A Star
A Star
fom). Sinee this fact is true for any pair of nodes my and ness in ‘the sequence, the proof is eomplete. Corollary Under the premises of the lemma, ifm is closed then Se) SI). Proof: Let t be the goal node found by A*, Then fn) < fO = 50 =f). ‘We ean now prove a theorem about, the optimality of A* as compared with any other admissible algorithm A that 105 uses no more information about the problem than does A*, Let O44 be the index set used by algorithm A at node n. ‘Then, if 0,4" C O,* for all nodes n in G,, we shall say that algorithm A is no more informed than algorithm A’ ‘The next theorem states that if an admissible algorithm, A is no more informed than A*, then any node expanded by A* must also be expanded by A. We prove this theorem for the special ease for which ties never occur in the value of f used by A®. Later we shall generalize the theorem to cover the case where ties ean occur, but the proof of the no- ties theorem is so transparent that we include it for clarity. Theorem 2 Let A be any admissible algorithm no more informed than A", Let Gi, be any 6 graph such that » # m implies J{n) » fm), and let the consistency assumption be satis- fied by the h used in *, ‘Then if node n was expanded by A®, it was also expanded by A. Proof: Suppose the coutrary. ‘Then there exists some node n expanded by A* but not by A. Let t* and t be the preferred goal nodes of s found by A* and A, respectively. Sinee A* and A are both admissible, SU) = GE) + HOH) = gl) +0 = FH) = $0 = Je). Since A* must have expanded » before closing ¢*, by ‘Lemma 3 we have Fen) < He) = 10. (Strict inequality occurs beenuse no ties are allowed.) ‘There exists some graph G9, @ €,, for which h(n) = ‘A(n) by the definition of h. Now by Lemma 2, §(n) = g(n). ‘Then on the graph Gy. fn) = fin). Sinee A is no more informed than A*, A could not rule out the existence of G9; but A did not expand n before termination and is, therefore, not admissible, contrary to our assumption and completing the proof. ‘Upon defining N(A,G,) to be the total number of nodes in G, expanded by the algorithm A, the following simple corollary is immediate. Corollary Under the premises of Theorem 2, N(A*G,) < NA, G) with equality if and only nodes as A*. In this sense, we claim that A* is an optimal algorithm. Compared with other no more informed admissible algorithms, it expands the fewest possible nodes necessary to guarantee finding an optimal path. In ease of ties, that is if there exist two or more open nodes ns, +++, na with fm) = fou) < Hn) for every other open node , A* arbitrarily chooses one of the n,. Consider the set @* of all algorithms that act identically to A® if there are no ties, but whose members resolve ties differently, An algorithm is a member of @* if it is simply the original A* with any arbitrary tie-breaking rule. A expands the identieal set of106 ‘The next theorem extends Theorem 2 to situations where ties may oceur. It states that for any admissible algorithm A, one ean always find a member A* of @* such that each nocle expanded by A* is also expanded by A. Theorem 3 Let A be any admissible algorithm no more informed ‘than the algorithms in @*, and suppose the consistency assumption is satisfied by the A used in the algorithms in @*. Then for any 6 graph G, there exists an A*e @* such that every node expanded by A’ is also expanded by A. Proof: Let G, be any 6 graph and A:* be any algorithm, in @*. If every node of G, that A:* expands is also ex- panded by A, let A,* be the A* of the theorem. Otherwise, ‘we will show how to construct the A* of the theorem by changing the tie-breaking rule of A,*. Let L be the set of nodes expanded by A, and let P = (s,m, nay ©*; me) be the optimal path found by 4. Expand nodes as prescribed by Ay* as long as all nodes selected for expansion are elements of J. Let m be the first node seleeted for expansion by A,* which is not in L. Now fin) < f(s) by the corollary to Lemma 3. Since fin) < f(s) = f() would imply that A is inadmissible (by the argument of Theorem 2), we may conclude that f(n) f(s). At the time Ay* selected n, goal node twas not closed (or Ay* would have been terminated). Then by the corollaty to Lemma 1, there is an open node n’ on P such that f(n’) < f(s) = f(r). But since n was selected for ex- pansion by Ai* instead of n’, f(n) < fn"). Hence fn) Flo!) < flr), 80 flr) = fin’). Let A4* be identical to A:* ‘except that the tie-breaking rule is modified just enough to choose n instead of n. By repeating the above argument, we obtain for some é an A,*e @* that expands only nodes that are also expanded by A, completing the proof of the theorem. Corollary 1 Suppose the premises of the theorem are satisfied. Then for any 6 graph G, there exists an A*e @* such that N(A*, G)You might also like
