Optimum solution based on constraint problems, Computer Engineering

Assignment Help:

Optimum solution based on constraint problems:

Whether depending on what solver you are using so there constraints are often expressed as relationships between variables as e.g., x1 + x2 < x3. Moreover,, just to be able to discuss constraints more formally that we use the following notation regularly: 

So here a constraint Cijk  justified that tuples of values variables xi, xj  and xk  all are allowed to take simultaneously. However in plain English there a constraint normally talks regaids things that can't happen so but in our formalism then we are looking at tuples as vi, vj, vk that xi, xj and xk can take simultaneously. Moreover as a simple example, now assume we have a CSP with two variables x and y, and in which x can take values {1,2,3}, when y can take values {2,3}. After then the constraint that x=y would be written like: 

Cxy={(2,2), (3,3)}, 

So there the constraint that x

Cxy = {(1,2),(1,3),(2,3)} 

Conversely a solution to a CSP is an assignment of values that one to each variable in such a way that no constraint is broken. So here it depends on the problem at hand so the user might want to know that there is a solution such i.e., they will take the first answer given.

However they may utilize all the solutions to the problem and they might want to know that no solution exists. In fact sometimes there the point of the exercise is to find the optimum solution based on some measure of worth. So sometimes, it's possible to do this without enumerating all the solutions thus other times there it will be necessary to find all solutions or then work out which is the optimum. However in the high-IQ problem there a solution is simply a set of lengths, one per square. Mostly the shaded one is the 17th biggest that answers the IQ question.


Related Discussions:- Optimum solution based on constraint problems

Algorithm and pseudocodes, develop an algorithm using pseudocode for comput...

develop an algorithm using pseudocode for computing cos(x) and sin(x). use a sentinel controlled while loop. use the series definition of e^+-jx

Algorithm to insert a key in b-tree, Algorithm to insert a key in B-tree is...

Algorithm to insert a key in B-tree is as follows: 1.  First search is completed for the place where the new record must be put. As the keys are inserted, they are sorted into

What is tcas, tCAS is the number of clock cycles required to access a parti...

tCAS is the number of clock cycles required to access a particular column of data in SDRAM. CAS latency is the column address strobe time, sometimes referred to as tCL.

How future environment changes can be predicted - simulation, How future cl...

How future climate/environment changes can be predicted -  Information over time is fed into a weather/climate model -  based on changes in weather patterns, carries out a s

By which exposing EPROM contents can be erased, EPROM contents can be eras...

EPROM contents can be erased by exposing it to ? Ans. By exposing EPROM contents to Ultraviolet rays, it can be erased. The Ultraviolet (UV) light passes throughout a window i

Time Complexity, how to determiner time complexity of any given polynomial ...

how to determiner time complexity of any given polynomial in data structure?

Explain disadvantage of optimal page replacement algorithm, Explain Disadva...

Explain Disadvantage of Optimal Page Replacement Algorithm Optimal page replacement algorithm cannot be implemented in the general purpose operating system as it is impossible

Draw and elucidate the block diagram 8259, Draw and elucidate the block dia...

Draw and elucidate the block diagram of programmable interrupt controller 8259. The 8259A adds 8 vectored priority encoded interrupts to microprocessor. It can be expanded to 6

Software aspects - computer technology , Software Aspects: Software is...

Software Aspects: Software is a generic term covering the concepts, procedures and instructions which enable computer systems to do useful things. Usually, software is conceiv

What is the cih, CIH, also known  as Chernobyl or Spacefiller, is a Microso...

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd