加勒比久久综合,国产精品伦一区二区,66精品视频在线观看,一区二区电影

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫 COMP3411、代做 C++編程語言
代寫 COMP3411、代做 C++編程語言

時間:2025-03-17  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



COMP3411/9814 Artificial Intelligence Term 1, 2025 Assignment 1 – Search, Pruning and Treasure Hunting Due: Friday 21 March, 10pm Marks: 25% of final assessment In this assignment you will be examining search strategies for the 15-puzzle, and pruning in alpha-beta search trees. You will also implement an AI strat- egy for an agent to play a text-based adventure game. You should provide answers for Questions 1 to 3 (Part A) in a written report, and implement your agent to interact with the provided game engine (Part B). Note: Parts A and B must be submitted separately ! Submission details are at the end of this specification. Part A: Search Strategies and Alpha-Beta Pruning Question 1: Search Strategies for the 15-Puzzle (2 marks) For this question you will construct a table showing the number of states expanded when the 15-puzzle is solved, from various starting positions, using four different search strategies: (i) Breadth First Search (ii) Iterative Deepening Search (iii) Greedy Search (using the Manhattan Distance heuristic) (iv) A* Search (using the Manhattan Distance heuristic) Download the file path search.zip from this directory:  (or download it from here). Unzip the file and change directory to path search: unzip path_search.zip cd path_search Run the code by typing: python3 search.py --start 2634-5178-AB0C-9DEF --s bfs The --start argument specifies the starting position, which in this case is: 2 6 3 4 5 1 7 8 A B C 9 D E F Start State 1 2 3 4 5 6 7 8 9 A B C D E F Goal State The Goal State is shown on the right. The --s argument specifies the search strategy (bfs for Breadth First Search). 1 The code should print out the number of expanded nodes (by thousands) as it searches. It should then print a path from the Start State to the Goal State, followed by the number of nodes Generated and Expanded, and the Length and Cost of the path (which are both equal to 12 in this case). (a) Draw up a table in this format: Start State BFS IDS Greedy A* start1 start2 start3 Run each of the four search strategies from three specified starting posi- tions, using the following combinations of command-line arguments: Starting Positions: start1: --start 1237-5A46-09B8-DEFC start2: --start 134B-5287-960C-DEAF start3: --start 7203-16B4-5AC8-9DEF Search Strategies: BFS: --s bfs IDS: --s dfs --id Greedy: --s greedy A*S earch: --s astar In each case, record in your table the number of nodes Expanded during the search. (b) Briefly discuss the efficiency of these four search strategies. Question 2: Heuristic Path Search for 15-Puzzle (3 marks) In this question you will be exploring a search strategy known as Heuristic Path Search, which is a best-first search using the objective function: fw(n) = (2? w)g(n) + wh(n), where h() is an admissible heuristic and w is a number between 0 and 2. Heuristic Path Search is equivalent to Uniform Cost Search when w = 0, to A* Search when w = 1, and Greedy Search when w = 2. It is Complete for all w between 0 and 2. (a) Prove that Heuristic Path Search is optimal when 0 ≤ w ≤ 1. Hint: show that minimizing f(n) = (2 ? w)g(n) + wh(n) is the same as minimizing f ′(n) = g(n) + h′(n) for some function h′(n) with the property that h′(n) ≤ h(n) for all n. 2 (b) Draw up a table in this format (the top row has been filled in for you): start4 start5 start6 IDA*Search 48 1606468 52 3534563 54 76653772 HPS, w = 1.1 HPS, w = 1.2 HPS, w = 1.3 HPS, w = 1.4 Run the code on each of the three start states shown below, using Heuristic Path Search with w = 1.1, 1.2, 1.3 and 1.4 . Starting Positions: start4: --start 8192-6DA4-0C5E-B3F7 start5: --start 297F-DEB4-A601-C385 start6: --start F5B6-C170-E892-DA34 Search Strategies: HPS, w = 1.1: --s heuristic --w 1.1 HPS, w = 1.2: --s heuristic --w 1.2 HPS, w = 1.3: --s heuristic --w 1.3 HPS, w = 1.4: --s heuristic --w 1.4 In each case, record in your table the length of the path that was found, and the number of nodes Expanded during the search. Include the com- pleted table in your report. If the process runs out of memory (particularly for start6withw = 1.1), try running it again but