We provides tutorials and interview questions of all technology like java tutorial, android, java frameworks
G-13, 2nd Floor, Sec-3, Noida, UP, 201301, India
[email protected] .
Latest Post
PRIVACY POLICY
Online compiler.
Data Science Central
This problem appeared as a project in the edX course ColumbiaX: CSMM.101x Artificial Intelligence (AI) . In this assignment an agent will be implemented to solve the 8-puzzle game (and the game generalized to an n × n array).
The following description of the problem is taken from the course:
An instance of the n-puzzle game consists of a board holding n^2-1 distinct movable tiles, plus an empty space. The tiles are numbers from the set 1,..,n^2-1 . For any such board, the empty space may be legally swapped with any tile horizontally or vertically adjacent to it. In this assignment, the blank space is going to be represented with the number 0. Given an initial state of the board, the combinatorial search problem is to find a sequence of moves that transitions this state to the goal state; that is, the configuration with all tiles arranged in ascending order 0,1,… ,n^2−1 . The search space is the set of all possible states reachable from the initial state. The blank space may be swapped with a component in one of the four directions {‘Up’, ‘Down’, ‘Left’, ‘Right’} , one move at a time. The cost of moving from one configuration of the board to another is the same and equal to one. Thus, the total cost of path is equal to the number of moves made from the initial state to the goal state.
The searches begin by visiting the root node of the search tree, given by the initial state. Among other book-keeping details, three major things happen in sequence in order to visit a node:
This describes the life-cycle of a visit, and is the basic order of operations for search agents in this assignment—(1) remove, (2) check, and (3) expand. In this assignment, we will implement algorithms as described here.
Example: breadth-first search.
The output file should contain exactly the following lines:
path_to_goal: [‘Up’, ‘Left’, ‘Left’] cost_of_path: 3 nodes_expanded: 10 fringe_size: 11 max_fringe_size: 12 search_depth: 3 max_search_depth: 4 running_time: 0.00188088 max_ram_usage: 0.07812500
The following algorithms are going to be implemented and taken from the lecture slides from the same course.
The following figures and animations show how the 8-puzzle was solved starting from different initial states with different algorithms. For A* and ID-A* search we are going to use Manhattan heuristic , which is an admissible heuristic for this problem. Also, the figures display the search paths from starting state to the goal node (the states with red text denote the path chosen). Let’s start with a very simple example. As can be seen, with this simple example all the algorithms find the same path to the goal node from the initial state.
The nodes expanded by BFS (also the nodes that are in the fringe / frontier of the queue) are shown in the following figure:
The path to the goal node (as well as the nodes expanded) with ID-A* is shown in the following figure:
Now let’s try a little more complex examples:
Example 2: Initial State: 1,4,2,6,5,8,7,3,0
The path to the goal node with A* is shown in the following figure:
All the nodes expanded by A* (also the nodes that are in the fringe / frontier of the queue) are shown in the following figure:
The path to the goal node with BFS is shown in the following figure:
All the nodes expanded by BFS are shown in the following figure:
Example 3: Initial State: 1,0,2,7,5,4,8,6,3
The path to the goal node with A* is shown in the following figures:
The nodes expanded by A* (also the nodes that are in the fringe / frontier of the priority queue) are shown in the following figure (the tree is huge, use zoom to view it properly):
The nodes expanded by ID-A* are shown in the following figure (again the tree is huge, use zoom to view it properly):
The same problem (with a little variation) also appeared a programming exercise in the Coursera Course Algorithm-I (By Prof. ROBERT SEDGEWICK , Princeton ) . The description of the problem taken from the assignment is shown below (notice that the goal state is different in this version of the same problem):
Write a program to solve the 8-puzzle problem (and its natural generalizations) using the A* search algorithm.
(2) The following 15-puzzle is solvable in 6 steps , as shown below:
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
Related Content
EnjoyMathematics
This blog highlights some popular problem-solving strategies for solving problems in DSA. Learning to apply these strategies could be one of the best milestones for the learners in mastering data structure and algorithms.
One of the simple ideas of our daily problem-solving activities is that we build the partial solution step by step using a loop. There is a different variation to it:
Here are some approaches based on loop: Using a single loop and variables, Using nested loops and variables, Incrementing the loop by a constant (more than 1), Using the loop twice (Double traversal), Using a single loop and prefix array (or extra memory), etc.
Example problems: Insertion Sort , Finding max and min in an array , Valid mountain array , Find equilibrium index of an array , Dutch national flag problem , Sort an array in a waveform .
