Computer Science: An Overview (12th Edition)
12th Edition
ISBN: 9780133760064
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 11.3, Problem 7QE
Program Plan Intro
Heuristic system:
The heuristic system considers all the immediate possible conditions that may lead to a solution to the problem. The system proceeds in the same manner until all the possible conditions are achieved. The heuristic system may require a large amount of work, but ultimately it approaches towards a solution. The solution is one of the conditions achieved at the last. The conditions achieved at last may be in a large number. It guarantees to have a solution among many conditions achieved in the end.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
2.
An undirected graph G can be partitioned into connected components, where two nodes are
in the same connected component if and only if there is a path connecting them. Design and analyze an
efficient algorithm that computes the connected components of a graph G given in adjacency list format.
Be sure to give a correctness argument and detailed time analysis. You can use algorithms from class as
a sub-procedure, but be sure to use the claims proven about them carefully. A good algorithm has time
approximately 0(n + m) where the graph has n nodes and m edges.
The clique problem is finding cliques in a diagram. A clique is a set of vertices that are adjacent to each other. The 4-clique is a set of four knots all connected. So, in this example of the 4-clique problem, we have a graph with 7 vertices. A brute force algorithm searched all possible combinations of four vertices and found a set that formed a clique. If you want to understand more about it, the problem (and if possible read on). Note that the clique problem is NP-complete, so deterministic search is not practical for large graph sizes. This makes it an ideal candidate for evolutionary exploration. In this problem, we have to assume that we are given the problem of implementing the 4-clique problem as an evolutionary algorithm for an arbitrary graph with an arbitrary number of vertices (an n-vertex graph). If 4 cliques are found, the algorithm succeeds.
1. Provide an algebraic expression, in terms of n, for the size of the phenotypic search space (the number of possible…
Question 2. (a) Give the definition of a tree.
Definition. A tree is a graph that …..
(b) Give a brief description in plain English of an algorithm that on input a graph G (represented using the
adjacency-list approach) determines if G is a tree or not. What is the running time of your algorithm? (Note: if you
are using an algorithm that was discussed in class you don't have to describe it, just say that you are using it, and
indicate its role. Note that your algorithm needs to check 2 properties that make a graph to be a tree.)
Chapter 11 Solutions
Computer Science: An Overview (12th Edition)
Ch. 11.1 - Prob. 1QECh. 11.1 - Prob. 2QECh. 11.1 - Prob. 3QECh. 11.1 - Prob. 4QECh. 11.1 - Prob. 5QECh. 11.2 - Prob. 1QECh. 11.2 - Prob. 2QECh. 11.2 - Prob. 3QECh. 11.2 - Prob. 4QECh. 11.2 - Identify the ambiguities involved in translating...
Ch. 11.2 - Prob. 6QECh. 11.2 - Prob. 7QECh. 11.3 - Prob. 1QECh. 11.3 - Prob. 2QECh. 11.3 - Prob. 3QECh. 11.3 - Prob. 4QECh. 11.3 - Prob. 5QECh. 11.3 - Prob. 6QECh. 11.3 - Prob. 7QECh. 11.3 - Prob. 8QECh. 11.3 - Prob. 9QECh. 11.4 - Prob. 1QECh. 11.4 - Prob. 2QECh. 11.4 - Prob. 3QECh. 11.4 - Prob. 4QECh. 11.4 - Prob. 5QECh. 11.5 - Prob. 1QECh. 11.5 - Prob. 2QECh. 11.5 - Prob. 3QECh. 11.5 - Prob. 4QECh. 11.6 - Prob. 1QECh. 11.6 - Prob. 2QECh. 11.6 - Prob. 3QECh. 11.7 - Prob. 1QECh. 11.7 - Prob. 2QECh. 11.7 - Prob. 3QECh. 11 - Prob. 1CRPCh. 11 - Prob. 2CRPCh. 11 - Identify each of the following responses as being...Ch. 11 - Prob. 4CRPCh. 11 - Prob. 5CRPCh. 11 - Prob. 6CRPCh. 11 - Which of the following activities do you expect to...Ch. 11 - Prob. 8CRPCh. 11 - Prob. 9CRPCh. 11 - Prob. 10CRPCh. 11 - Prob. 11CRPCh. 11 - Prob. 12CRPCh. 11 - Prob. 13CRPCh. 11 - Prob. 14CRPCh. 11 - Prob. 15CRPCh. 11 - Prob. 16CRPCh. 11 - Prob. 17CRPCh. 11 - Prob. 18CRPCh. 11 - Give an example in which the closed-world...Ch. 11 - Prob. 20CRPCh. 