}',-~)N, Vifm:nU\ National Aeronautics and Space Administration Langley Research Center Hampton, Virginia 23665 TABLE OF CONTENTS Page SUMMARY ••••••••••••••••••••••••••••••••• •• 1 INTRODUCTION •• .,... ••••••••••••••••••••••• •• 2 DETECTION AND RECOGNITION •••••••••••••••••••••••• •• 3 T,ypes of Sensors Computer Vision CONSIGHT-1 S,ystem SRI Vision Module Touch and Contact Sensors PLANNING AND SCHEDULING ••••••••••••••••••••••••• •• 7 Operations Research Methods Linear Systems Nonlinear S,ystems Network Models Queueing Theory D,ynamic Programming Simulation Artificial Intelligence (AI) Methods Nets of Action Hierarchies (NOAH) System Monitoring Resource Allocation Robotics LEARNING ••••• ••••••••••••••••••••••••••• •• 13 Expert Systems Learning Concept and Linguistic Constructions Through English Dialogue Natural Language Understanding Robot Learning The Computer as an Intelligent Partner Learning Control THEOREM PROVING ••••••••••••••••••••••••••••• •• 15 Logical Inference Disproof by Counterexample Proof by Contradiction Resolution Principle Heuristic Methods Nonstandard Techniques Mathematical Induction Analogies Question-Answering Systems Man-Machine Systems
    [Show full text]
  • AI-KI-B Heuristic Search
    AI-KI-B Heuristic Search Ute Schmid & Diedrich Wolter Practice: Johannes Rabold Cognitive Systems and Smart Environments Applied Computer Science, University of Bamberg last change: 3. Juni 2019, 10:05 Outline Introduction of heuristic search algorithms, based on foundations of problem spaces and search • Uniformed Systematic Search • Depth-First Search (DFS) • Breadth-First Search (BFS) • Complexity of Blocks-World • Cost-based Optimal Search • Uniform Cost Search • Cost Estimation (Heuristic Function) • Heuristic Search Algorithms • Hill Climbing (Depth-First, Greedy) • Branch and Bound Algorithms (BFS-based) • Best First Search • A* • Designing Heuristic Functions • Problem Types Cost and Cost Estimation • \Real" cost is known for each operator. • Accumulated cost g(n) for a leaf node n on a partially expanded path can be calculated. • For problems where each operator has the same cost or where no information about costs is available, all operator applications have equal cost values. For cost values of 1, accumulated costs g(n) are equal to path-length d. • Sometimes available: Heuristics for estimating the remaining costs to reach the final state. • h^(n): estimated costs to reach a goal state from node n • \bad" heuristics can misguide search! Cost and Cost Estimation cont. Evaluation Function: f^(n) = g(n) + h^(n) Cost and Cost Estimation cont. • \True costs" of an optimal path from an initial state s to a final state: f (s). • For a node n on this path, f can be decomposed in the already performed steps with cost g(n) and the yet to perform steps with true cost h(n). • h^(n) can be an estimation which is greater or smaller than the true costs.
    [Show full text]
  • 2011-2012 ABET Self-Study Questionnaire for Engineering
    ABET SELF-STUDY REPOrt for Computer Engineering July 1, 2012 CONFIDENTIAL The information supplied in this Self-Study Report is for the confidential use of ABET and its authorized agents, and will not be disclosed without authorization of the institution concerned, except for summary data not identifiable to a specific institution. Table of Contents BACKGROUND INFORMATION ................................................................................... 5 A. Contact Information ............................................................................................. 5 B. Program History ................................................................................................... 6 C. Options ................................................................................................................. 7 D. Organizational Structure ...................................................................................... 8 E. Program Delivery Modes ..................................................................................... 8 F. Program Locations ............................................................................................... 9 G. Deficiencies, Weaknesses or Concerns from Previous Evaluation(s) ................. 9 H. Joint Accreditation ............................................................................................... 9 CRITERION 1. STUDENTS ........................................................................................... 10 A. Student Admissions ..........................................................................................