This strategy is based on finding the solution to a given problem via its one sub-problem solution. Such an approach leads naturally to a recursive algorithm, which reduces the problem to a sequence of smaller input sizes. Until it becomes small enough to be solved, i.e., it reaches the recursion’s base case.
Example problems: Euclid algorithm of finding GCD , Binary Search , Josephus problem
When an array has some order property similar to the sorted array, we can use the binary search idea to solve several searching problems efficiently in O(logn) time complexity. For doing this, we need to modify the standard binary search algorithm based on the conditions given in the problem. The core idea is simple: calculate the mid-index and iterate over the left or right half of the array.
Example problems: Find Peak Element , Search a sorted 2D matrix , Find the square root of an integer , Search in Rotated Sorted Array
This strategy is about dividing a problem into more than one subproblems, solving each of them, and then, if necessary, combining their solutions to get a solution to the original problem. We solve many fundamental problems efficiently in computer science by using this strategy.
Example problems: Merge Sort , Quick Sort , Median of two sorted arrays
The two-pointer approach helps us optimize time and space complexity in the case of many searching problems on arrays and linked lists. Here pointers can be pairs of array indices or pointer references to an object. This approach aims to simultaneously iterate over two different input parts to perform fewer operations. There are three variations of this approach:
Pointers are moving in the same direction with the same pace: Merging two sorted arrays or linked lists, Finding the intersection of two arrays or linked lists , Checking an array is a subset of another array , etc.
Pointers are moving in the same direction at a different pace (Fast and slow pointers): Partition process in the quick sort , Remove duplicates from the sorted array , Find the middle node in a linked list , Detect loop in a linked list , Move all zeroes to the end , Remove nth node from list end , etc.
Pointers are moving in the opposite direction: Reversing an array, Check pair sum in an array , Finding triplet with zero-sum , Rainwater trapping problem , Container with most water , etc.
A sliding window concept is commonly used in solving array/string problems. Here, the window is a contiguous sequence of elements defined by the start and ends indices. We perform some operations on elements within the window and “slide” it in a forward direction by incrementing the left or right end.
This approach can be effective whenever the problem consists of tasks that must be performed on a contiguous block of a fixed or variable size. This could help us improve time complexity in so many problems by converting the nested loop solution into a single loop solution.
Example problems: Longest substring without repeating characters , Count distinct elements in every window , Max continuous series of 1s , Find max consecutive 1's in an array , etc.
This approach is based on transforming a coding problem into another coding problem with some particular property that makes the problem easier to solve. In other words, here we solve the problem is solved in two stages:
Example problems: Pre-sorting based algorithms (Finding the closest pair of points, checking whether all the elements in a given array are distinct, etc.)
Most tree and graph problems can be solved using DFS and BFS traversal. If the problem is to search for something closer to the root (or source node), we can prefer BFS, and if we need to search for something in-depth, we can choose DFS.
Sometimes, we can use both BFS and DFS traversals when node order is not required. But in some cases, such things are not possible. We need to identify the use case of both traversals to solve the problems efficiently. For example, in binary tree problems:
To solve tree and graph problems, sometimes we pass extra variables or pointers to the function parameters, use helper functions, use parent pointers, store some additional data inside the node, and use data structures like the stack, queue, and priority queue, etc.
Example problems: Find min depth of a binary tree , Merge two binary trees , Find the height of a binary tree , Find the absolute minimum difference in a BST , The kth largest element in a BST , Course scheduling problem , bipartite graph , Find the left view of a binary tree , etc.
The data structure is one of the powerful tools of problem-solving in algorithms. It helps us perform some of the critical operations efficiently and improves the time complexity of the solution. Here are some of the key insights:
Example problems: Next greater element , Valid Parentheses , Largest rectangle in a histogram , Sliding window maximum , kth smallest element in an array , Top k frequent elements , Longest common prefix , Range sum query , Longest consecutive sequence , Check equal array , LFU cache , LRU cache , Counting sort
Dynamic programming is one of the most popular techniques for solving problems with overlapping or repeated subproblems. Here rather than solving overlapping subproblems repeatedly, we solve each smaller subproblems only once and store the results in memory. We can solve a lot of optimization and counting problems using the idea of dynamic programming.
