Uninformed Search Strategies

Similar documents
Solving Problems by Searching chap3 1. Problem-Solving Agents

Princess Nora University Faculty of Computer & Information Systems ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department

Uninformed search strategies

Artificial Intelligence. Uninformed Search Strategies

Problem Solving as Search - I

Uninformed search methods

Real World Search Problems. CS 331: Artificial Intelligence Uninformed Search. Simpler Search Problems. Example: Oregon. Search Problem Formulation

Uninformed search methods II.

Uninformed search methods

Uninformed Search (Ch )

Problem Solving Agents

CSE 3401: Intro to AI & LP Uninformed Search II

Search I. Tuomas Sandholm Carnegie Mellon University Computer Science Department. [Read Russell & Norvig Chapter 3]

COMP9414: Artificial Intelligence Uninformed Search

Better Search Improved Uninformed Search CIS 32

Uninformed Search (Ch )

Uninformed search methods II.

Representation. Representation. Representation. Representation. 8 puzzle.

CENG 466 Artificial Intelligence. Lecture 4 Solving Problems by Searching (II)

CSE 3402: Intro to Artificial Intelligence Uninformed Search II

SEARCH SEARCH TREE. Node: State in state tree. Root node: Top of state tree

SEARCH TREE. Generating the children of a node

Introduction. AI and Searching. Simple Example. Simple Example. Now a Bit Harder. From Hammersmith to King s Cross

CSC384: Introduction to Artificial Intelligence. Search

COMP219: Artificial Intelligence. Lecture 8: Combining Search Strategies and Speeding Up

Overview. Depth Limited Search. Depth Limited Search. COMP219: Artificial Intelligence. Lecture 8: Combining Search Strategies and Speeding Up

CS 4649/7649 Robot Intelligence: Planning

/435 Artificial Intelligence Fall 2015

Depth-bounded Discrepancy Search

G53CLP Constraint Logic Programming

Decision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag

Transposition Table, History Heuristic, and other Search Enhancements

CSC242: Intro to AI. Lecture 21

6.034 Artificial Intelligence

Spider Search: An Efficient and Non-Frontier-Based Real-Time Search Algorithm

Decision Trees. an Introduction

SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY :: PUTTUR (AUTONOMOUS) Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

Application of Bayesian Networks to Shopping Assistance

Robust Task Execution: Procedural and Model-based. Outline. Desiderata: Robust Task-level Execution

Evacuation Time Minimization Model using Traffic Simulation and GIS Technology

Planning and Acting in Partially Observable Stochastic Domains

CS 4649/7649 Robot Intelligence: Planning

Provably Secure Camouflaging Strategy for IC Protection

CS 4649/7649 Robot Intelligence: Planning

If you need to reinstall FastBreak Pro you will need to do a complete reinstallation and then install the update.

Advanced Search Hill climbing

Aryeh Rappaport Avinoam Meir. Schedule automation

CS472 Foundations of Artificial Intelligence. Final Exam December 19, :30pm

A new Decomposition Algorithm for Multistage Stochastic Programs with Endogenous Uncertainties

Optimization and Search. Jim Tørresen Optimization and Search

Application of Dijkstra s Algorithm in the Evacuation System Utilizing Exit Signs

CS Lecture 5. Vidroha debroy. Material adapted courtesy of Prof. Xiangnan Kong and Prof. Carolina Ruiz at Worcester Polytechnic Institute

Balanced Binary Trees

Extensive Games with Perfect Information

Urban OR: Quiz 2 Solutions (2003) ( 1 ρ 1 )( 1 ρ 1 ρ 2 ) ( 1 12 )( ) σ S ] 24 [ 2 = 60, 2 2 ] ( 2 ) 3

Software Reliability 1

Running the Table: An AI for Computer Billiards

Computational Models: Class 6

(d) Give a formal definition of a strategy in an extensive form game.

Building an NFL performance metric

Intelligent Decision Making Framework for Ship Collision Avoidance based on COLREGs

Applying Bi-objective Shortest Path Methods to Model Cycle Route-choice

Algorithms and Data Structures

DECISION-MAKING ON IMPLEMENTATION OF IPO UNDER TOPOLOGICAL UNCERTAINTY

WildCat RF unit (0.5W), full 32-byte transmissions with built-in checksum

104: USING "STREAM DOWNLOADER" IN "REPLAY MEDIA CATCHER" FOR "MEDIA CAPTURE"

CMSC131. Introduction to Computational Thinking. (with links to some external Scratch exercises) How do you accomplish a task?

i) Linear programming

Game Theory (MBA 217) Final Paper. Chow Heavy Industries Ty Chow Kenny Miller Simiso Nzima Scott Winder

Introduction to Algorithms

Decompression Method For Massive Compressed Files In Mobile Rich Media Applications

Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up Warm up

Optimizing Cyclist Parking in a Closed System

PRELIMINARY DESIGN STUDY OF LUNAR HOUSING CONFIGURATIONS

Torpedoes on Target: EAs on Track

4. Please Do Break the Crystal

USGA RULES SEMINAR. ~ obstructions on the course that interfere with your stance or swing; ~ water hazards and the options available to you;

Community Bicycle Planning

CMPUT680 - Winter 2001

Traffic Academy: IJS & IMS FAQ/RULES OF THUMB

The Evolution of Transport Planning

A SEMI-PRESSURE-DRIVEN APPROACH TO RELIABILITY ASSESSMENT OF WATER DISTRIBUTION NETWORKS

Materials Selection and Design. Kene Mbanisi and Wole Soboyejo Worcester Polytechnic Institute Worcester, MA 01609

Lecture 5. Optimisation. Regularisation

Incremental ARA*: An Anytime Incremental Search Algorithm For Moving Target Search. University of Southern California Singapore Management University

Agent Based Urban Models The Notting Hill Carnival Model

Pedestrian Dynamics: Models of Pedestrian Behaviour

Scarborough Spring 2013 Math Exam I 1. "On my honor, as an Aggie, I have neither given nor received unauthorized aid on this academic work.