    [Show full text]
  • Search Algorithms ◦ Breadth-First Search (BFS) ◦ Uniform-Cost Search ◦ Depth-First Search (DFS) ◦ Depth-Limited Search ◦ Iterative Deepening  Best-First Search
    9-04-2013 Uninformed (blind) search algorithms ◦ Breadth-First Search (BFS) ◦ Uniform-Cost Search ◦ Depth-First Search (DFS) ◦ Depth-Limited Search ◦ Iterative Deepening Best-First Search HW#1 due today HW#2 due Monday, 9/09/13, in class Continue reading Chapter 3 Formulate — Search — Execute 1. Goal formulation 2. Problem formulation 3. Search algorithm 4. Execution A problem is defined by four items: 1. initial state 2. actions or successor function 3. goal test (explicit or implicit) 4. path cost (∑ c(x,a,y) – sum of step costs) A solution is a sequence of actions leading from the initial state to a goal state Search algorithms have the following basic form: do until terminating condition is met if no more nodes to consider then return fail; select node; {choose a node (leaf) on the tree} if chosen node is a goal then return success; expand node; {generate successors & add to tree} Analysis ◦ b = branching factor ◦ d = depth ◦ m = maximum depth g(n) = the total cost of the path on the search tree from the root node to node n h(n) = the straight line distance from n to G n S A B C G h(n) 5.8 3 2.2 2 0 Uninformed search strategies use only the information available in the problem definition Breadth-first search ◦ Uniform-cost search Depth-first search ◦ Depth-limited search ◦ Iterative deepening search • Expand shallowest unexpanded node • Implementation: – fringe is a FIFO queue, i.e., new successors go at end idea: order the branches under each node so that the “most promising” ones are explored first g(n) is the total cost
    [Show full text]
  • Lecture Notes
    Lecture Notes Ganesh Ramakrishnan August 15, 2007 2 Contents 1 Search and Optimization 3 1.1 Search . 3 1.1.1 Depth First Search . 5 1.1.2 Breadth First Search (BFS) . 6 1.1.3 Hill Climbing . 6 1.1.4 Beam Search . 8 1.2 Optimal Search . 9 1.2.1 Branch and Bound . 10 1.2.2 A∗ Search . 11 1.3 Constraint Satisfaction . 11 1.3.1 Algorithms for map coloring . 13 1.3.2 Resource Scheduling Problem . 15 1 2 CONTENTS Chapter 1 Search and Optimization Consider the following problem: Cab Driver Problem A cab driver needs to find his way in a city from one point (A) to another (B). Some routes are blocked in gray (probably be- cause they are under construction). The task is to find the path(s) from (A) to (B). Figure 1.1 shows an instance of the problem.. Figure 1.2 shows the map of the united states. Suppose you are set to the following task Map coloring problem Color the map such that states that share a boundary are colored differently.. A simple minded approach to solve this problem is to keep trying color combinations, facing dead ends, back tracking, etc. The program could run for a very very long time (estimated to be a lower bound of 1010 years) before it finds a suitable coloring. On the other hand, we could try another approach which will perform the task much faster and which we will discuss subsequently. The second problem is actually isomorphic to the first problem and to prob- lems of resource allocation in general.
    [Show full text]
  • An English-Persian Dictionary of Algorithms and Data Structures
    An EnglishPersian Dictionary of Algorithms and Data Structures a a zarrabibasuacir ghodsisharifedu algorithm B A all pairs shortest path absolute p erformance guarantee b alphab et abstract data typ e alternating path accepting state alternating Turing machine d Ackermans function alternation d Ackermanns function amortized cost acyclic digraph amortized worst case acyclic directed graph ancestor d acyclic graph and adaptive heap sort ANSI b adaptivekdtree antichain adaptive sort antisymmetric addresscalculation sort approximation algorithm adjacencylist representation arc adjacencymatrix representation array array index adjacency list array merging adjacency matrix articulation p oint d adjacent articulation vertex d b admissible vertex assignmentproblem adversary asso ciation list algorithm asso ciative binary function asso ciative array binary GCD algorithm asymptotic b ound binary insertion sort asymptotic lower b ound binary priority queue asymptotic space complexity binary relation binary search asymptotic time complexity binary trie asymptotic upp er b ound c bingo sort asymptotically equal to bipartite graph asymptotically tightbound bipartite matching
    [Show full text]
  • Prathyusha Engineering College Lecture Notes