Example problems: Finding nth Fibonacci, Longest Common Subsequence , Climbing Stairs Problem , Maximum Subarray Sum , Minimum number of Jumps to reach End , Minimum Coin Change
This solves an optimization problem by expanding a partially constructed solution until a complete solution is reached. We take a greedy choice at each step and add it to the partially constructed solution. This idea produces the optimal global solution without violating the problem’s constraints.
Example problems: Fractional Knapsack, Dijkstra algorithm, The activity selection problem
This strategy explores all possibilities of solutions until a solution to the problem is found. Therefore, problems are rarely offered to a person to solve the problem using this strategy.
The most important limitation of exhaustive search is its inefficiency. As a rule, the number of solution candidates that need to be processed grows at least exponentially with the problem size, making the approach inappropriate not only for a human but often for a computer as well.
But in some situations, there is a need to explore all possible solution spaces in a coding problem. For example: Find all permutations of a string , Print all subsets , etc.
Backtracking is an improvement over the approach of exhaustive search. It is a method for generating a solution by avoiding unnecessary possibilities of the solutions! The main idea is to build a solution one piece at a time and evaluate each partial solution as follows:
In simple words, backtracking involves undoing several wrong choices — the smaller this number, the faster the algorithm finds a solution. In the worst-case scenario, a backtracking algorithm may end up generating all the solutions as an exhaustive search, but this rarely happens!
Example problems: N-queen problem , Find all k combinations , Combination sum , Sudoku solver , etc.
Some of the coding problems are, by default, mathematical, but sometimes we need to identify the hidden mathematical properties inside the problem. So the idea of number theory and bit manipulation is helpful in so many cases.
Sometimes understanding the bit pattern of the input and processing data at the bit level help us design an efficient solution. The best part is that the computer performs each bit-wise operation in constant time. Even sometimes, bit manipulation can reduce the requirement of extra loops and improve the performance by a considerable margin.
Example problems: Reverse bits , Add binary string , Check the power of two , Find the missing number , etc.
Hope you enjoyed the blog. Later we will write a separate blog on each problem-solving approach. Enjoy learning, Enjoy algorithms!
Self-paced courses and blogs.
New citation alert added.
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Please log in to your account
Bibliometrics & citations, view options, index terms.
Computing methodologies
Artificial intelligence
Search methodologies
Continuous space search
Randomized search
Symbolic and algebraic manipulation
Symbolic and algebraic algorithms
Optimization algorithms
Mathematics of computing
Mathematical analysis
Mathematical optimization
Continuous optimization
Bio-inspired optimization
Discrete optimization
Optimization with randomized search heuristics
Theory of computation
Design and analysis of algorithms
Evolutionary algorithms
A bacterial gene recombination algorithm for solving constrained optimization problems.
Creature evolution manifests itself in the improved ability of species to adapt to their surroundings. Swarm intelligence and gene optimization are found in the population of interacting agents that are able to self-organize and self-strengthen. In this ...
In the past few decades, many different metaheuristic algorithms have been developed for optimization purposes each of which have specific advantages and disadvantages due to multiple applications in different optimization fields. The ...
Constraint optimization is one of the major fields of decision science where variables and solutions are often constrained or restricted to a certain feasible space only. Moreover, it is always not possible to replace constraints by penalization ...
Published in.
Netherlands
Author tags.
Other metrics, bibliometrics, article metrics.
Login options.
Check if you have access through your login credentials or your institution to get full access on this article.
Share this publication link.
Copying failed.
Affiliations, export citations.
We are preparing your search results for download ...
We will inform you here when the file is ready.
Your file of search results citations is now ready.
Your search export query has expired. Please try again.
By Brad Miller and David Ranum, Luther College
There is a wonderful collection of YouTube videos recorded by Gerry Jenkins to support all of the chapters in this text.
We are very grateful to Franklin Beedle Publishers for allowing us to make this interactive textbook freely available. This online version is dedicated to the memory of our first editor, Jim Leisy, who wanted us to “change the world.”
Search Page
You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
Find support for a specific problem in the support section of our website.
Please let us know what you think of our products and services.
Visit our dedicated information section to learn more about MDPI.
An improved iterated greedy algorithm for solving collaborative helicopter rescue routing problem with time window and limited survival time.
2. literature review, 3. problem formulation, 3.1. problem description, 3.2. problem formulation, 4. improved iterative greedy algorithm, 4.1. framework of the iig.
