Lecture 08 uninformed search techniques
-
Upload
hema-kashyap -
Category
Engineering
-
view
29 -
download
4
Transcript of Lecture 08 uninformed search techniques
![Page 1: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/1.jpg)
1
Uninformed Search TechniquesLecture-08
Hema Kashyap
![Page 2: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/2.jpg)
2
Uninformed Search Breadth First Search Uniform Cost Search Depth First Search Depth Limited Search Iterative deepening Depth First Search Bidirectional Search
![Page 3: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/3.jpg)
3
Breadth First Search
![Page 4: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/4.jpg)
4
ConceptStep 1: Traverse the root nodeStep 2: Traverse all neighbours of root node.Step 3: Traverse all neighbours of neighbours of the root node.Step 4: This process will continue until we are getting the goal node.
![Page 5: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/5.jpg)
5
![Page 6: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/6.jpg)
6
![Page 7: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/7.jpg)
7
![Page 8: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/8.jpg)
8
![Page 9: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/9.jpg)
9
![Page 10: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/10.jpg)
10
![Page 11: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/11.jpg)
11
Step 8: G is selected for expansion. It is found to be a goal node. So the algorithm returns the path A C G by following the parent pointers of the node corresponding to G. The algorithm terminates.
![Page 12: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/12.jpg)
12
Properties of BFS• Complete. • The algorithm is optimal (i.e., admissible) if all operators have the same
cost. Otherwise, breadth first search finds a solution with the shortest path length.
• The algorithm has exponential time and space complexity. Suppose the search tree can be modelled as a b-ary tree as shown in Figure 3. Then the time and space complexity of the algorithm is O(bd) where d is the depth of the solution and b is the branching factor (i.e., number of children) at each node.
![Page 13: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/13.jpg)
13
Advantages
• In this procedure at any way it will find the goal.
• It does not follow a single unfruitful path for a long time.
• It finds the minimal solution in case of multiple paths.
Disadvantages
• BFS consumes large memory space.
• Its time complexity is more.• It has long pathways, when all
paths to a destination are on approximately the same search depth.
![Page 14: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/14.jpg)
14
Depth First Search
![Page 15: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/15.jpg)
15
ConceptStep 1: Traverse the root node.Step 2: Traverse any neighbour of the root node.Step 3: Traverse any neighbour of neighbour of the root node.Step 4: This process will continue until we are getting the goal node.
![Page 16: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/16.jpg)
16
![Page 17: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/17.jpg)
17
![Page 18: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/18.jpg)
18
![Page 19: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/19.jpg)
19
Step 4: Node D is removed from fringe. C and F are pushed in front of fringe
![Page 20: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/20.jpg)
20
![Page 21: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/21.jpg)
21
Step 6: Node G is expanded and found to be a goal node. The solution path A-B-D-C-G is returned and the algorithm terminates.
![Page 22: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/22.jpg)
22
Properties of DFS• The algorithm takes exponential time. If N is the maximum depth of a
node in the search space, in the worst case the algorithm will take time O(bd). However the space taken is linear in the depth of the search tree, O(bN).
• Note that the time taken by the algorithm is related to the maximum depth of the search tree. If the search tree has infinite depth, the algorithm may not terminate. This can happen if the search space is infinite. It can also happen if the search space contains cycles. The latter case can be handled by checking for cycles in the algorithm. Thus Depth First Search is not complete.
![Page 23: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/23.jpg)
23
Advantages:• DFS consumes very less
memory space.• It will reach at the goal node in
a less time period than BFS if it traverses in a right path.
• It may find a solution without examining much of search because we may get the desired solution
• in the very first go.
Disadvantages:• It is possible that may states
keep reoccurring.• There is no guarantee of
finding the goal node.• Sometimes the states may also
enter into infinite loops.
![Page 24: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/24.jpg)
24
Difference between BFS and DFSBFS• It uses the data structure
queue.• BFS is complete because it
finds the solution if one exists.
• BFS takes more space i.e. equivalent to o (b0) where b is the maximum breath exist in a search
• tree and d is the maximum depth exit in a search tree.
• In case of several goals, it finds the best one.
DFS• It uses the data structure
stack.• It is not complete because it
may take infinite loop to reach at the goal node.
• The space complexity is O (d).
• In case of several goals, it will terminate the solution in any order.
![Page 25: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/25.jpg)
25
Uniform Cost Search
• This algorithm is by Dijkstra [1959]. The algorithm expands nodes in the order of their cost from the source.
• In uniform cost search the newly generated nodes are put in OPEN according to their path costs. This ensures that when a node is selected for expansion it is a node with the cheapest cost among the nodes in OPEN.
• Let g(n) = cost of the path from the start node to the current node n. Sort nodes by increasing value of g.
![Page 26: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/26.jpg)
26
Algorithm- Uniform Cost Search1. Initialize: set OPEN=s, CLOSED={} and c(s)=02. Fail: If OPEN={}, terminate with failure3. Select: Select a state with the minimum cost ,n, from OPEN and save in
CLOSED4. Terminate: If n G, terminate with success∈5. Expand: generate the successor of n
For each successor, m, :If m [OPEN CLOSED]∈ ∪set C(m)= C(n)+C(n,m) and insert m in OPENIf m [OPEN CLOSED]∈ ∪Set C(m)= min{ C(m),C(n)+C(n,m)}If c(m) has decreased and m CLOSED, move it to OPEN∈** if m is in OPEN already then we just simply update the cost**
6. Loop: Goto step 2
![Page 27: Lecture 08 uninformed search techniques](https://reader036.fdocuments.in/reader036/viewer/2022081604/589a0a0f1a28ab7a318b56d5/html5/thumbnails/27.jpg)
27
Properties of UCSSome properties of this search algorithm are: • Complete • Optimal/Admissible • Exponential time and space complexity, O(bd)