    PRATHYUSHA ENGINEERING COLLEGE LECTURE NOTES Course code : CS8691 Name of the course : ARTIFICIAL INTELLIGENCE Regulation : 2017 Course faculty : Dr.KAVITHA.V.R PRATHYUSHA ENGINEERING COLLEGE Department of Computer Science and Engineering VI Semester (EVEN 2019-20) CS8691ARTIFICIAL INTELLIGENCE OBJECTIVES: To understand the various characteristics of Intelligent agents To learnthe different search strategies in AI To learn to represent knowledge in solving AI problems To understand the different ways of designing software agents To know about the various applications of AI. UNIT IINTRODUCTION 09 Introduction–Definition -Future of Artificial Intelligence –Characteristics of Intelligent Agents–Typical Intelligent Agents –Problem Solving Approach to Typical AI problems. UNIT II PROBLEM SOLVING METHODS 9 Problem solving Methods -Search Strategies-Uninformed -Informed -Heuristics -Local Search Algorithms and Optimization Problems -Searching with Partial Observations -Constraint Satisfaction Problems –Constraint Propagation -Backtracking Search -Game Playing -Optimal Decisions in Games –Alpha -Beta Pruning - Stochastic Games UNIT IIIKNOWLEDGE REPRESENTATION 9 First Order Predicate Logic –Prolog Programming –Unification –Forward Chaining-Backward Chaining – Resolution –Knowledge Representation -Ontological Engineering-Categories and Objects –Events -Mental Events and Mental Objects -Reasoning Systems for Categories -Reasoning with Default Information UNIT IV SOFTWARE AGENTS 9 Architecture for Intelligent Agents –Agent communication –Negotiation
    [Show full text]
  • Artificial Intelligence a Modern Approach
    Artificial Intelligence A Modern Approach SECOND EDITION Stuart Russell Peter Prentice Hall Series in Artificial Intelligence Artificial Intelligence A Modern Approach Second Edition PRENTICE HALL SERIES IN ARTIFICIAL INTELLIGENCE Stuart Russell and Peter Editors PONCE Computer Vision: A Modern Approach GRAHAM ANSI Common Lisp MARTIN and Processing NEAPOLITAN Learning Bayesian Networks RUSSELL NORVIG Intelligence: A Modern Approach Artificial Intelligence A Modern Approach Second Edition Stuart J. Russell and Peter Norvig Contributing writers: John F. Canny Douglas D. Edwards Jitendra M. Malik Sebastian Education, Upper Saddle River; New Jersey 07458 Library of Congress Data CIP Data on file. Vice President and Editorial Director, ECS: Marcia J. Publisher: Alan R. Apt Associate Editor: Toni Dianne Holm Editorial Assistant: Patrick Lindner Vice President and Director of Production and Manufacturing, ESM: David Riccardi Executive Managing Editor: Vince Assistant Managing Editor: Camille Trentacoste Production Editor: Irwin Zucker Manufacturing Manager: Trudy Pisciotti Manufacturing Buyer: Lisa Director, Creative Services: Paul Creative Director: Carole Art Editor: Greg Art Director: Heather Scott Assistant to Art Director: Geoffrey Cassar Cover Designers: Stuart Russell and Peter Norvig Cover Image Creation: Stuart Russell and Peter Norvig; Tamara Newnam and Van Acker Interior Designer: Stuart Russell and Peter Norvig Marketing Manager: Pamela Shaffer Marketing Assistant: 2003, 1995 Education, Inc. Education, Inc., Upper Saddle New Jersey 07458 All rights reserved. No part of this book may he reproduced, in any form or by any means, without permission in writing from the The author and publisher of this hook have their best efforts in preparing this hook. These efforts include the development, research, and testing of the theories and programs to determine their effectiveness.
    [Show full text]
  • Intelligent Agents Search Algorithms
    Intelligent Agents Search Algorithms Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University last change: July 9, 2015 U. Schmid (CogSys) Intelligent Agents last change: July 9, 2015 1 / 50 Search Algorithms Problem solving, planning (and most other areas of AI) depend on intelligent search Remember: typically state-spaces are much too large to apply standard graph search algorithms (e.g. the Dijkstra algorithm) Search for a (shortest) path from an initial state to a state which fulfills all goals typically relies on a variant of depth-first search where only a small part of states are explored. A good heuristics can reduce search effort dramatically. However, the heuristics must be carefully designed in a way that (1) the (shortest) solution has a chance to be found (completeness) and that (2) the result is indeed an admissible solution (soundness). U. Schmid (CogSys) Intelligent Agents last change: July 9, 2015 2 / 50 Outline Outline Introduction of running example Search Tree Uniformed Systematic Search Depth-First Search (DFS) Breadth-First Search (BFS) Complexity of Blocks-World Cost-based Optimal Search Uniform Cost Search Cost Estimation (Heuristic Function) Heuristic Search Algorithms Hill Climbing (Depth-First, Greedy) Branch and Bound Algorithms (BFS-based) Best First Search A* Designing Heuristic Functions U. Schmid (CogSys) Intelligent Agents last change: July 9, 2015 3 / 50 Repetition: Problem, State Space, Search Tree Running Example In the following: We are not concerned how a single state transformation is calculated (see state-space planning) We represent problems via graphs with abstract states (nodes) and abstract actions (arcs). If we label arcs with numbers, the numbers represent costs of the different actions (time, resources).
