Artificial Intelligence: A Modern Approach
3rd Edition
ISBN: 9780136042594
Author: Stuart Russell, Peter Norvig
Publisher: Prentice Hall
expand_more
expand_more
format_list_bulleted
Question
Chapter 3, Problem 13E
Program Plan Intro
Graph search algorithms:
- The graph search algorithms are used to find a particular node of a graph easily by traversing through its nodes.
- There are two type of graph searching algorithms are available. That are, depth-first search
algorithm and breadth first search algorithm. - The depth-first search has a basic level which is uniformed search where, the algorithm searches in a path until it reaches the end of the graph. After the reaching the end, the search starts at the end and backtracks to the start node and tries a different path.
- The breadth-first search algorithms perform searches by exploring one layer of graph at a time. Here the search starts with one level away from the start node, followed by depth level two, followed by depth level three and so on until the entire graph is traversed.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
3. You are given a rectangular grid, where each cell corresponds to a land or sea area. If two
cells of land are adjacent to each other vertically, horizontally, or diagonally on the
you can walk from one to the other. Two land areas belong to the same island if and only if
map,
then
there is a path from one to the other.
Describe a graph algorithm that returns the number of islands in the map and analyze runtime
in terms of the number of cells n.
5. Icosian Game A century after Euler's discovery (see Problem 4), another
famous puzzle-this one invented by the renowned Irish mathematician Sir
William Hamilton (1805–1865)-was presented to the world under the name
of the Icosian Game. The game's board was a circular wooden board on which
the following graph was carved:
Find a Hamiltonian circuit-a path that visits all the graph's vertices exactly
once before returning to the starting vertex-for this graph.
The Graph Data Structure is made up of nodes and edges. (A Tree Data Structure is a special kind of a
Graph Data Structure). A Graph may be represented by an Adjacency Matrix or an Adjacency List. Through
this exercise, you should be able to have a better grasp the Adjacency Matrix concept. You are expected to
read about the Adjacency Matrix concept as well as the Adjacency List concept.
Suppose the vertices A, B, C, D, E, F, G and H of a Graph are mapped to row and column
indices(0,1,2,3,4,5,6,and 7) of a matrix (i.e. 2-dimensional array) as shown in the following table.
Vertex of Graph
Index in the 2-D Array Adjacency Matrix
Representation of Graph
A
B
2
F
6.
H
7
Suppose further, that the following is an Adjacency Matrix representing the Graph.
3
4
5.
6.
7
0.
1
1
1
1
01
1
01
1.
3
14
1
1
1
6.
1
Exercise:
Show/Draw the Graph that is represented by the above Adjacency matrix. Upload the document that contains
your result. (Filename: AdjacencyMatrixExercise.pdf)
Notes:
-The nodes of the…
Chapter 3 Solutions
Artificial Intelligence: A Modern Approach
Ch. 3 - Explain why problem formulation must follow goal...Ch. 3 - Prob. 2ECh. 3 - Prob. 3ECh. 3 - Prob. 4ECh. 3 - Prob. 5ECh. 3 - Prob. 6ECh. 3 - Prob. 8ECh. 3 - Prob. 9ECh. 3 - Prob. 10ECh. 3 - Prob. 11E
Ch. 3 - Prob. 12ECh. 3 - Prob. 13ECh. 3 - Prob. 14ECh. 3 - Prob. 15ECh. 3 - Prob. 16ECh. 3 - Prob. 17ECh. 3 - Prob. 18ECh. 3 - Prob. 20ECh. 3 - Prob. 21ECh. 3 - Prob. 22ECh. 3 - Trace the operation of A search applied to the...Ch. 3 - Prob. 24ECh. 3 - Prob. 25ECh. 3 - Prob. 26ECh. 3 - Prob. 27ECh. 3 - Prob. 28ECh. 3 - Prob. 29ECh. 3 - Prob. 31ECh. 3 - Prob. 32E
Knowledge Booster
Similar questions
- In graph theory, graph coloring is a special case of graph labeling; it is an assignment of labels traditionally called "colors" to elements of a graph subject to certain constraints. In its simplest form, it is a way of coloring the vertices of a graph such that no two adjacent vertices share the same color; this is called a vertex coloring. The chromatic number of a graph is the least mumber of colors required to do a coloring of a graph. Example Here in this graph the chromatic number is 3 since we used 3 colors The degree of a vertex v in a graph (without loops) is the number of edges at v. If there are loops at v each loop contributes 2 to the valence of v. A graph is connected if for any pair of vertices u and v one can get from u to v by moving along the edges of the graph. Such routes that move along edges are known by different names: edge progressions, paths, simple paths, walks, trails, circuits, cycles, etc. a. Write down the degree of the 16 vertices in the graph below: 14…arrow_forwardWrite a program (WAP) to create an undirected graph using adjacency matrix representation.Number of nodes and edges should be taken from the user. After creating the graph, performfollowing operations: (6 Marks)(i) Search a node. Take the node number from the user. If the node is found then print its associatededges.(ii) Insert a node in the graph.(iii) Insert an edge in the graph. Take the node numbers from the user between which the edge is tobe inserted.(iv) Delete a node from the graph. Take the node number to be deleted from the user.(v) Apply DFS on the graph and print the graph traversal.(vi) Apply BFS on the graph and print the graph traversal.arrow_forwardFor each of the following statements, decide whether it is true or false. If it is true, include a (short, but clear) argument why it is true, and if it is false, include a concrete graph which shows that the claim is false.a) There is a tree which contains exactly one leaf. b) A graph can be colored with two colors if and only if it is bipartite. c) A graph on n ≥ 2 vertices with at most n − 2 edges is always acyclic.arrow_forward
