Jessica Pearlman, Melissa Ackley, and Kate Stansfield

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Graph Algorithms Algorithm Design and Analysis Victor AdamchikCS Spring 2014 Lecture 11Feb 07, 2014Carnegie Mellon University.
Heuristic Search techniques
Great Theoretical Ideas in Computer Science for Some.
Lecture 7 March 1, 11 discuss HW 2, Problem 3
Chapter 4 Downcasts and Upcasts. 4.1 Downcasts At first we assume the case where the root has m distinct items A = {  1, …,  m }, each destined to one.
CSC411Artificial Intelligence 1 Chapter 3 Structures and Strategies For Space State Search Contents Graph Theory Strategies for Space State Search Using.
Theory Of Automata By Dr. MM Alam
Introduction to Graph Theory Instructor: Dr. Chaudhary Department of Computer Science Millersville University Reading Assignment Chapter 1.
Chapter 4 Distributed Bellman-Ford Routing
Depth-First Search1 Part-H2 Depth-First Search DB A C E.
Greedy Algorithms Greed is good. (Some of the time)
Great Theoretical Ideas in Computer Science for Some.
Searching Algorithms Finding what you are looking for.
Basic Feasible Solutions: Recap MS&E 211. WILL FOLLOW A CELEBRATED INTELLECTUAL TEACHING TRADITION.
Jeffrey D. Ullman Stanford University Flow Graph Theory.
Network Optimization Models: Maximum Flow Problems
Data Structures, Spring 2004 © L. Joskowicz 1 Data Structures – LECTURE 14 Strongly connected components Definition and motivation Algorithm Chapter 22.5.
Lance Danzy Melinda Katanbafnezhad. The “A Mazing Problem” is a classical experiment from psychology where scientists carefully observe a rat going through.
1 Mazes In The Theory of Computer Science Dana Moshkovitz.
CS 536 Spring Global Optimizations Lecture 23.
An Euler Circuit is a cycle of an undirected graph, that traverses every edge of the graph exactly once, and ends at the same node from which it began.
Spring 2010CS 2251 Graphs Chapter 10. Spring 2010CS 2252 Chapter Objectives To become familiar with graph terminology and the different types of graphs.
Chapter 10 Recursion. Copyright © 2005 Pearson Addison-Wesley. All rights reserved Chapter Objectives Explain the underlying concepts of recursion.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
מבנה המחשב – מבוא למחשבים ספרתיים Foundations of Combinational Circuits תרגול מספר 3.
The Euler-tour technique
Data Structures, Spring 2006 © L. Joskowicz 1 Data Structures – LECTURE 14 Strongly connected components Definition and motivation Algorithm Chapter 22.5.
Prof. Bodik CS 164 Lecture 16, Fall Global Optimization Lecture 16.
15.082J, 6.855J, and ESD.78J September 21, 2010 Eulerian Walks Flow Decomposition and Transformations.
Complexity of Bellman-Ford Theorem. The message complexity of Bellman-Ford algorithm is exponential. Proof outline. Consider a topology with an even number.
Chapter 9 – Graphs A graph G=(V,E) – vertices and edges
Algorithms: Design and Analysis Summer School 2013 at VIASM: Random Structures and Algorithms Lecture 3: Greedy algorithms Phan Th ị Hà D ươ ng 1.
Problem Solving and Mazes
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Lecture 5: Backtracking Depth-First Search N-Queens Problem Hamiltonian Circuits.
Lecture 07: Formal Methods in SE Finite Automata Lecture # 07 Qaisar Javaid Assistant Professor.
Chapter 4 Recursion. Copyright © 2004 Pearson Addison-Wesley. All rights reserved.1-2 Chapter Objectives Explain the underlying concepts of recursion.
ASC2003 (July 15,2003)1 Uniformly Distributed Sampling: An Exact Algorithm for GA’s Initial Population in A Tree Graph H. S.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
State-Space Searches. 2 State spaces A state space consists of A (possibly infinite) set of states The start state represents the initial problem Each.
Discrete Structures Lecture 12: Trees Ji Yanyan United International College Thanks to Professor Michael Hvidsten.
Complexity of Bellman-Ford
A correction The definition of knot in page 147 is not correct. The correct definition is: A knot in a directed graph is a subgraph with the property that.
CS 4407, Algorithms University College Cork, Gregory M. Provan Network Optimization Models: Maximum Flow Problems In this handout: The problem statement.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Basic Problem Solving Search strategy  Problem can be solved by searching for a solution. An attempt is to transform initial state of a problem into some.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Nirmalya Roy School of Electrical Engineering and Computer Science Washington State University Cpt S 223 – Advanced Data Structures Math Review 1.
M Clements Formal Network Theory. Introduction Practical problem – The Seven Bridges of Königsberg Network graphs Nodes & edges Degrees Rules/ axioms.
1 Mathematical Preliminaries. 2 Sets Functions Relations Graphs Proof Techniques.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Great Theoretical Ideas in Computer Science for Some.
 2004 SDU 1 Lecture5-Strongly Connected Components.
CSC317 1 At the same time: Breadth-first search tree: If node v is discovered after u then edge uv is added to the tree. We say that u is a predecessor.
1 Traversal Algorithms  sequential polling algorithm  traversing connected networks (tree construction) complexity measures tree terminology tarry’s.
Breadth-First Search (BFS)
Depth-First Search N-Queens Problem Hamiltonian Circuits
Shortest Path from G to C Using Dijkstra’s Algorithm
Euler Paths and Circuits
Solving Mazes Troy Mahon.
Alyce Brady CS 470: Data Structures CS 510: Computer Algorithms
CSE 421: Introduction to Algorithms
“Enter Group Name” Tyler Atkinson and Dylan Menchetti
CSCI-2400 Models of Computation.
Graphs Part 2 Adjacency Matrix
Copyright © Aiman Hanna All rights reserved
Algorithms to Solve Mazes An Application of Graph Theory
Graph Theory Proof In Class Exercise.
Presentation transcript:

