Example of pruning, Computer Engineering

Example of Pruning:

As an example, we are assume that the four choices for player one, there we are looking only two moves ahead 1 for player one and 1 for player two such as player are known as moves M1, M2, M3 and M4. In fact if we do a depth first search for player one's move, we can work out the score they are guaranteed just for M1 before even bearing in mind that move M2. Think that it turns out that player one is guaranteed to score 10 with move M1. We can just need this information to discard move M2 without checking all the potential for player two's move. Just for this instance, visualize that the first choice much possible for player two after M2 from player one technique that player one will score only 5 overall. In such for this case, we just know that the maximum player one can score with M2 is 5 or less. Naturally, player one won't choose this, is means that M1 will score 10 for them. We see that there's no point of to checking all the other potential of possibilities for M2. Whenever this can be seen in the following diagram (ignore the X's and N's for the time being):

1530_Example of Pruning.png

We that we could reject M2 straight away, because saving ourselves 3 nodes in the search space. We could reject M3 after we came across the 9, and in the end M4 turns out to be better than M1 for player one. In total, by proper using of alpha-beta pruning, we could say that we avoided looking at 5 end nodes out of 16 - around 30%. If there is the calculation to assess the scores at end-game states (or estimate them with an evaluation function) is computationally expensive, so this type of saving could enable a much more larger search. However, this kind of pruning can occur anywhere on the tree.

Posted Date: 1/10/2013 5:08:51 AM | Location : United States

Related Discussions:- Example of pruning, Assignment Help, Ask Question on Example of pruning, Get Answer, Expert's Help, Example of pruning Discussions

Write discussion on Example of pruning
Your posts are moderated
Related Questions
The next important effort in the direction of devising an electromechanical computer was made at Harvard University mutually sponsored by IBM and Department of UN Navy, Howard Aike

What are types of firewalls? There are conceptually two types of firewalls as: 1. Network Level 2. Application Level

How do I connect to an SQL Server instance that is running on a machine with multiple instances of SQL Server 2000? Ans) Every instance of MS SQL Server must be listening on a d

Create a class called  performance that records the information of a performance. The class should include at least five data items:  id,  title,  basePrice, startDate, endDate. Yo

Design a 1-bit full adder: Verify your design Use the 1-bit full adder to build a 4-bit adder with Ci=0 Verify: 1 + 4, and 9 + 9 Sram design: Cell: p - 0.5/0.045;

A red and blue car were involved in a head-on collision. The red car was at a standstill and the blue car was possibly  speeding. Eye witness video recorded suddenly following the

A part of an aircraft engine can be given a test before installation.  The test has a 75% chance of revealing a defect if it is present, and the same chance of passing a sound part

A call processor in an exchange requires 120 ms to service a complete call. What is the BHCA rating for the processor? If the exchange is capable of carrying 700 Erlangs of traffic

Q: Challenges and Prospects in Changing Information Technology? There is no doubt that information technology has made significant progress during the past two decades. Modern

Explain the Biometric Systems in brief. Biometrics: It is the science of measuring physical properties of living beings. Biometric Authentication: (a) This authenticati