11 - Prob. 21CRPCh. 11 - Prob. 22CRPCh. 11 - Prob. 23CRPCh. 11 - Prob. 24CRPCh. 11 - Prob. 25CRPCh. 11 - Prob. 26CRPCh. 11 - Prob. 27CRPCh. 11 - Prob. 28CRPCh. 11 - Prob. 29CRPCh. 11 - Prob. 30CRPCh. 11 - Prob. 31CRPCh. 11 - Prob. 32CRPCh. 11 - Prob. 33CRPCh. 11 - What heuristic do you use when searching for a...Ch. 11 - Prob. 35CRPCh. 11 - Prob. 36CRPCh. 11 - Prob. 37CRPCh. 11 - Prob. 38CRPCh. 11 - Suppose your job is to supervise the loading of...Ch. 11 - Prob. 40CRPCh. 11 - Prob. 41CRPCh. 11 - Prob. 42CRPCh. 11 - Prob. 43CRPCh. 11 - Prob. 44CRPCh. 11 - Prob. 45CRPCh. 11 - Prob. 46CRPCh. 11 - Prob. 47CRPCh. 11 - Prob. 48CRPCh. 11 - Draw a diagram similar to Figure 11.5 representing...Ch. 11 - Prob. 50CRPCh. 11 - Prob. 51CRPCh. 11 - Prob. 52CRPCh. 11 - Prob. 53CRPCh. 11 - Prob. 54CRPCh. 11 - Prob. 55CRPCh. 11 - Prob. 56CRPCh. 11 - Prob. 57CRPCh. 11 - Prob. 1SICh. 11 - Prob. 2SICh. 11 - Prob. 3SICh. 11 - Prob. 4SICh. 11 - Prob. 5SICh. 11 - Prob. 6SICh. 11 - Prob. 7SICh. 11 - Prob. 8SICh. 11 - Prob. 9SICh. 11 - Prob. 10SICh. 11 - Prob. 11SICh. 11 - Prob. 12SICh. 11 - A GPS in an automobile provides a friendly voice...Ch. 11 - Prob. 14SI
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- In hill-climbing algorithms there are steps that make lots of progress and steps that make very little progress. For example, the first iteration on the input given might find a path through the augmentation graph through which a flow of 30 can be added. It might, however, find the path through which only a flow of 2 can be added. How bad might the running time be when the computation is unlucky enough to always take the worst legal step allowed by the algorithm? Start by taking the step that increases the flow by 2 for the input. Then continue to take the worst possible step. You could draw out each and every step, but it is better to use this opportunity to use loop invariants. What does the flow look like after i iterations? Repeat this process on the same graph except that the four edges forming the square now have capacities 1,000,000,000,000,000 and the crossover edge has capacity 1. (Also move t to c or give that last edge a large capacity.)1. What is the worst case number of…arrow_forwardReview the 8-puzzle problem. Consider that the initial state is 1 3 48 27 6 5and the goal state is1 2 38 47 6 5Apply the breath-first-search method to obtain the path from the initial state to the goal state. Youneed to show the corresponding search tree. As soon as you find the goal state, you can stop the searchprocess.arrow_forward3. Kleinberg, Jon. Algorithm Design (p. 519, q. 28) Consider this version of the Independent Set Problem. You are given an undirected graph G and an integer k. We will call a set of nodes I "strongly independent" if, for any two nodes v, u € I, the edge (v, u) is not present in G, and neither is there a path of two edges from u to v. That is, there is no node w such that both (v, w) and (u, w) are present. The Strongly Independent Set problem is to decide whether G has a strongly independent set of size at least k. Show that the Strongly Independent Set Problem is NP-Complete.arrow_forward
- Do some outside research on depth-first traversal as it relates to traversing graphs. Then answer the following questions: a. Suppose you have an arbitrary connected graph G, shown in the image below. Use the vertex A as your starting point. Write out the order in which the algorithm could traverse the graph with a depth-first search, and explain your reasoning (there are multiple correct answers, hence the need for an explanation). b. Use a proof by induction to prove that when a depth-first traversal is performed, every vertex v in your graph G will have been visited at least one time. B D H E A G с I FLarrow_forwardGiven a graph that is a tree (connected and acyclic). (I) Pick any vertex v.(II) Compute the shortest path from v to every other vertex. Let w be the vertex with the largest shortest path distance.(III) Compute the shortest path from w to every other vertex. Let x be the vertex with the largest shortest path distance. Consider the path p from w to x. Which of the following are truea. p is the longest path in the graphb. p is the shortest path in the graphc. p can be calculated in time linear in the number of edges/verticesarrow_forwardStarting with the tic-tac-toe program of Figure 12.4, draw a directed acyclic graph in which every clause is a node and an arc from A to B indicates that it is important, either for correctness or efficiency, that A come before B in the program. (Do not draw any other arcs.) Any topological sort of your graph should constitute an equally efficient version of the program. (Is the existing program one of them?)arrow_forward