The framework of the proposed IIG algorithm | |
the information on rescue locations | |
the best solution | |
1 | Generate an initial solution X by using the initialization strategy |
2 | the termination condition is not satisfied |
3 | X = Destruction (X); |
4 | X’ = Construction (X , X ); |
5 | X* = Local search (X’); |
6 | the optimal solution found up to now |
7 | Y = Acceptance criterion (X, X*); |
8 | Temperature = T *sum (u )/n*m*10; |
9 | X’< X* |
10 | X* = X’; |
11 | |
12 | |
13 | |
14 | the best solution X* |
4.3. initialization strategy.
Heuristic initialization strategy | |
instance information | |
an initial solution | |
1 | Arrange all rescue sites in ascending order based on survivors’ life strength and place them into set S ; |
2 | each site i within the set S |
3 | each helicopter k |
4 | each position u |
5 | rescue site i can be added to the current position u |
6 | Store the position u into set S ; |
7 | |
8 | |
9 | |
10 | Choose the optimal position from the set S and add site i to the position u; |
11 | the insert operation of the site i is failed |
12 | Add a new helicopter and allocate the site i to this helicopter; |
13 | |
14 | |
15 | Store the generated solution |
Feasible-first destruction-construction strategy | |
a solution | |
a new solution | |
1 | Add each rescue site to set S ; |
2 | Select one rescue site i randomly from S and add this rescue site into set S ; |
3 | Delete the chosen rescue site i from S ; |
4 | each rescue site j in S |
5 | Calculate the distance for each arc a(i, j); |
6 | |
7 | Sort the set S in ascending order based on all arcs a(i, j); |
8 | Move (n×d−1) rescue sites ahead of S to S ; |
9 | Delete set S from the current solution; |
10 | each rescue site i in the set S |
11 | each helicopter k |
12 | each position u |
13 | site i can be added to the current position u |
14 | Store the position u into set S ; |
15 | |
16 | |
17 | |
18 | Select the optimal position from the set S and add site i to the position u; |
19 | insert the site i failed |
20 | Add a new helicopter and allocate the site i to this helicopter; |
21 | |
22 |
The local search strategy | |
a solution | |
an improved solution | |
1 | r = rand ()%2, cnt = 0; |
2 | r |
3 | 0: |
4 | cnt < m |
5 | Randomly select a helicopter k; |
6 | Randomly select a rescue site i in the helicopter k; |
7 | each of the other rescue site j in the helicopter k |
8 | Swap rescue site i and rescue site j; |
9 | |
10 | Select the best solution; |
11 | |
12 | 1: |
13 | cnt < m |
14 | Selected the rescue site i with the largest anteroposterior distance in the helicopter k; |
15 | Remove the rescue site i from the current solution; |
16 | each helicopter k in the current solution |
17 | each position u |
18 | site i can be added to the current position u |
19 | Store the position u into set S ; |
20 | |
21 | |
22 | |
23 | Choose the optimal position from the set S and add site i to the position u; |
24 | |
25 | 2: |
26 | cnt < m |
27 | Randomly select helicopter k and the rescue sites along its route are stored in the set S ; |
28 | Delete the set S from the current solution; |
29 | each rescue site i in the set S |
30 | each helicopter k in the current solution |
31 | each position u |
32 | site i can be added to the current position u |
33 | Store the position u into set S ; |
34 | |
35 | |
36 | |
37 | Choose the optimal position from the set S and add site i to the position u; |
38 | insert the site i failed |
39 | Add one helicopter and allocate the site i to this helicopter; |
40 | |
41 | |
42 | |
43 |
5. experiment results, 5.1. experimental instances, 5.2. parameters setting, 5.3. effectiveness of the local search strategy, 5.4. effectiveness of the sa-based acceptance criterion, 5.5. effectiveness evaluation against the known optimal solutions, 5.6. comparison with two efficient heuristic algorithms, 5.7. comparisons with several efficient algorithms, 6. conclusions and future works, author contributions, data availability statement, acknowledgments, conflicts of interest.