Machine Learning an American Pastime

SIMULATION OF ENTRAPMENTS IN LCM PROCESSES

EE582 Physical Design Automation of VLSI Circuits and Systems

Author s Name Name of the Paper Session. Positioning Committee. Marine Technology Society. DYNAMIC POSITIONING CONFERENCE September 18-19, 2001

Analysis of the Restyled Signature

Three New Methods to Find Initial Basic Feasible. Solution of Transportation Problems

Neural Nets Using Backpropagation. Chris Marriott Ryan Shirley CJ Baker Thomas Tannahill

Tokyo: Simulating Hyperpath-Based Vehicle Navigations and its Impact on Travel Time Reliability

COMPRESSED AIR DISTRIBUTION SYSTEMS

Standard League Robot Soccer EV3 Compass Training Curriculum Brian Thomas

Percymon: A Pokemon Showdown Artifical Intelligence

CONFORMATION RECORDING OF DAIRY CATTLE

Transcription:

Uninformed Search Strategies Instructor: Dr. Wei Ding Fall 2010 1 Uninformed Search Strategies Also called blind search. Have no additional information about states beyond that provided in the problem definition All can do is to generate successors and distinguish a goal state from a nongoal state 5 uninformed search strategies: breadth-first, uniform-cost, depth-first, depth-limited, iterative deepening 2

Breadth-First Search Expand shallowest unexpanded node Implementation: Fringe is a FIFO queue. E.g., g, new successors go at end. 3 Properties of Breadth-First Search Complete? Yes if b is finite, b: maximum branching factor (maximum number of successors) of the search tree. Time? 1+b+b 2 +b 3 + +b d + b(b d -1) = O(b d+1 ) Suppose the solution is at depth d. In the worst case, we would expand all but the last node at level d, since the goal itself is not expanded, generating b d+1 b nodes at level d+1 Space? O(b d+1 ) (keeps every node in memory) Optimal? Yes if cost =1 per step Space is the bigger problem (more than time). 4

Why space is the bigger problem? Depth Nodes Time Memory 2 1100.11 seconds 1 megabyte 4 111,100 11 seconds 106 megabyte 6 10 7 19 seconds 10 gigabytes 8 10 9 31 hours 1 terabytes 10 10 11 129 days 101 terabytes 12 10 13 35 years 10 petabytes 14 10 15 3,523 years 1 exabyte Assume branch factor b=10; 10,000 nodes/second; 1000 bytes / note. 5 Uniform-cost search Expand least-cost unexpanded node If all step costs are equal, this is identical to breadth-first search Implementation: Fringe = queue ordered by path cost 6

Depth-first search Expand deepest unexpanded node Implementation: Fringe i = LIFO queue, e.g., put successors at front 7 Example: Depth-first search 8

Properties of depth-first search Complete? No: fails in infinite-depth spaces, spaces with loops Modify to avoid repeated states along path Complete in finite spaces Time? O(b m ). m: maximum depth of the state space. Terrible if m is much larger than d. Space? Requires storage of only bm+1 nodes, so O(bm), linear space! Optimal? No 9 Properties of depth-first search Very modest memory requirements Store only a single path from the root to a leaf node Once a node has been expanded, it can be removed from memory as soon as all its descendants have been fully explored. It can make a wrong choice and get stuck going down a very long (or even infinite) path when a different choice would lead to a solution near the root of the search tree. 10

Depth-limited search = depth-first search with depth limit l. Nodes at depth l are treated as if they have no successors. Introduces an additional source of incompleteness if we choose l<d d, that is, the shallowest goal is beyond the depth limit. 11 Iterative deepening search Combination with depth-first search. Gradually increasing the limit first 0, then 1, then 2, and so on until a goal is found. 12

Iterative deepening search l =0 13 Iterative deepening search l =1 14

Iterative deepening search l =2 15 Iterative deepening search l =3 16

Properties of iterative depth-first search Complete? Yes Time? O(b d ) Space? O(bd) Why not O(bm)? Optimal? Yes, if step cost=1 17 Avoiding repeated states Failure to detect repeated states can turn a linear problem into an exponential one! 18

Tradeoff between space and time Algorithms that forget their history are doomed to repeat it. Closed list: stores every expanded node. 19 Summary Before an agent can start searching for solutions, it must formulate a goal and then use the goal to formulate a problem. A problem consists of four parts: the initial state, a set of actions, a goal test function, and a path cost function. The environment of the problem is represented by a state space. A path through the state space from the initial state to a goal sate is a solution.. 20

Summary Search algorithms are judged on the basis of completeness, optimality, time complexity, and space complexity. Complexity depends on b, the branching factor in the state space, and d, the depth of the shallowest solution. 21 Summary Breadth-first search selects the shallowest expanded node in the search tree for expansion. Complete, optimal for unit step costs, time and space complexity of O(b d+1 ). The space complexity makes it impractical in most cases. Depth-first search selects the deepest unexpanded node in the search tree for expansion. Neither complete nor optimal, time complexity of O(b m ) and space complexity of O(bm), where m is the maximum depth of any path in the state space. Iterative deepening depth-first search calls depth-limited search with increasing limits until a goal is found. Complete, optimal for unit step cost, time complexity of O(b d ) and space complexity of O(bd). 22

Five Search Strategies b: maximum branching factor (maximum number of successors) of the search tree d: depth of the least-cost solution m: maximum depth of the state space (may be ) ) l: depth limit 23