- a) Given a depth-first search tree T, the set of edges in T are referred to as "tree edges" while those not in T are referred to as "back edges". Modify the implementation of the Depth-First Search algorithm to print out the set of tree edges and the set of back edges for the following graph. 1(0 1 1 0 0 1 0) 210 100 0 0 31 10 10 1 4 0 0 1 0 0 0 0 50 0 0 00 1 1 1 0 1 70 0 1 0 1 1 0 6 1 0 0 0arrow_forwardWrite a program (WAP) to create an undirected graph using adjacency matrix representation.Number of nodes and edges should be taken from the user. After creating the graph, performfollowing operations: (6 Marks)(i) Search a node. Take the node number from the user. If the node is found then print its associatededges.(ii) Insert a node in the graph.(iii) Insert an edge in the graph. Take the node numbers from the user between which the edge is tobe inserted.(iv) Delete a node from the graph. Take the node number to be deleted from the user.(v) Apply DFS on the graph and print the graph traversal.(vi) Apply BFS on the graph and print the graph traversal.arrow_forwardThe graph is another structure that can be used to solve the maze problem. Every start point, dead end, goal, and decision point can be represented by node. The arcsbetween the nodes represent one possible path through the maze. A graph maze is shown in Figure Q4.1. Start A D H K Goal Figure Q4.1: Graph Maze Describe the graph as in Figure Q4.1, using the formal graph notation of V i. and E.V: set of vertices E: set of edges connecting the vertices in Varrow_forward
- Given a graph that is a tree (connected and acyclic). (1) Pick any vertex v. (II) Compute the shortest path from v to every other vertex. Let w be the vertex with the largest shortest path distance. (III) Compute the shortest path from w to every other vertex. Let x be the vertex with the largest shortest path distance. Consider the path p from w to x. Which of the following are true a. p is the longest path in the graph b. p is the shortest path in the graph c. p can be calculated in time linear in the number of edges/vertices a,c a,b a,b,c b.carrow_forwardProve part 2 of proposition 10.6.1, If T1 and T2 are spanning trees for a graph G, then T1 and T2 have the same size. Present your proof in 2-column statement/justification format, justifying all statements, and explicitly documenting the start and stop of the proof as shown in lectures. Use the method ‘direct proof.' Use basic characteristics of graphs and trees to reach the conclusion.arrow_forwardCorrect answer will be upvoted else Multiple Downvoted. Computer science. Alice and Bob are playing a game. They have a tree comprising of n vertices. At first, Bob has k chips, the I-th chip is situated in the vertex computer based intelligence (every one of these vertices are extraordinary). Prior to the game beginnings, Alice will put a chip into one of the vertices of the tree. The game comprises of turns. Each turn, the accompanying occasions occur (consecutively, precisely in the accompanying request): Alice either moves her chip to a neighboring vertex or doesn't move it; for each Bob's chip, he either moves it to a neighboring vertex or doesn't move it. Note that this decision is done freely for each chip. The game closures when Alice's chip has a similar vertex with one (or numerous) of Bob's chips. Note that Bob's chips might have a similar vertex, despite the fact that they are in various vertices toward the start of the game. Alice needs to augment the number…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education