99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫COMP3411、代做java編程語言
代寫COMP3411、代做java編程語言

時間:2025-03-21  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



COMP3411/9814 Artificial Intelligence
Term 1, 2025
Assignment 1 – Search, Pruning and Treasure Hunting
Due: Friday 21 March, 10pm
Marks: 25% of final assessment
In this assignment you will be examining search strategies for the 15-puzzle,
and pruning in alpha-beta search trees. You will also implement an AI strat egy for an agent to play a text-based adventure game. You should provide
answers for Questions 1 to 3 (Part A) in a written report, and implement
your agent to interact with the provided game engine (Part B).
Note: Parts A and B must be submitted separately ! Submission details
are at the end of this specification.
Part A: Search Strategies and Alpha-Beta Pruning
Question 1: Search Strategies for the 15-Puzzle (2 marks)
For this question you will construct a table showing the number of states
expanded when the 15-puzzle is solved, from various starting positions, using
four different search strategies:
(i) Breadth First Search
(ii) Iterative Deepening Search
(iii) Greedy Search (using the Manhattan Distance heuristic)
(iv) A* Search (using the Manhattan Distance heuristic)
Download the file path search.zip from this directory:
https://www.cse.unsw.edu.au/~cs3411/25T1/code/
(or download it from here).
Unzip the file and change directory to path search:
unzip path_search.zip
cd path_search
Run the code by typing:
python3 search.py --start 2634-5178-AB0C-9DEF --s bfs
The --start argument specifies the starting position, which in this case is:
2 6 3 4
5 1 7 8
A B C
9 D E F
Start State
1 2 3 4
5 6 7 8
9 A B C
D E F
Goal State
The Goal State is shown on the right. The --s argument specifies the search
strategy (bfs for Breadth First Search).
1
The code should print out the number of expanded nodes (by thousands)
as it searches. It should then print a path from the Start State to the Goal
State, followed by the number of nodes Generated and Expanded, and the
Length and Cost of the path (which are both equal to 12 in this case).
(a) Draw up a table in this format:
Start State BFS IDS Greedy A*
start1
start2
start3
Run each of the four search strategies from three specified starting posi tions, using the following combinations of command-line arguments:
Starting Positions:
start1: --start 1237-5A46-09B8-DEFC
start2: --start 134B-5287-960C-DEAF
start3: --start 7203-16B4-5AC8-9DEF
Search Strategies:
BFS: --s bfs
IDS: --s dfs --id
Greedy: --s greedy
A*S earch: --s astar
In each case, record in your table the number of nodes Expanded during
the search.
(b) Briefly discuss the efficiency of these four search strategies.
Question 2: Heuristic Path Search for 15-Puzzle (3 marks)
In this question you will be exploring a search strategy known as Heuristic
Path Search, which is a best-first search using the objective function:
fw(n) = (2 − w)g(n) + wh(n),
where h() is an admissible heuristic and w is a number between 0 and 2.
Heuristic Path Search is equivalent to Uniform Cost Search when w = 0,
to A* Search when w = 1, and Greedy Search when w = 2. It is Complete
for all w between 0 and 2.
(a) Prove that Heuristic Path Search is optimal when 0 ≤ w ≤ 1.
Hint: show that minimizing f(n) = (2 − w)g(n) + wh(n) is the same
as minimizing f

(n) = g(n) + h

(n) for some function h

(n) with the
property that h

(n) ≤ h(n) for all n.
2
(b) Draw up a table in this format (the top row has been filled in for you):
start4 start5 start6
IDA* Search 48 1606468 52 3534563 54 76653772
HPS, w = 1.1
HPS, w = 1.2
HPS, w = 1.3
HPS, w = 1.4
Run the code on each of the three start states shown below, using
Heuristic Path Search with w = 1.1, 1.2, 1.3 and 1.4 .