- 1. Write a program (WAP) to create an undirected graph using adjacency matrix representation.Number of nodes and edges should be taken from the user. After creating the graph, performfollowing operations: (i) Search a node. Take the node number from the user. If the node is found then print its associatededges.(ii) Insert a node in the graph.(iii) Insert an edge in the graph. Take the node numbers from the user between which the edge is tobe inserted.(iv) Delete a node from the graph. Take the node number to be deleted from the user.(v) Apply DFS on the graph and print the graph traversal.(vi) Apply BFS on the graph and print the graph traversal.2. Solve the above problem using adjacency list representation.arrow_forward2. Use the following description of an undirected graph and draw the graph: v(Graph1) = { A, B, C, D} E(Graph1) = { (A,B), (A,D), (B,C), (B,D) }arrow_forwardWrite a program (WAP) to create an undirected graph using adjacency matrix representation.Number of nodes and edges should be taken from the user. After creating the graph, performfollowing operations: (i) Search a node. Take the node number from the user. If the node is found then print its associatededges.(ii) Insert a node in the graph.(iii) Insert an edge in the graph. Take the node numbers from the user between which the edge is tobe inserted.(iv) Delete a node from the graph. Take the node number to be deleted from the user.(v) Apply DFS on the graph and print the graph traversal.(vi) Apply BFS on the graph and print the graph traversal.Solve the above problem using adjacency list representation.arrow_forward
- Please solve the following using Java. Please also provide some explanations because I am new to Graph Traversal. Canadian Computing Competition: 2010 Stage 1, Junior #5 Below is an 8×88×8 chessboard on which we will designate square locations using the ordered pairs as indicated. For example, notice that piece AA is at position (2,2)(2,2) and piece BB is at position (4,3)(4,3). 8 7 6 5 4 3 B 2 A 1 1 2 3 4 5 6 7 8 A knight is a special game piece that can leap over other pieces, moving in the "L" pattern. Specifically, in the diagram below, KK represents the knight's starting position and the numbers 1 through 8 represent possible places the knight may move to. 8 7 6 8 1 5 7 2 4 Knight 3 6 3 2 5 4 1 1 2 3 4 5 6…arrow_forwardComputer Science ASAP PLS In this assignment, you should input a single graph. Then run your DFS or BFS, MST, and Dijkstra's algorithm for the input graph. This input graph can be created by reading from a file or using keyboard to input.arrow_forwardUndirected graph is given with the list of edges. Build an adjacency matrix. Print the number of ones in adjacency matrix. Graph can contain multiple edges and loops. Input First line contains number of vertices n. Each of the next line contains one edge. Read the edges till the end of file. Output Build an adjacency matrix. Print the number of ones in adjacency matrix. Sample input 3 1 2 23 22 32 Sample output 5arrow_forward
- Path Search in A Maze A two dimensional array of red and green entries represents a maze. Green entries are passable and red entries are blocked (like a wall). Two special green entries en and ex denote the entrance and exit of the maze. Abstract the problem as a graph.arrow_forward*Discrete Math In the graph above, let ε = {2, 3}, Let G−ε be the graph that is obtained from G by deleting the edge {2,3}. Let G∗ be the graph that is obtain from G − ε by merging 2 and 3 into a single vertex w. (As in the notes, v is adjacent to w in the new if and only if either {2,v} or {3,v is an edge of G.) (a) Draw G − ε and calculate its chromatic polynomial. (b) Give an example of a vertex coloring that is proper for G − ε, but not for G. (c) Explain, in own words, why no coloring can be proper for G but not proper for G − ε. (d) Draw G∗ and calculate its chromatic polynomial. (e) Verify that, for this example,PG(k) = PG−ε(k) − PG∗ (k).arrow_forwardIn graph theory, graph coloring is a special case of graph labeling; it is an assignment of labels traditionally called "colors" to elements of a graph subject to certain constraints. in its simplest form, it is a way of coloring the vertices of a graph such that no two adjacent vertices share the same color; this is called a vertex coloring.", Wikipedia a) Apply your algorithm in the graph below. What is the accuracy ratio? b) Show that the performance ratio of your algorithm can go unbounded above or never at all.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education