Click here to enlarge figure
Notations | Description |
---|---|
0 | Index of the rescue center |
N | Set of all nodes, including the rescue sites and the rescue center |
R | Set of all rescue locations |
H | Set of all helicopters |
TH | Set of transport helicopters |
MH | Set of medical helicopters |
a | Earliest possible rescue time of location i, i ∈ N |
b | Latest possible rescue time of location i, i ∈ N |
d | Distance between locations i and j, i,j ∈ N, i ≠ j |
dm | Demand for the supplies of location i, i ∈ N |
dp | The number of survivors waiting to be rescued at the rescue site i, i ∈ N |
lt | Life strength for survivors at the rescue site i, i ∈ N |
cm | Maximum capacity for the material of transport helicopter k, k ∈ TH |
tt | Minimum life strength threshold of transport helicopter k, k ∈ TH |
cp | Maximum capacity for casualty care of medical helicopter k, k ∈ MH |
mt | Minimum life strength threshold of medical helicopter k, k ∈ MH |
t | Service duration for rescue site i, i ∈ N |
u | Start time of service for rescue site i, i ∈ N, k ∈ H |
Parameters | Levels | |||
---|---|---|---|---|
1 | 2 | 3 | 4 | |
d | 0.1 | 0.2 | 0.3 | 0.4 |
T | 0.2 | 0.3 | 0.4 | 0.5 |
d | T | Average Values |
---|---|---|
1 | 1 | 1862.75 |
1 | 2 | 1886.63 |
1 | 3 | 1896.69 |
1 | 4 | 1892.37 |
2 | 1 | 1704.23 |
2 | 2 | 1754.04 |
2 | 3 | 1712.81 |
2 | 4 | 1716.56 |
3 | 1 | 1799.72 |
3 | 2 | 1803.39 |
3 | 3 | 1776.82 |
3 | 4 | 1798.90 |
4 | 1 | 1867.13 |
4 | 2 | 1841.73 |
4 | 3 | 1819.77 |
4 | 4 | 1866.40 |
Instances | Better Values | Algorithms | RPIs | ||
---|---|---|---|---|---|
IIG | IIG_NL | IIG | IIG_NL | ||
rc101 | 1646.27 | 1762.03 | 7.03 | ||
rc102 | 1723.15 | 1802.15 | 4.58 | ||
rc103 | 1861.14 | 1975.20 | 6.13 | ||
rc104 | 2014.80 | 2159.82 | 7.20 | ||
rc105 | 1802.07 | 1946.52 | 8.02 | ||
rc106 | 1741.29 | 1872.15 | 7.52 | ||
rc107 | 1893.48 | 2033.92 | 7.42 | ||
rc108 | 2005.98 | 2215.52 | 10.45 | ||
rc109 | 1924.37 | 1999.77 | 3.92 | ||
rc201 | 1971.68 | 2058.68 | 4.41 | ||
rc202 | 1926.09 | 2000.24 | 3.85 | ||
rc203 | 1929.75 | 1993.15 | 3.29 | ||
rc204 | 2037.70 | 2175.06 | 6.74 | ||
rc205 | 1996.43 | 2102.14 | 5.29 | ||
rc206 | 1947.04 | 2011.36 | 3.30 | ||
rc207 | 2016.15 | 2112.56 | 4.78 | ||
rc208 | 2046.07 | 2147.54 | 4.96 | ||
rr101 | 2866.62 | 3022.86 | 5.17 | ||
rr102 | 2019.82 | 2033.62 | 0.68 | ||
rr103 | 1754.20 | 1794.85 | 2.32 | ||
rr104 | 1735.86 | 1806.37 | 4.06 | ||
rr105 | 2065.52 | 2111.00 | 2.20 | ||
rr106 | 1981.65 | 2024.05 | 2.14 | ||
rr107 | 1855.79 | 1898.20 | 2.29 | ||
rr108 | 1699.01 | 1815.62 | 6.86 | ||
rr109 | 1938.55 | 2035.11 | 4.98 | ||
rr110 | 1807.02 | 1921.21 | 6.32 | ||
rr111 | 1764.78 | 1883.87 | 6.75 | ||