Starting Positions:
start4: --start 8192-6DA4-0C5E-B3F7
start5: --start 297F-DEB4-A601-C385
start6: --start F5B6-C170-E892-DA34
Search Strategies:
HPS, w = 1.1: --s heuristic --w 1.1
HPS, w = 1.2: --s heuristic --w 1.2
HPS, w = 1.3: --s heuristic --w 1.3
HPS, w = 1.4: --s heuristic --w 1.4
In each case, record in your table the length of the path that was found,
and the number of nodes Expanded during the search. Include the com pleted table in your report.
(c) Briefly discuss the tradeoff between speed and quality of solution for
Heuristic Path Search with different values of w.
3
Question 3: Game Trees and Pruning (4 marks)
(a) The following game tree is designed so that alpha-beta search will prune
as many nodes as possible. At each node of the tree, all the leaves in the
left subtree are preferable to all the leaves in the right subtree (for the
player whose turn it is to move).
MAX
MIN
MAX
MIN
10 11 8 9 1314 12 2 3 0 1 6 7 4 5 15
Trace through the alpha-beta search algorithm on this tree, showing the
values of alpha and beta at each node as the algorithm progresses, and
clearly indicate which of the original 16 leaves are evaluated (i.e. not
pruned).
(b) Now consider another game tree of depth 4, but where each internal node
has exactly three children. Assume that the leaves have been assigned
in such a way that alpha-beta search prunes as many nodes as possible.
Draw the shape of the pruned tree. How many of the original 81 leaves
will be evaluated?
Hint: If you look closely at the pruned tree from part (a) you will see
a pattern. Some nodes explore all of their children; other nodes explore
only their leftmost child and prune the other children. The path down
the extreme left side of the tree is called the line of best play or Principal
Variation (PV). Nodes along this path are called PV-nodes. PV-nodes
explore all of their children. If we follow a path starting from a PV-node
but proceeding through non-PV nodes, we see an alternation between
nodes which explore all of their children, and those which explore only
one child. By reproducing this pattern for the tree in part (b), you should
be able to draw the shape of the pruned tree (without actually assigning
values to the leaves or tracing through the alpha-beta search algorithm).
(c) What is the time complexity of alpha-beta search, if the best move is
always examined first (at every branch of the tree)? Explain why.
4
Part B: Treasure Hunt (16 marks)
For this part you will be implementing an agent to play a simple text-based
adventure game. The agent is considered to be stranded on a small group of
islands, with a few trees and the ruins of some ancient buildings. The agent
is required to move around a rectangular environment, collecting tools and
avoiding (or removing) obstacles along the way.
The obstacles and tools within the environment are represented as follows:
Obstacles Tools
T tree a axe
- door k key
* wall d dynamite
˜ water $ treasure
The agent will be represented by one of the characters ^, v, < or >,
depending on which direction it is pointing. The agent is capable of the
following instructions:
L turn left
R turn right
F (try to) move forward
U (try to) unlock a door, using an key
C (try to) chop down a tree, using an axe
B (try to) blast a wall, tree or door, using dynamite
When it executes an L or R instruction, the agent remains in the same
location and only its direction changes. When it executes an F instruction,
the agent attempts to move a single step in whichever direction it is pointing.
The F instruction will fail (have no effect) if there is a wall or tree directly
in front of the agent.
When the agent moves to a location occupied by a tool, it automatically
picks up the tool. The agent may use a C, U or B instruction to remove an
obstacle immediately in front of it, if it is carrying the appropriate tool. A
tree may be removed with a C (chop) instruction, if an axe is held. A door
may be removed with a U (unlock) instruction, if a key is held. A wall, tree
or door may be removed with a B (blast) instruction, if dynamite is held.
Whenever a tree is chopped, the tree automatically becomes a raft which the
agent can use as a tool to move across the water. If the agent is not holding a
raft and moves forward into the water, it will drown. If the agent is holding a
raft, it can safely move forward into the water, and continue to move around
on the water, using the raft. When the agent steps back onto the land, the
raft it was using will sink and cannot be used again. The agent will need to
chop down another tree in order to get a new raft.
5
If the agent attempts to move off the edge of the environment, it dies.
To win the game, the agent must pick up the treasure and then return to its
initial location.
Running as a Single Process
Download the file src.zip from this directory:
https://www.cse.unsw.edu.au/~cs3411/25T1/hw1raft
(or download it from here).