Jessica Pearlman, Melissa Ackley, and Kate Stansfield MAZES Jessica Pearlman, Melissa Ackley, and Kate Stansfield

What is a maze? A maze is an intricate network of paths, usually designed as a puzzle. Thus, a maze has branches. In order to learn how to solve a maze we need to learn how to graph a maze. A junction is where two or more paths meet. When graphing mazes you label all junctions and dead ends with letters.

Transforming a Maze into a Graph http://fds.oup.com/www.oup.co.uk/pdf/0-19-850770-4.pdf

The Wall Follower Algorithm If a maze is simple it can be solved using the wall follower algorithm. The goal may be achieved by following a wall As you enter the maze, place your left hand on the left wall and march forward. When you reach a junction follow the most leftward path. (Left Hand Rule) The Right Hand Rule can also be used. Simply use your right hand to follow the right wall.

The Wall Follow Algorithm Continued… The wall follower algorithm cannot be used in a cyclic maze. - You will arrive back at your original position and continue to walk in a circle The algorithm will always work in a acyclic maze

Tarry’s Algorithm http://cs.uvm.edu/~snapp/teaching/cs32/lectures/tremaux.pdf

Proving Tarry’s Algorithm Rule 1: Send the token towards any neighbor exactly once. Rule 2: If Rule 1 cannot be used to send the token, then send the token to its parent. When the token returns to the root, the entire graph has been traversed. http://www.divms.uiowa.edu/~ghosh/graph.pdf

Proving Tarry’s Algorithm Continued… Lemma: The token has a valid move until it returns to the root. Proof (by induction): (Basis) When the token is at the root, Rule 1 is applicable. (Inductive case) Assume that the token is at a node i that is not the root. If Rule 1 does not apply, then Rule 2 must be applicable since the path from i to its parent remains to be traversed. It is not feasible for the token to stay at i if that path is already traversed. So, the token has a valid move.

Conclusion of Proof If you follow these rules, you’re guaranteed to walk each path once in each direction and never twice in the same direction That guarantees that you’ve visited every place in the maze and therefore must have reached the destination

References Biggs, Norman L., E. Keith Lloyd, and Robin J. Wilson. Graph Theory 1736 - 1936. Walton Street: Oxford UP, 1976. Print. Robert R. Snapp. 5. Threading Mazes. Department of Computer Science, University of Vermont. 19 September, 2011. http://cs.uvm.edu/~snapp/teaching/cs32/lectures/tremaux.pdf Graphs and Mazes. Durham Gifted and Talented Summer School, Durham University, August 2009. http://maths.dur.ac.uk/~dma0vk/Outreach/GTschoolAug09/gr aphsmazes.pdf Graph Algorithms. Ghosh: Distributed Systems. University of Iowa. http://www.divms.uiowa.edu/~ghosh/graph.pdf And thanks to Professor Archdeacon for being a great mentor!

The End Any Questions?