rr112 | 1763.50 | 1901.52 | 7.83 | ||
rr201 | 2106.75 | 2286.69 | 8.54 | ||
rr202 | 1924.95 | 2055.48 | 6.78 | ||
rr203 | 1811.40 | 2002.64 | 10.56 | ||
rr204 | 1612.58 | 1766.06 | 9.52 | ||
rr205 | 1859.54 | 2008.47 | 8.01 | ||
rr206 | 1857.82 | 2016.67 | 8.55 | ||
rr207 | 1701.91 | 1825.76 | 7.28 | ||
rr208 | 1598.95 | 1735.23 | 8.52 | ||
rr209 | 2026.87 | 2336.35 | 15.27 | ||
rr210 | 1782.63 | 1905.31 | 6.88 | ||
rr211 | 1735.94 | 1859.30 | 7.11 | ||
rrc101 | 2472.05 | 2642.48 | 6.89 | ||
rrc102 | 2309.12 | 2387.87 | 3.41 | ||
rrc103 | 2165.93 | 2312.67 | 6.77 | ||
rrc104 | 2045.94 | 2186.47 | 6.87 | ||
rrc105 | 2454.70 | 2590.14 | 5.52 | ||
rrc106 | 2333.60 | 2498.16 | 7.05 | ||
rrc107 | 2159.70 | 2329.19 | 7.85 | ||
rrc108 | 2172.61 | 2379.28 | 9.51 | ||
rrc201 | 2741.56 | 2931.13 | 6.91 | ||
rrc202 | 2560.35 | 2803.59 | 9.50 | ||
rrc203 | 2396.92 | 2646.57 | 10.42 | ||
rrc204 | 2245.18 | 2502.46 | 11.46 | ||
rrc205 | 2836.28 | 3165.74 | 11.62 | ||
rrc206 | 2614.92 | 2820.25 | 7.85 | ||
rrc207 | 2380.57 | 2502.09 | 5.10 | ||
rrc208 | 2248.49 | 2426.44 | 7.91 | ||
Mean | 2016.77 | 2018.88 | 2144.75 | 0.11 | 6.32 |
Instances | Better Values | Algorithms | RPIs | ||
---|---|---|---|---|---|
IIG | IIG_NS | IIG | IIG_NS | ||
rc101 | 1535.46 | 1646.27 | 7.22 | ||
rc102 | 1688.98 | 1723.15 | 2.02 | ||
rc103 | 1821.79 | 1861.14 | 2.16 | ||
rc104 | 2014.80 | 2048.45 | 1.67 | ||
rc105 | 1687.56 | 1802.07 | 6.79 | ||
rc106 | 1741.29 | 1880.81 | 8.01 | ||
rc107 | 1893.48 | 1924.29 | 1.63 | ||
rc108 | 2002.70 | 2005.98 | 0.16 | ||
rc109 | 1924.37 | 1964.96 | 2.11 | ||
rc201 | 1930.64 | 1971.68 | 2.13 | ||
rc202 | 1926.09 | 1931.06 | 0.26 | ||
rc203 | 1960.17 | 1993.15 | 1.68 | ||
rc204 | 2027.05 | 2037.70 | 0.53 | ||
rc205 | 1993.13 | 1996.43 | 0.17 | ||
rc206 | 1947.04 | 1950.87 | 0.20 | ||
rc207 | 2016.15 | 2031.26 | 0.75 | ||
rc208 | 2020.31 | 2046.07 | 1.28 | ||
rr101 | 3005.39 | 3022.86 | 5.81 | ||
rr102 | 2033.62 | 2043.89 | 0.51 | ||
rr103 | 1794.85 | 1798.33 | 0.19 | ||
rr104 | 1735.86 | 1737.67 | 0.10 | ||
rr105 | 2056.11 | 2065.52 | 0.46 | ||
rr106 | 1978.56 | 1981.65 | 0.16 | ||
rr107 | 1855.79 | 1865.20 | 0.51 | ||
rr108 | 1699.01 | 1753.45 | 3.20 | ||
rr109 | 1938.55 | 1985.92 | 2.44 | ||
rr110 | 1807.02 | 1837.60 | 1.69 | ||
rr111 | 1764.78 | 1799.71 | 1.98 | ||
rr112 | 1763.50 | 1801.79 | 2.17 | ||
rr201 | 2106.75 | 2208.56 | 4.83 | ||
rr202 | 1924.95 | 2011.90 | 4.52 | ||
rr203 | 1811.40 | 1884.65 | 4.04 | ||
rr204 | 1612.58 | 1675.13 | 3.88 | ||
rr205 | 1859.54 | 1935.95 | 4.11 | ||
rr206 | 1857.82 | 1943.45 | 4.61 | ||
rr207 | 1701.91 | 1797.41 | 5.61 | ||
rr208 | 1598.95 | 1673.06 | 4.63 | ||
rr209 | 2025.39 | 2336.35 | 4.99 | ||
rr210 | 1782.63 | 1859.44 | 4.31 | ||