Copy the archive into your own filespace, unzip it, then type
cd src
javac *.java
java Raft -i s0.in
You should then see something like this:
~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~
~~ d * T a ~~
~~ *-* *** ~~
~~**** v ****~~
~~TTT** **TTT~~
~~ $ ** k ** ~~
~~ ** ** ~~
~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~
Enter Action(s):
This allows you to play the role of the agent by typing commands at the
keyboard (followed by <Enter>). Note:
• a key can be used to open any door; once a door is opened, it has effec tively been removed from the environment and can never be “closed”
again.
• an axe or key can be used multiple times, but each dynamite can be
used only once.
• C, U or B instructions will fail (have no effect) if the appropriate tool
is not held, or if the location immediately in front of the agent does
not contain an appropriate obstacle.
6
Running in Network Mode
Follow these instructions to see how the game runs in network mode:
1. open two windows, and cd to the src directory in both of them.
2. choose a port number between 1025 and 65535 – let’s suppose you
choose 31415.
3. type this in one window:
java Raft -p 31415 -i s0.in
4. type this in the other window:
java Agent -p 31415
In network mode, the agent runs as a separate process and communicates
with the game engine through a TCPIP socket. Notice that the agent cannot
see the whole environment, but only a 5-by-5 “window” around its current
location, appropriately rotated. From the agent’s point of view, locations off
the edge of the environment appear as a dot.
We have also provided a C version of the agent, which you can run by typing
make
./agent -p 31415
Writing an Agent
At each time step, the environment will send a series of 24 characters to the
agent, constituting a scan of the 5-by-5 window it is currently seeing; the
agent must send back a single character to indicate the action it has chosen.
You are free to write the agent in any language of your choosing.
• If you are coding in Java, your main file should be called Agent.java
(you are free to use the supplied file Agent.java as a starting point)
• If you are coding in Python, your main file should be called agent.py
(you are free to use the supplied file agent.py as a starting point) and
the first line should specify the version of Python you are using, e.g.
#!/usr/bin/python3
7
• If you are coding in C, you are free to use the files agent.c, pipe.c
and pipe.h as a starting point. You must include a Makefile with
your submission which, when invoked with the command “make”, will
produce an executable called agent.
• In other languages, you will have to write the socket code for yourself.
You may assume that the specified environment is no larger than 80 by 80,
but the agent can begin anywhere inside it.
Additional examples of input environments can be found in the directory
https://www.cse.unsw.edu.au/~cs3411/25T1/hw1raft/sample
(or download it from here).
Question
At the top of your code, in a block of comments, you must provide a brief
answer (one or two paragraphs) to this Question:
Briefly describe how your program works, including any algo rithms and data structures employed, and explain any design de cisions you made along the way.
Submission
Parts A and B should be submitted separately.
You should submit your report for Part A by typing
give cs3411 hw1a hw1a.pdf
You should submit your code for Part B by typing
give cs3411 hw1raft ...
(Replace ... with the names of your submitted files)
You can submit as many times as you like – later submissions will overwrite
earlier ones. You can check that your submission has been received by using
one of this command:
3411 classrun -check
The submission deadline is Friday 21 March, 10 pm.
8
A penalty of 5% will be applied to the mark for every 24 hours late after the
deadline, up to a maximum of 5 days (in accordance with UNSW policy).
Additional information may be found in the FAQ and will be considered as
part of the specification for the project. Questions relating to the project
can also be posted to the course Forums. If you have a question that has
not already been answered on the FAQ or the Forums, you can email it to
cs3411@cse.unsw.edu.au
Please ensure that you submit the source files and NOT any binary files. The
give system will compile your program using your Makefile and check that
it produces a binary file (or java class files) with the correct name.
Assessment
Your program will be tested on a series of sample inputs with successively
more challenging environments. There will be:
• 10 marks for functionality (automarking)
• 6 marks for Algorithms, Style, Comments and answer to the Question
You should always adhere to good coding practices and style. In general,
a program that attempts a substantial part of the job but does that part
correctly will receive more marks than one attempting to do the entire job
but with many errors.
Plagiarism Policy Group submissions will not be allowed. Your program
must be entirely your own work. Plagiarism detection software will be used
to compare all submissions pairwise (including submissions for similar assign ments in previous years, if applicable) and serious penalties will be applied,
including an entry on UNSW’s plagiarism register.
You are also not allowed to submit code obtained with the help of ChatGPT,
Claude, GitHub Copilot, Gemini or similar automatic tools.
• Do not copy code from others; do not allow anyone to see your code.
• Do not copy code from the Internet; do not develop or upload your own
code on a publicly accessible repository.
• Code generated by ChatGPT, Claude, GitHub Copilot, Gemini and
similar tools will be treated as plagiarism.
Please refer to the on-line resources to help you understand what plagiarism
is and how it is dealt with at UNSW:
• Academic Integrity and Plagiarism
• UNSW Plagiarism Policy
Good luck!


請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:毛豆分期全國客服電話-毛豆分期24小時人工服務熱線
  • 下一篇:COMP 5076代寫、代做Python/Java程序
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務-企業/產品研發/客戶要求/設計優化
    有限元分析 CAE仿真分析服務-企業/產品研發
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 trae 豆包網頁版入口 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                欧美日韩精品电影| 成人高清视频免费观看| 亚洲精品一区二区三区蜜桃下载| 国产精品亚洲一区二区三区在线 | 成人做爰69片免费看网站| 奇米一区二区三区| 毛片一区二区三区| 视频一区国产视频| 日本中文一区二区三区| 日本人妖一区二区| 免费久久精品视频| 久久超碰97中文字幕| 激情综合色播激情啊| 国产精品911| 成人av电影免费观看| www.日韩av| 色激情天天射综合网| 欧美午夜精品理论片a级按摩| 欧美精品黑人性xxxx| 日韩欧美激情四射| 国产三级欧美三级日产三级99| 欧美国产一区在线| 亚洲精品亚洲人成人网| 午夜久久久影院| 国产精品伊人色| 91丨porny丨蝌蚪视频| 欧美日韩亚州综合| 日韩亚洲欧美高清| 国产精品免费丝袜| 亚洲一区二区三区自拍| 麻豆精品蜜桃视频网站| 风间由美性色一区二区三区| 91免费精品国自产拍在线不卡| 在线免费观看日本欧美| 精品日韩在线一区| 亚洲情趣在线观看| 国内精品久久久久影院色 | 亚洲欧美色图小说| 日日夜夜精品视频天天综合网| 国内不卡的二区三区中文字幕 | av爱爱亚洲一区| 久久99国产精品免费| 洋洋av久久久久久久一区| 欧美bbbbb| 欧美一区国产二区| 91麻豆精品国产91久久久久久久久 | 国产精品美女一区二区在线观看| 国产aⅴ综合色| 国产在线不卡一区| 