Demonstrate arc consistency, Computer Engineering

Demonstrate Arc consistency:

To demonstrate the worth of performing an arc-consistency check before starting a serarch for a solution, we'll use an example from Barbara Smith's tutorial. Suppose that we have four tasks to complete, A, B, C and D, and we're trying to schedule them. They are subject to the constraints that: 

-  Task A lasts 3 hours and precedes tasks B and C 

-  Task B lasts 2 hours and precedes task D 

-  Task C lasts 4 hours and precedes task D 

-  Task D lasts 2 hours 

We will model this problem with a variable for each of the task start times, namely startA, startB, startC and startD. We'll also have a variable for the overall start time: start, and a variable for the overall finishing time: finish. We will say that the domain for variable  start  is {0}, but the domains for all the other variables is {0,1,...,11}, because the summation of the duration of the tasks is 3 + 2 + 4 + 2 = 11. We can now translate our English specification of the constraints into our formal model.

Posted Date: 1/11/2013 7:36:52 AM | Location : United States







Related Discussions:- Demonstrate arc consistency, Assignment Help, Ask Question on Demonstrate arc consistency, Get Answer, Expert's Help, Demonstrate arc consistency Discussions

Write discussion on Demonstrate arc consistency
Your posts are moderated
Related Questions
How semaphores implement mutual exclusion? Mutual-exclusion implementation along with semaphores: Assume that there are n-processes and they share a semaphore, mutex (stan

Biological Motivation : However remember there that in discussion first lecture is about how people have answered the question like: "How are we going to get an agent to proce

State the term in detail $strobe $strobe. This task is very similar to $display task except for a slight difference.  If many other statements are executed in same time unit as

Public Key Infrastructure solutions The use of public-key based security systems requires great attention and due care in design and management of security features. The secur

What are micrographics? A micrographic is an image or photographic reproduction of an object which is then changed to film. Micrographics are frequently used for permanent reco

Not at this time. With GIMP based on GEGL, so that all changes are non-destructive, it will be much easier to execute this feature by just remembering all nodes in given range and

RDBMS relational database system - Relational databases are composed of relations and managed through relational operations, and governed through data integrity constraints.

Explain What is the difference among embedded systems and the system in which RTOS is running? Ans) Embedded system can have RTOS and cannot have also. It depends on the requi

The data bus is Bi-directional because the similar bus is used for transfer of data among Micro Processor and memory or input / output devices in both the direction.

There are many different forms of micro-controller and a manufacturer, selecting the proper micro-controller for your application is one of the critical decisions which controls th