Computers and Technology

Consider the following problem setup: You are the Head of the Computer Science department, and you are figuring out the tutorial schedule for the Tutors in the department. The department has X Tutors and Y tutorial sessions. Each tutorial session has a known time slot, and fortunately, at most 2 tutorials are in the same time slot. In the Y tutorial sessions, you need exactly Z of them to be exam prep sessions, and the rest to be normal tutorial sessions. The following conditions MUST hold:

-Exactly one Tutor is available for each tutorial
-A tutor cannot conduct 2 tutorials at the same time slot
-Some Tutors do not conduct normal tutorial sessions, some do not conduct exam prep sessions, and others can conduct either.
-If two tutorials are in the same time slot, you also don’t want them to be the same type of session for the sake of best allocation of resources.

Q1. Formulate this as a search problem. Specifically, define the state representation, the successor
function, the start state and the goal test.
Q2.
-Propose a search algorithm to tackle the problem.
If your choice is DFS/BFS, give an explanation for your choice
-If your choice is UCS/Greedy/A* search, explain in a paragraph what cost function and/or heuristic is
being used (A qualitative description of what
the cost function/heuristic does is sufficient).
-Calculate the state space size and the branching factor of the search tree​

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 00:30, huntbuck14
Which of the following methods could be considered a “best practice” in terms of informing respondents how their answers to an on-line survey about personal information will be protected? respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured. respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a usb flashdrive. the computer is located in a research team member’s office. the investigator uses the informed consent process to explain her institution’s method for guaranteeing absolute confidentiality of research data. the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents’ ip addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.
Answers: 1
image
Computers and Technology, 22.06.2019 15:00, taylorsamodell3217
Who is the first president to use social media as part of his campaign strategy
Answers: 1
image
Computers and Technology, 23.06.2019 13:00, alexacarillo
In excel - calculate the actual increase/decrease from first quarter to the second quarter then subtract subtract first quarter value from second quarter total then divide result by first quarter value
Answers: 1
image
Computers and Technology, 23.06.2019 14:30, kodak0531
Which of the following would not be considered a pc? a. mainframe b. desktop c. tablet pc d. laptop
Answers: 2
Do you know the correct answer?
Consider the following problem setup: You are the Head of the Computer Science department, and you...

Questions in other subjects:

Konu
History, 17.09.2019 12:50
Konu
Mathematics, 17.09.2019 12:50
Konu
Social Studies, 17.09.2019 12:50