日韩国产一区二| 欧美电视剧免费观看| 欧美伊人精品成人久久综合97| 激情综合亚洲精品| 免费成人在线观看| 亚洲自拍偷拍九九九| 日本网站在线观看一区二区三区| 亚洲一卡二卡三卡四卡五卡| 国产精品黄色在线观看| 日韩欧美成人激情| 美女视频网站黄色亚洲| 成人亚洲精品久久久久软件| 国产色爱av资源综合区| 美女尤物国产一区| 中文字幕的久久| 3751色影院一区二区三区| 一区二区三区精品在线观看| 久久精品久久精品| 久久九九国产精品| 视频一区二区不卡| 日本黄色一区二区| 国产精品视频麻豆| 日韩精品一区二区三区中文不卡 | 精品国产伦一区二区三区观看方式| 2020日本不卡一区二区视频| 日韩国产欧美在线播放| 久久影院电视剧免费观看| 亚洲欧洲精品成人久久奇米网| 日韩成人午夜精品| 91精品国产综合久久国产大片| 日韩三级伦理片妻子的秘密按摩| 精品少妇一区二区三区视频免付费 | 色哟哟在线观看一区二区三区| 精品在线一区二区| 欧美日韩国产色站一区二区三区| 亚洲精品菠萝久久久久久久| 激情深爱一区二区| 久久精品在这里| 精品美女在线播放| 欧美日韩国产一级| 亚洲精品成人天堂一二三| 国产成人综合亚洲网站| 国产亚洲精久久久久久| 国产毛片一区二区| 欧美激情艳妇裸体舞| 国产精品12区| 一色桃子久久精品亚洲| 成人高清免费在线播放| 1024成人网| 欧美综合亚洲图片综合区| 亚洲免费观看在线视频| 欧美日韩国产首页在线观看| 青青国产91久久久久久| 亚洲国产精华液网站w| 欧美日韩午夜在线视频| 精品国产a毛片| 国产伦理精品不卡| 日本国产一区二区| 懂色av一区二区三区蜜臀| 2欧美一区二区三区在线观看视频| 日韩精品1区2区3区| 欧美精品一区视频| 成人av综合一区| 一区二区三区电影在线播| 在线播放91灌醉迷j高跟美女| 亚洲电影一区二区| 欧美电影免费提供在线观看| 99国产精品一区| 国产女人水真多18毛片18精品视频| 国产精品88888| 亚洲一区二区三区四区中文字幕| 51精品秘密在线观看| 国产成a人亚洲精| 日韩一区欧美二区| 亚洲乱码精品一二三四区日韩在线| 欧美色综合久久| 国产日韩欧美精品一区| 日韩欧美国产不卡| 亚洲综合一区二区| 欧美日韩精品欧美日韩精品一| 亚洲午夜视频在线观看| 欧美老肥妇做.爰bbww| 天天综合色天天综合| 一区二区视频在线看| 国产乱码精品一品二品| 精品一区二区久久久| 国产河南妇女毛片精品久久久 | 最新国产成人在线观看| 欧美视频一二三区| 久久亚洲私人国产精品va媚药| 国产日本亚洲高清| 久久人人97超碰com| 18欧美亚洲精品| 粉嫩aⅴ一区二区三区四区| 欧美在线视频你懂得| 精品电影一区二区三区 | 91精品国产一区二区| 国产河南妇女毛片精品久久久| 一区二区三区久久| 2欧美一区二区三区在线观看视频 337p粉嫩大胆噜噜噜噜噜91av | 欧美日韩亚洲高清一区二区| 国产曰批免费观看久久久| 性做久久久久久免费观看| 久久久电影一区二区三区| 678五月天丁香亚洲综合网| 欧美一区午夜视频在线观看| 亚洲精品久久7777| 国产精品99久久久久久久女警| 精品在线播放免费| 91色视频在线| 亚洲黄色性网站| 国内外成人在线视频| 国产成人亚洲综合a∨婷婷| 91精品国产91久久久久久最新毛片| 亚洲蜜桃精久久久久久久| 成人精品gif动图一区| 国产亚洲午夜高清国产拍精品 | 亚洲va国产天堂va久久en| 色婷婷av一区| 一区二区免费看| 国产精品久久久久久福利一牛影视 | www.在线成人| 久久综合精品国产一区二区三区| 免费成人结看片| 日韩亚洲电影在线| 午夜精品久久久久久不卡8050| 99国产欧美另类久久久精品| 亚洲一区二区三区四区在线观看 | 国产精品一区二区x88av| 久久精品视频免费| 99免费精品在线| 国产精品一区二区91| 成人av在线影院| 91激情五月电影| 久久久另类综合| 天堂久久一区二区三区| 久久不见久久见免费视频7| 成人性生交大片免费看中文| 在线观看亚洲精品视频| 久久精品日韩一区二区三区| 亚洲制服欧美中文字幕中文字幕| 五月婷婷色综合| 成人h精品动漫一区二区三区| 在线视频中文字幕一区二区| 久久综合给合久久狠狠狠97色69| 亚洲国产精品国自产拍av| 亚洲一区在线观看免费| 成人视屏免费看| 久久精品一区二区三区不卡 | 在线观看网站黄不卡| 久久在线免费观看|