with “--id” added to the command-line ar- guments (this will make it switch to the Iterative Deepening version of Heuristic Path Search, which expands a similar number of nodes but uses far less memory). (c) Briefly discuss the tradeoff between speed and quality of solution for Heuristic Path Search with different values of w. 3 Question 3: Game Trees and Pruning (4 marks) (a) The following game tree is designed so that alpha-beta search will prune as many nodes as possible. At each node of the tree, all the leaves in the left subtree are preferable to all the leaves in the right subtree (for the player whose turn it is to move). MIN 10 11 8 9 1314 12 2 3 0 1 6 7 4 5 MIN 15 MAX MAX Trace through the alpha-beta search algorithm on this tree, showing the values of alpha and beta at each node as the algorithm progresses, and clearly indicate which of the original 16 leaves are evaluated (i.e. not pruned). (b) Now consider another game tree of depth 4, but where each internal node has exactly three children. Assume that the leaves have been assigned in such a way that alpha-beta search prunes as many nodes as possible. Draw the shape of the pruned tree. How many of the original 81 leaves will be evaluated? Hint: If you look closely at the pruned tree from part (a) you will see a pattern. Some nodes explore all of their children; other nodes explore only their leftmost child and prune the other children. The path down the extreme left side of the tree is called the line of best play or Principal Variation (PV). Nodes along this path are called PV-nodes. PV-nodes explore all of their children. If we follow a path starting from a PV-node but proceeding through non-PV nodes, we see an alternation between nodes which explore all of their children, and those which explore only one child. By reproducing this pattern for the tree in part (b), you should be able to draw the shape of the pruned tree (without actually assigning values to the leaves or tracing through the alpha-beta search algorithm). (c) What is the time complexity of alpha-beta search, if the best move is always examined first (at every branch of the tree)? Explain why. 4 Part B: Treasure Hunt (16 marks) For this part you will be implementing an agent to play a simple text-based adventure game. The agent is considered to be stranded on a small group of islands, with a few trees and the ruins of some ancient buildings. The agent is required to move around a rectangular environment, collecting tools and avoiding (or removing) obstacles along the way. The obstacles and tools within the environment are represented as follows: Obstacles Tools T tree a axe - door k key * wall d dynamite ? water $ treasure The agent will be represented by one of the characters ^, v, < or >, depending on which direction it is pointing. The agent is capable of the following instructions: L turn left R turn right F (try to) move forward U (try to) unlock a door, using an key C (try to) chop down a tree, using an axe B (try to) blast a wall, tree or door, using dynamite When it executes an L or R instruction, the agent remains in the same location and only its direction changes. When it executes an F instruction, the agent attempts to move a single step in whichever direction it is pointing. The F instruction will fail (have no effect) if there is a wall or tree directly in front of the agent. When the agent moves to a location occupied by a tool, it automatically picks up the tool. The agent may use a C, U or B instruction to remove an obstacle immediately in front of it, if it is carrying the appropriate tool. A tree may be removed with a C (chop) instruction, if an axe is held. A door may be removed with a U (unlock) instruction, if a key is held. A wall, tree or door may be removed with a B (blast) instruction, if dynamite is held. Whenever a tree is chopped, the tree automatically becomes a raft which the agent can use as a tool to move across the water. If the agent is not holding a raft and moves forward into the water, it will drown. If the agent is holding a raft, it can safely move forward into the water, and continue to move around on the water, using the raft. When the agent steps back onto the land, the raft it was using will sink and cannot be used again. The agent will need to chop down another tree in order to get a new raft. 5 If the agent attempts to move off the edge of the environment, it dies. To win the game, the agent must pick up the treasure and then return to its initial location. Running as a Single Process Download the file src.zip from this directory: https://www.cse.unsw.edu.au/~cs3411/25T1/hw1raft (or download it from here). Copy the archive into your own filespace, unzip it, then type cd src javac *.java java Raft -i s0.in You should then see something like this: ~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~ ~~ d * T a ~~ ~~ *-* *** ~~ ~~**** v ****~~ ~~TTT** **TTT~~ ~~ $ ** k ** ~~ ~~ ** ** ~~ ~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~ Enter Action(s): This allows you to play the role of the agent by typing commands at the keyboard (followed by ). Note: ? a key can be used to open any door; once a door is opened, it has effec- tively been removed from the environment and can never be “closed” again. ? an axe or key can be used multiple times, but each dynamite can be used only once. ? C, U or B instructions will fail (have no effect) if the appropriate tool is not held, or if the location immediately in front of the agent does not contain an appropriate obstacle. 6 Running in Network Mode Follow these instructions to see how the game runs in network mode: 1. open two windows, and cd to the src directory in both of them. 2. choose a port number between 1025 and 65535 – let’s suppose you choose 31415. 3. type this in one window: java Raft -p 31415 -i s0.in 4. type this in the other window: java Agent -p 31415 In network mode, the agent runs as a separate process and communicates with the game engine through a TCPIP socket. Notice that the agent cannot see the whole environment, but only a 5-by-5 “window” around its current location, appropriately rotated. From the agent’s point of view, locations off the edge of the environment appear as a dot. We have also provided a C version of the agent, which you can run by typing make ./agent -p 31415 Writing an Agent At each time step, the environment will send a series of 24 characters to the agent, constituting a scan of the 5-by-5 window it is currently seeing; the agent must send back a single character to indicate the action it has chosen. You are free to write the agent in any language of your choosing. ? If you are coding in Java, your main file should be called Agent.java (you are free to use the supplied file Agent.java as a starting point) ? If you are coding in Python, your main file should be called agent.py (you are free to use the supplied file agent.py as a starting point) and the first line should specify the version of Python you are using, e.g. #!/usr/bin/python3 7 ? If you are coding in C, you are free to use the files agent.c, pipe.c and pipe.h as a starting point. You must include a Makefile with your submission which, when invoked with the command “make”, will produce an executable called agent. ? In other languages, you will have to write the socket code for yourself. You may assume that the specified environment is no larger than 80 by 80, but the agent can begin anywhere inside it. Additional examples of input environments can be found in the directory (or download it from here). Question At the top of your code, in a block of comments, you must provide a brief answer (one or two paragraphs) to this Question: Briefly describe how your program works, including any algo- rithms and data structures employed, and explain any design de- cisions you made along the way. Submission Parts A and B should be submitted separately. You should submit your report for Part A by typing give cs3411 hw1a hw1a.pdf You should submit your code for Part B by typing give cs3411 hw1raft ... (Replace ... with the names of your submitted files) You can submit as many times as you like – later submissions will overwrite earlier ones. You can check that your submission has been received by using one of this command: 3411 classrun -check The submission deadline is Friday 21 March, 10 pm. 8 A penalty of 5% will be applied to the mark for every 24 hours late after the deadline, up to a maximum of 5 days (in accordance with UNSW policy). Additional information may be found in the FAQ and will be considered as part of the specification for the project. Questions relating to the project can also be posted to the course Forums. If you have a question that has not already been answered on the FAQ or the Forums, you can email it to cs3411@cse.unsw.edu.au Please ensure that you submit the source files and NOT any binary files. The give system will compile your program using your Makefile and check that it produces a binary file (or java class files) with the correct name. Assessment Your program will be tested on a series of sample inputs with successively more challenging environments. There will be: ? 