rr211 | 1735.94 | 1788.57 | 3.03 | ||
rrc101 | 2472.05 | 2544.58 | 2.93 | ||
rrc102 | 2309.12 | 2352.05 | 1.86 | ||
rrc103 | 2165.93 | 2239.96 | 3.42 | ||
rrc104 | 2045.94 | 2093.10 | 2.31 | ||
rrc105 | 2454.70 | 2540.50 | 3.50 | ||
rrc106 | 2333.60 | 2413.30 | 3.42 | ||
rrc107 | 2159.70 | 2235.99 | 3.53 | ||
rrc108 | 2172.61 | 2252.53 | 3.68 | ||
rrc201 | 2741.56 | 2838.36 | 3.53 | ||
rrc202 | 2560.35 | 2665.13 | 4.09 | ||
rrc203 | 2396.92 | 2515.60 | 4.95 | ||
rrc204 | 2245.18 | 2365.22 | 5.35 | ||
rrc205 | 2886.66 | 3165.74 | 8.82 | ||
rrc206 | 2614.92 | 2746.17 | 5.02 | ||
rrc207 | 2380.57 | 2450.92 | 2.96 | ||
rrc208 | 2248.49 | 2347.66 | 4.41 | ||
Mean | 2011.12 | 2018.88 | 2059.98 | 0.45 | 2.37 |
VRPTW | R-VRPTWLST-ILS | R-VRPTWLST | |||||||
---|---|---|---|---|---|---|---|---|---|
Solomon Instances | Optimal Values | Created Instances | THD Values | MHD Values | OD Values | Instances | THD Values | MHD Values | OD Values |
c101 | rc101_ILS | 297.32 | 1126.26 | rc101 | 1077.21 | 501.45 | 1578.66 | ||
c102 | rc102_ILS | 354.14 | 1183.07 | rc102 | 1152.61 | 483.86 | 1636.47 | ||
c103 | rc103_ILS | 872.47 | 396.32 | 1268.78 | rc103 | 1322.09 | 454.68 | 1776.77 | |
c104 | rc104_ILS | 889.39 | 328.32 | 1217.71 | rc104 | 1363.43 | 493.28 | 1856.71 | |
c105 | rc105_ILS | 865.09 | 337.55 | 1202.64 | rc105 | 1208.96 | 540.41 | 1719.88 | |
c106 | rc106_ILS | 342.59 | 1171.53 | rc106 | 1042.91 | 503.33 | 1546.24 | ||
c107 | rc107_ILS | 863.70 | 387.76 | 1251.46 | rc107 | 1184.06 | 610.14 | 1794.20 | |
c108 | rc108_ILS | 328.90 | 1157.84 | rc108 | 1308.34 | 503.64 | 1811.98 | ||
c109 | rc109_ILS | 921.55 | 315.65 | 1237.20 | rc109 | 1395.12 | 520.08 | 1915.19 | |
c201 | rc201_ILS | 269.09 | 860.65 | rc201 | 1139.93 | 650.83 | 1790.76 | ||
c202 | rc202_ILS | 602.86 | 251.05 | 853.91 | rc202 | 1166.14 | 582.65 | 1748.79 | |
c203 | rc203_ILS | 621.21 | 259.64 | 880.84 | rc203 | 1266.77 | 563.16 | 1829.92 | |
c204 | rc204_ILS | 636.55 | 281.21 | 917.75 | rc204 | 1276.85 | 587.60 | 1864.45 | |
c205 | rc205_ILS | 261.87 | 850.75 | rc205 | 1330.27 | 545.47 | 1875.74 | ||
c206 | rc206_ILS | 589.34 | 319.94 | 909.28 | rc206 | 1252.41 | 604.03 | 1856.45 | |
c207 | rc207_ILS | 588.32 | 263.74 | 852.07 | rc207 | 1247.46 | 643.71 | 1891.17 | |
c208 | rc208_ILS | 589.48 | 265.53 | 855.01 | rc208 | 1271.96 | 605.51 | 1877.47 | |
r101 | rr101_ILS | 1670.84 | 35.61 | 1706.45 | rr101 | 1698.84 | 495.00 | 2193.85 | |
r102 | rr102_ILS | 1496.39 | 65.44 | 1561.83 | rr102 | 1616.63 | 414.36 | 2030.98 | |
r103 | rr103_ILS | 1298.04 | 179.67 | 1477.71 | rr103 | 1357.38 | 378.46 | 1735.84 | |
r104 | rr104_ILS | 1095.22 | 239.44 | 1334.65 | rr104 | 1254.61 | 474.88 | 1729.50 | |