Introduction To Mathematical Optimization by Matteo FischettiNo ratings yetIntroduction To Mathematical Optimization by Matteo Fischetti232 pages Bojowald - Canonical Gravity and Applications: Cosmology, Black Holes, and Quantum Gravity100% (1)Bojowald - Canonical Gravity and Applications: Cosmology, Black Holes, and Quantum Gravity313 pages The Hitchhiker's Guide To The Programming Contests100% (2)The Hitchhiker's Guide To The Programming Contests78 pages Maestro XS Reference Manual Version 2.0 PDF33% (3)Maestro XS Reference Manual Version 2.0 PDF130 pages Plates and Screws: An Overview: Presented by DR Oteki Misiani100% (1)Plates and Screws: An Overview: Presented by DR Oteki Misiani45 pages Iph750 Hydraulic Piling Hammer and Rig: Impact-Power Hydraulics Sdn. BHD100% (1)Iph750 Hydraulic Piling Hammer and Rig: Impact-Power Hydraulics Sdn. BHD4 pages Network Optimization - Continuos and Discrete ModelsNo ratings yetNetwork Optimization - Continuos and Discrete Models270 pages A and Weighted A Search: Maxim Likhachev Carnegie Mellon UniversityNo ratings yetA and Weighted A Search: Maxim Likhachev Carnegie Mellon University55 pages (Synthesis Lectures On Engineering) Creese R. - Geometric Programming For Design and Cost Optimization-Morgan (2010)No ratings yet(Synthesis Lectures On Engineering) Creese R. - Geometric Programming For Design and Cost Optimization-Morgan (2010)140 pages An Out-Of-Kilter Method For Minimal-Cost Flow ProblemsNo ratings yetAn Out-Of-Kilter Method For Minimal-Cost Flow Problems25 pages Lee MazeRouter An Algorithm For Path Connections and Its ApplicationsNo ratings yetLee MazeRouter An Algorithm For Path Connections and Its Applications20 pages Informed Search Methods: Read Chapter 4 Use Text For More Examples: Work Them Out YourselfNo ratings yetInformed Search Methods: Read Chapter 4 Use Text For More Examples: Work Them Out Yourself32 pages Introduction To Combinatorial Optimization (Ding-Zhu Du Panos M. Pardalos Xiaodong Hu Weili Wu) (Personal - Utdallas.edu)No ratings yetIntroduction To Combinatorial Optimization (Ding-Zhu Du Panos M. Pardalos Xiaodong Hu Weili Wu) (Personal - Utdallas.edu)230 pages CSC2411 - Linear Programming and Combinatorial Optimization Lecture 1: Introduction To Optimization Problems and Mathematical ProgrammingNo ratings yetCSC2411 - Linear Programming and Combinatorial Optimization Lecture 1: Introduction To Optimization Problems and Mathematical Programming9 pages Heuristic Search techniques-DFS, BFS, AstarNo ratings yetHeuristic Search techniques-DFS, BFS, Astar10 pages Preeti Soni Lecturer (C S E) Rsrrcet Bhilai, C.GNo ratings yetPreeti Soni Lecturer (C S E) Rsrrcet Bhilai, C.G61 pages Example: Route Planning in A Map: (Learning) (Logic) (Uncertainty) (Logic, Uncertainty)No ratings yetExample: Route Planning in A Map: (Learning) (Logic) (Uncertainty) (Logic, Uncertainty)5 pages Extraction Process in The Ethanol Produc PDFNo ratings yetExtraction Process in The Ethanol Produc PDF7 pages Rust Experimental v2017 DevBlog 179 x64 #KnightsTableNo ratings yetRust Experimental v2017 DevBlog 179 x64 #KnightsTable2 pages An Empirical Comparison of Backtracking AlgorithmsNo ratings yetAn Empirical Comparison of Backtracking Algorithms8 pages Subjectivity Objectivity and Frames of R PDFNo ratings yetSubjectivity Objectivity and Frames of R PDF49 pages Logical Micro Instructions in Computer Organization and ArchitectureNo ratings yetLogical Micro Instructions in Computer Organization and Architecture9 pages 1988 - Nesbitt - Gold Deposit Continuum A Genetic Model For Lode AuNo ratings yet1988 - Nesbitt - Gold Deposit Continuum A Genetic Model For Lode Au5 pages Charges Q (1) 1.5 MC, Q (2) 0.2 MC and Q (3) - 0.5 MC, Are Placed atNo ratings yetCharges Q (1) 1.5 MC, Q (2) 0.2 MC and Q (3) - 0.5 MC, Are Placed at1 page Geography F1T1 2024 QS Teacher - Co - .KeNo ratings yetGeography F1T1 2024 QS Teacher - Co - .Ke4 pages