10 marks for functionality (automarking) ? 6 marks for Algorithms, Style, Comments and answer to the Question You should always adhere to good coding practices and style. In general, a program that attempts a substantial part of the job but does that part correctly will receive more marks than one attempting to do the entire job but with many errors. Plagiarism Policy Group submissions will not be allowed. Your program must be entirely your own work. Plagiarism detection software will be used to compare all submissions pairwise (including submissions for similar assign- ments in previous years, if applicable) and serious penalties will be applied, including an entry on UNSW’s plagiarism register. You are also not allowed to submit code obtained with the help of ChatGPT, Claude, GitHub Copilot, Gemini or similar automatic tools. Do not copy code from others; do not allow anyone to see your code. Do not copy code from the Internet; do not develop or upload your own code on a publicly accessible repository. Code generated by ChatGPT, Claude, GitHub Copilot, Gemini and similar tools will be treated as plagiarism. Please refer to the on-line resources to help you understand what plagiarism is and how it is dealt with at UNSW: ? Academic Integrity and Plagiarism UNSW Plagiarism Policy Good luck

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當(dāng)前頁
  • 上一篇:代寫 MATH5905、代做 Python/java 程序
  • 下一篇:EL3105代做、代寫 MATLAB/Python 編程
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)/客戶要求/設(shè)計優(yōu)化
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
    出評 開團(tuán)工具
    出評 開團(tuán)工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復(fù)古美學(xué)與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    日韩欧美一级| 色999国产精品| 日韩电影在线观看完整免费观看| 黑森林国产精品av| 欧美色资源站| aa亚洲一区一区三区| 日韩电影免费网站| 美女尤物久久精品| 欧美激情五月| 欧美一区久久久| 99热精品在线| 色婷婷久久久| 精品中文字幕一区二区三区四区| 国产专区一区| 91亚洲无吗| 国产真实有声精品录音| 69堂精品视频在线播放| 免费日本视频一区| 好吊日精品视频| 国内露脸中年夫妇交换精品| 欧洲精品99毛片免费高清观看| 中日韩男男gay无套| www.爱久久| 偷拍自拍一区| 欧美电影院免费观看| 三级久久三级久久| 国产一区二区| 精品免费av在线| 极品视频在线| 免费xxxx性欧美18vr| 国产亚洲精品自拍| 日韩午夜av| 女人天堂亚洲aⅴ在线观看| 色哟哟精品丝袜一区二区| 超碰cao国产精品一区二区| 亚洲人成网站77777在线观看| 日韩国产一区二区| 午夜影院日韩| 亚洲欧美日韩视频二区| 午夜视频精品| 91久久久久| 91成人在线精品视频| 一本一道久久综合狠狠老| 久久福利综合| 久久亚洲影视| 亚洲午夜视频| 午夜国产欧美理论在线播放| 欧美丝袜一区| 婷婷伊人综合| 欧美综合在线视频观看| 美女久久久久| 伊人成综合网| 亚洲一区一卡| 天堂成人国产精品一区| 久久高清一区| 91一区二区三区四区| 久久uomeier| 日韩欧美视频| 欧美a视频在线| 国产情侣一区| 国产精品hd| 国产精品亚洲片在线播放| 国产尤物久久久| 偷拍视屏一区| av综合网址| 99久久久久国产精品| 亚洲特级毛片| 一本色道久久综合亚洲精品不卡| 亚洲性视频大全| 久久av免费看| 亚洲精品在线国产| 欧美亚洲在线日韩| 亚洲欧美久久久| 日本三级一区| 91超碰碰碰碰久久久久久综合| 亚洲综合社区| 中文字幕成在线观看| 日本欧美一区| 影音先锋亚洲电影| 亚洲女娇小黑人粗硬| 一区二区三区在线资源| 国产在线播放精品| 午夜久久久久| 麻豆91精品| 国产精品久久观看| www.国产精品| 国产高清亚洲| 成人av资源网址| 欧美日韩日本国产亚洲在线| 亚洲一区一卡| 成人午夜sm精品久久久久久久| 国产精品普通话对白| 日韩成人激情| 美女精品一区二区| 日韩精品欧美大片| 国精品一区二区| a国产在线视频| 日韩精品电影一区亚洲| 亚洲精品蜜桃乱晃| 亚洲午夜一级| 日韩欧美不卡| 高清不卡一区| 欧美一区二区性| 日韩专区欧美专区| 国产日韩欧美一区| 日韩—二三区免费观看av| 99热在线成人| 亚洲午夜天堂| 你懂的视频一区二区| 欧美自拍一区| 成人一级福利| 一区二区三区网站| 色婷婷久久久| 欧美久久天堂| 国产麻豆精品久久| 免费久久久久久久久| 日本美女一区| 日韩精品导航| 亚洲专区免费| 麻豆精品视频在线观看| 欧洲精品一区| 日韩高清成人| 偷窥自拍亚洲色图精选| 欧美日韩国内| 日本视频中文字幕一区二区三区| 欧美在线三级| 91欧美极品| 理论片午夜视频在线观看| 91视频亚洲| 亚洲最黄网站| 捆绑调教美女网站视频一区| 成人婷婷网色偷偷亚洲男人的天堂| 亚洲都市激情| 久久久亚洲欧洲日产| 99精品视频在线观看免费播放| 精品国产一区二区三区不卡蜜臂| 久久九九国产| 性感美女一区二区在线观看| 久久九九精品视频| 欧美wwwww| 少妇一区二区视频| 噜噜爱69成人精品| 国产一区一区| 香蕉成人久久| 国产伦精品一区二区三区视频 | 欧美视频免费看| 亚洲乱码一区| 日韩在线高清| 久久精品色综合| 婷婷成人av| 亚洲天堂偷拍| 久久精品国产第一区二区三区| 亚洲一区二区三区无吗| 99视频精品| 国产成人精品999在线观看| 免费视频久久| 日韩电影网1区2区| 亚洲深夜视频| 日日天天久久| 日本欧美一区二区| 婷婷综合久久| 高清一区二区| 欧美国产偷国产精品三区| 免费一区二区三区在线视频| 日韩欧美国产精品综合嫩v| 欧美日韩麻豆| 亚洲区国产区| 亚洲一区自拍| 亚洲精品福利| 欧美一级久久| 国产亚洲精品bv在线观看| 亚洲免费专区| 成人黄色免费观看| jlzzjlzz亚洲女人| 亚洲国产国产| 日本va欧美va欧美va精品| 黄毛片在线观看| 久久久亚洲一区| 麻豆91精品91久久久的内涵| 一本色道久久综合亚洲精品不卡| 午夜欧美激情| 欧美1级日本1级| 国产中文精品久高清在线不| 日韩免费高清| 不卡在线一区| 日韩一区免费| 日韩国产在线一| 性欧美长视频| 精品精品精品| av日韩在线免费观看| 波多视频一区| 欧美日韩国内| 国产91精品入| 国产精品免费不| 欧美激情不卡| 色综合色综合| 亚洲精品中文字幕乱码| 视频一区中文字幕精品| 亚洲三级视频| 日本综合视频|