Describe constraints which encode that cell is observed

Assignment Help Basic Computer Science
Reference no: EM1388485

There is 3x3 grid. Each cell in grid may have a mine or not. For each cell, either it is observed or not. If cell is observed, an indicator for that cell is true iff that cell or one of its diagonally adjacent cells (northeast, northwest, southeast, southwest) has mine in it (note that the "or" here is a standard "disjunctive or", not an "exclusive or").

(a) Describe all binary variables required for propositional encoding of this Minesweeper problem. Provide your propositional variables interpretable names like m 1 2 for variable indicating whether mine is in cell (1, 2). As a function of n, how many variables are required to encode Minesweeper for grid of dimension n × n?

(b) Describe constraints which encode that cell (1, 2) is observed and indicates mine is not present, that cell (2, 1) is observed and indicates a mine is present, and that remaining cells are unobserved.

(c) Describe remaining constraints for this problem need to enforce consistency between all of variables. Note that corner, edge, and middle portions of grid should be treated separately when finding adjacency, e.g., a corner only has one diagonally adjacent cell whereas middle cell (2, 2) has four diagonally adjacent cells. Your constraint encoding must use ) and, and hence must not be in CNF.

(d) Give step-by-step CNF transformation of shortest axiom from (c) which involves the proposition m 1 1.

(e) Encode knowledge base constraints (b) and (c) in DIMACS CNF format explained below. In DIMACS comments, show mapping between variable names and DIMACS variable IDs (e.g., m 1 2 ! 5). Write listing of your DIMACS file. To avoid errors, it is strongly recommended that you write short program or script to generate DIMACS file automatically.

Reference no: EM1388485

Questions Cloud

Question about virology : It is January and the starting of a new semester. Just as you get settled in to your new routine, you begin to notice that illness is spreading across campus and other students in your classes are so sick they do not come to virology class.
Explain the difference between phenotype : Assume you are a clinician in a small hospital and are monitoring the progression of myclonic epilepsy in twin boys. One twin remains only mildly affected by the condition.
Probability of selecting marbles : A bowl with 10 marbles: 2 red marbles, 3 green marbles, and 5 blue marbles. We randomly select 4 marbles from the bowl, WITH REPLACEMENT, that is once a marble is selected, its color is noted and the marble is put back in the bowl (notice this doe..
Add the form which includes richtextbox control : Add the form which includes RichTextBox control and several predefined template letters. This part of program would be used to write letters to your customers.
Describe constraints which encode that cell is observed : Describe constraints which encode that cell (1, 2) is observed and indicates mine is not present, that cell (2, 1) is observed and indicates a mine is present, and that remaining cells are unobserved.
Create software to perform advanced geometric calculations : You are hired by the engineering company to create software which performs advanced geometric calculations. Your new boss asked you to create the application
A quality analyst wants to construct a sample mean chart : A quality analyst wants to construct a sample mean chart for controlling a packaging process. He knows from past experience that the process standard deviation is two ounces
Binding ribosomes and synthesizing leader peptides : Create a model that would permit the attenuation region to no longer be involved in binding ribosomes and synthesizing leader peptides after the attenuation decision is made.
Consumers to determine their ranked preferences : A market research company surveyed consumers to determine their ranked preferences of energy drinks among the brands Monster, Red Bull, and Rockstar.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Program to print astericks for every number that user enters

One interesting application of computers is drawing of graphs and bar charts (sometimes called histograms). Write down script which reads five numbers between 1 and 30.

  Local telephone calls and long distance telephone calls

Will the distinction between local telephone calls and long distance telephone calls ever disappear? What may cause this to happen?

  Write the diffent entities or objects

Write the diffent entities or objects,logical processes,data flows, and dfata stores which are involoved. starting from time you submitted your time sheet.

  Why software products has successful growth strategy

Software products like Linux be a successful growth strategy in "brutally competitive marketplace" in which it operates? Explain why or why not?

  Banner advertising on web sites trigger realization

Banner advertising on Web sites helps trigger realization that there is gap between reality and desired state which occurs in?

  Analyze use of databases in business environment

Create the 2-3 page memorandum analyzing use of databases in the business environment. Include what database applications must be used: Microsoft Access, IBM DB2, Oracle, etc.

  Determine ones complement of sum eight-bit bytes

UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes?

  Describe retail events in terms of pci compliance standard

You visit retail establishment, shop around, and ultimately carry several products to one of the point of sale. Document each main events just explained and describe them in terms of PCI compliance standard.

  Explain one technological device

Explain one technological device in 350 to 700 words. Include the following:When did it come (or will it potentially come) into existence? What scientific or technological reasoning explains how this potential will be (or can be) be reached in t..

  Explaining leverage data from across enterprise

Many companies have executed ____________ to enable managers and knowledge workers to leverage data from across enterprise.

  Receiver initiated distributed scheduling algorithms

Receiver initiated distributed scheduling algorithms suppose task pre-emption at the sender site.

  What is big-o complexity of method

Write a method maxVal that accepts as parameter the reference to the head node of a linked list of integers. The method should return the largest value in the list. What is the Big-O complexity of the method maxVal?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd