Combinatorial Explosion

Slides:



Advertisements
Similar presentations
Adversarial Search Chapter 6 Section 1 – 4. Types of Games.
Advertisements

Alpha-Beta Search. 2 Two-player games The object of a search is to find a path from the starting position to a goal position In a puzzle-type problem,
Section 1.1, Slide 1 Copyright © 2014, 2010, 2007 Pearson Education, Inc. Section 8.4, Slide 1 Consumer Mathematics The Mathematics of Everyday Life 8.
Section 1.1, Slide 1 Copyright © 2014, 2010, 2007 Pearson Education, Inc. Section 8.4, Slide 1 Consumer Mathematics The Mathematics of Everyday Life 8.
AI for Connect-4 (or other 2-player games) Minds and Machines.
Adversarial Search Chapter 6 Section 1 – 4.
Lecture 12 Last time: CSPs, backtracking, forward checking Today: Game Playing.
Artificial Intelligence for Games Game playing Patrick Olivier
State Space 4 Chapter 4 Adversarial Games. Two Flavors Games of Perfect Information ◦Each player knows everything that can be known ◦Chess, Othello Games.
Game Playing CSC361 AI CSC361: Game Playing.
November 10, 2009Introduction to Cognitive Science Lecture 17: Game-Playing Algorithms 1 Decision Trees Many classes of problems can be formalized as search.
Computational Methods for Management and Economics Carla Gomes
AVA Fall 2005 Dealing with hard problems Lecture I Advanced Algorithms Fall 2005 Anna Pagh (Slides based on Intro week talk by R. Pagh)
The Excel NORMDIST Function Computes the cumulative probability to the value X Business Statistics: A First Course, 5e © 2009 Prentice-Hall, Inc
MAT 150 – Class #19. Objectives  Solve an exponential equation by writing it in logarithmic form  Convert logarithms using the change of base formula.
Alpha-Beta Search. 2 Two-player games The object of a search is to find a path from the starting position to a goal position In a puzzle-type problem,
Knight’s Tour Distributed Problem Solving Knight’s Tour Yoav Kasorla Izhaq Shohat.
Bennie Waller – Longwood University Personal Finance Bennie Waller Longwood University 201 High Street Farmville, VA.
MAC 1105 Section 4.3 Logarithmic Functions. The Inverse of a Exponential Function 
Solving Exponential Equations…
Section 6.4 Solving Logarithmic and Exponential Equations
Do you drive? Have you thought about how the route plan is created for you in the GPS system? How would you implement a cross-and- nought computer program?
Game Playing. Towards Intelligence? Many researchers attacked “intelligent behavior” by looking to strategy games involving deep thought. Many researchers.
Games. Adversaries Consider the process of reasoning when an adversary is trying to defeat our efforts In game playing situations one searches down the.
Thursday, May 9 Heuristic Search: methods for solving difficult optimization problems Handouts: Lecture Notes See the introduction to the paper.
Adversarial Games. Two Flavors  Perfect Information –everything that can be known is known –Chess, Othello  Imperfect Information –Player’s have each.
Computation: Potentials and Limitations Edward Tsang.
Chapter VI What should I know about the sizes and speeds of computers?
Artificial Intelligence By Mr. Ejaz CIIT Sahiwal Evolutionary Computation.
AI: AlphaGo European champion : Fan Hui A feat previously thought to be at least a decade away!!!
Understanding AI of 2 Player Games. Motivation Not much experience in AI (first AI project) and no specific interests/passion that I wanted to explore.
14.0 Students understand and use the properties of logarithms to simplify logarithmic numeric expressions and to identify their approximate values
MIT and James Orlin © The Geometry of Linear Programs –the geometry of LPs illustrated on GTC.
A Tour of the ELES Online Study Skills Handbook for Secondary Schools.
Encryption with Keys and Passwords
The Time Value of Money - The Basics
5.1 Exponential Functions
Game playing Types of games Deterministic vs. chance
Warm-up How many digits do you need to simulate heads or tails (or even or odd)? 2) To simulate an integer % probability of passing or failing?
Introduction Edited by Enas Naffar using the following textbooks: - A concise introduction to Software Engineering - Software Engineering for students-
Rich Problem Solving Tasks
CS Fall 2016 (Shavlik©), Lecture 11, Week 6
Heuristic Search A heuristic is a rule for choosing a branch in a state space search that will most likely lead to a problem solution Heuristics are used.
State Space 4 Chapter 4 Adversarial Games.
Introduction Edited by Enas Naffar using the following textbooks: - A concise introduction to Software Engineering - Software Engineering for students-
Introduction to Algorithms
Logarithmic Functions and Their Graphs
Reinforcement Learning
1.3 Exponential Functions
Alpha-Beta Search.
1.05 Polygon of Constraints
Heuristic Algorithms via VBA
“Hard” Optimization Problems
Alpha-Beta Search.
Alpha-Beta Search.
CSE (c) S. Tanimoto, 2001 Search-Introduction
Contemporary Engineering Economics
Bell Ringer Solve even #’s.
Backtracking and Branch-and-Bound
Alpha-Beta Search.
Heuristic Algorithms via VBA
Heuristic Algorithms via VBA
CSE (c) S. Tanimoto, 2002 State-Space Search
POWER CHALLENGES Several Ways To Solve 7 CHALLENGES.
CSE (c) S. Tanimoto, 2004 State-Space Search
G5BAIM Artificial Intelligence Methods
Alpha-Beta Search.
Games & Adversarial Search
Exponential Functions Logarithmic Functions
Properties of Logarithms
Presentation transcript:

Combinatorial Explosion Limitation of computation Edward Tsang (Copyright) Wednesday, 01 May 2019

Combinations In A Password Suppose you can only use 0 .. 9 to make a password Suppose your password has 4 digits How many possible combinations? 104 Because there are 10 choices for the first digit, 10 for the second digit, …, etc. So there are 10×10×10×10 combinations For a password with n digits, there are 10n possibilities The number of possibilities grows exponentially as n grows This is called combinatorial explosion Edward Tsang (Copyright) Wednesday, 01 May 2019

Combinatorial Explosion Impact Suppose you enter 1 password per second A 4 digit password would take 104 seconds Or approximately 3 hours 5 digits: 28 hours 6 digits: 12 days 7 digits: 116 days 8 digits: 3 years Entering 10 passwords per second helps but not very meaningful for very long passwords Edward Tsang (Copyright) Wednesday, 01 May 2019

Combinatorial Explosion in Chess A Naïve chess program explores every possible moves, and every possible moves after that. There are 20 possible moves at start, typically more possibilities in mid-game. Assuming 20 possibilities per move, the program that considers k moves ahead will look at 20k possibilities The number of possibilities grows exponentially as k grows A grand master often looks 10 moves ahead There are 2010 possibilities, or 10 trillion to evaluates A program that calculates 1 million possibilities per second will take 118 days to make one move

Challenge in Computation Today’s computers are fast But they fail to contain combinatorial explosion Combinatorial Explosion is a core issue in computation It prevented computers from cracking passwords, beating chess world champions sooner, … Much research in: Finding out what problems can be solved efficiently Developing specialized methods for special problems By exploiting their properties

Limited by Combinatorial Explosion What could one do? Finding near-solutions Improving our odds

Finding approximate solutions One may not be able to find the optimal solution, but… For large operations, a saving of 0.5% means £millions Lower cost  higher chance to win a bid for construction projects So it helps to find near-solutions This is where optimization techniques may help

Improving the odds Given a fixed amount of time, one may not be able to guarantee finding solutions But being able to find solutions 65% of the time is better than 46% This is where heuristics may help

Summary Today’s computers are fast But not fast enough for some problems Due to the nature of the problem Combinatorial explosion is a major issue in computation