    [Show full text]
  • 6.034 Final Examination December 18,2006 ----- \ Name
    6.034 Final Examination December 18,2006 ----- \ Name : - -- - - - - - - . - Quiz number Maximum Score Grader There are 30 pages in this final, including this one and a tear-off sheet provided at the end with duplicate drawings and data. You must do Quiz 5. All others are optional. Quiz 1 Problem 1: Search (75 points) This problem has a certain resemblance to a problem on Quiz I, but it is not the same. Several 6.034 students are stranded in a strange city at the node marked S. Desperate for a meal, they want to get to Hose's food truck located on the map at the node marked T. All the streets are one-way streets. Each link between node pairs is 1 unit long. Part A (10 points) Amy calculates how many paths terminating at nodes T or D she would produce if she used the British Museum Algorithm. As expected with the British Museum Algorithm, she does not use an extended list. Her result is: Part B (10points) David decides to use plain branch and bound, without an extended list and with no estimate of remaining distance, to compute the shortest path between S and T. If there is ever a choice in which path to extend, he picks the path closest to the top of the page. Before he can be sure he has the shortest path, he produces n paths starting at S and ending at a node marked T or D and adds those paths to the queue. In this case, n is Part C (15 points) James thinks it would be better to use an estimate of remaining distance with the basic branch and bound procedure.
    [Show full text]
  • Search Notes
    9/22/11 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.034 Artificial Intelligence Fall, 2011 Recitation 2, Thursday September 22 Search Me! Prof. Bob Berwick 0. Notation, algorithm, terminology graph is a data structure containing node-to-node connectivity information start is the starting node goal is the target node Here is a simple generic search algorithm: function search(graph, start, goal) 0. Initialize agenda = [ [start] ] # a list of paths extended_list = [ ] # a list of nodes while agenda is not empty: 1. path = agenda.pop(0) # remove first element from agenda 2. if path is-a-path-to-goal then return path # we’ve reached the goal 3. otherwise extend the current path if last node in this path is not in the extended_list: 3a. add the last node of the current path to the extended_list 3b. for each node connected to this last node # look-up using graph 3c. make a new path # don’t add paths with loops! 4. add new paths from step 3c to agenda and reorganize agenda end while return nil path # failure Notes • Search returns either a successful path from start to goal or a nil path indicating a failure to find such a path. • Agenda keeps track of all the paths under consideration, and the way it is maintained is the key to the difference between most of the search algorithms. • Loops in paths: Thou shall not create or consider paths with cycles in step 3. • Exiting the search: Non-optimal searches may actually exit when they find or add a path with a goal node to the agenda (at step 3).
    [Show full text]
  • Heuristics and Generate and Test
    HEURISTICS AND GENERATE AND TEST Dr. Krishnendu Guha Assistant Professor (On Contract) National Institute of Technology (NIT), Jamshedpur Email: [email protected] • A heuristic is a method that improves the efficiency of the search HEURISTICS process • These are like tour guides • They are good to the level that they may neglect the points in general interesting directions • They are bad to the level that they may neglect points of interest to particular individuals • Some heuristics help in the search process without sacrificing any claims to entirety that the process might previously had • Others may occasionally cause an excellent path to be overlooked • By sacrificing entirety it increases efficiency • Heuristics may not find the best solution every time but guarantee that they find a good solution in a reasonable time • These are particularly useful in solving tough and complex problems, solutions of which would require infinite time, i.e. far longer than a lifetime for the problems which are not solved in any other way HEURISTIC SEARCH TECHNIQUES • Many traditional search algorithms are used in AI applications • For complex problems, the traditional algorithms are unable to find the solutions within some practical time and space limits • Consequently, many special techniques are developed, using heuristic functions. • The algorithms that use heuristic functions are called heuristic algorithms • Heuristic algorithms are not really intelligent; they appear to be intelligent because they achieve better performance • • Heuristic algorithms are more efficient because they take advantage of feedback from the data to direct the search path. • Uninformed search algorithms or Brute-force algorithms, search through the search space all possible candidates for the solution checking whether each candidate satisfies the problem’s statement.
    [Show full text]