r105 | rr105_ILS | 1434.26 | 78.09 | 1512.36 | rr105 | 1607.16 | 419.56 | 2026.72 | |
r106 | rr106_ILS | 1310.58 | 208.38 | 1518.96 | rr106 | 1517.11 | 374.07 | 1891.18 | |
r107 | rr107_ILS | 1155.45 | 205.36 | 1360.81 | rr107 | 1228.81 | 523.98 | 1752.79 | |
r108 | rr108_ILS | 1027.31 | 215.01 | 1242.31 | rr108 | 1082.84 | 563.21 | 1646.06 | |
r109 | rr109_ILS | 1217.34 | 164.01 | 1381.35 | rr109 | 1422.37 | 475.53 | 1897.91 | |
r110 | rr110_ILS | 1164.19 | 119.73 | 1283.93 | rr110 | 1329.92 | 420.04 | 1749.96 | |
r111 | rr111_ILS | 1151.99 | 196.36 | 1348.35 | rr111 | 1277.32 | 432.00 | 1709.33 | |
r112 | rr112_ILS | 1029.39 | 180.29 | 1209.67 | rr112 | 1272.21 | 425.08 | 1697.29 | |
r201 | rr201_ILS | 1298.18 | 403.21 | 1701.39 | rr201 | 1509.41 | 537.99 | 2047.40 | |
r202 | rr202_ILS | 1195.17 | 391.44 | 1586.61 | rr202 | 1296.83 | 534.97 | 1831.80 | |
r203 | rr203_ILS | 997.57 | 315.94 | 1313.51 | rr203 | 1187.71 | 509.94 | 1697.65 | |
r204 | rr204_ILS | 867.36 | 435.27 | 1302.64 | rr204 | 1035.20 | 535.18 | 1570.38 | |
r205 | rr205_ILS | 1107.30 | 354.30 | 1461.61 | rr205 | 1369.13 | 452.50 | 1821.63 | |
r206 | rr206_ILS | 986.62 | 354.26 | 1340.87 | rr206 | 1272.80 | 547.01 | 1819.81 | |
r207 | rr207_ILS | 918.39 | 421.88 | 1340.27 | rr207 | 1171.63 | 520.17 | 1691.80 | |
r208 | rr208_ILS | 774.68 | 136.96 | 911.65 | rr208 | 1034.95 | 509.60 | 1544.55 | |
r209 | rr209_ILS | 978.53 | 519.05 | 1497.59 | rr209 | 1242.30 | 564.37 | 1806.67 | |
r210 | rr210_ILS | 1022.58 | 348.64 | 1371.23 | rr210 | 1294.41 | 472.94 | 1767.35 | |
r211 | rr211_ILS | 915.17 | 321.97 | 1237.14 | rr211 | 1149.17 | 545.19 | 1694.36 | |
rc101 | rrc101_ILS | 1720.54 | 200.93 | 1921.47 | rrc101 | 1879.91 | 537.97 | 2417.88 | |
rc102 | rrc102_ILS | 1562.46 | 237.48 | 1799.94 | rrc102 | 1716.54 | 550.34 | 2266.88 | |
rc103 | rrc103_ILS | 1332.53 | 320.72 | 1653.24 | rrc103 | 1518.68 | 266.25 | 2084.93 | |
rc104 | rrc104_ILS | 1214.76 | 349.70 | 1564.46 | rrc104 | 1460.12 | 564.49 | 2024.61 | |
rc105 | rrc105_ILS | 1665.63 | 226.02 | 1891.65 | rrc105 | 1758.08 | 630.80 | 2388.88 | |
rc106 | rrc106_ILS | 1481.60 | 314.20 | 1795.80 | rrc106 | 1591.53 | 574.08 | 2165.61 | |
rc107 | rrc107_ILS | 1260.39 | 333.83 | 1594.21 | rrc107 | 1495.99 | 593.71 | 2089.70 | |
rc108 | rrc108_ILS | 1208.48 | 374.53 | 1583.01 | rrc108 | 1516.41 | 617.01 | 2133.42 | |
rc201 | rrc201_ILS | 1451.38 | 451.13 | 1902.52 | rrc201 | 1798.77 | 711.08 | 2509.85 | |
rc202 | rrc202_ILS | 1404.60 | 480.92 | 1885.53 | rrc202 | 1682.92 | 724.20 | 2407.12 | |
rc203 | rrc203_ILS | 1131.16 | 452.35 | 1583.51 | rrc203 | 1538.99 | 723.38 | 2262.37 | |
rc204 | rrc204_ILS | 877.53 | 133.71 | 1011.25 | rrc204 | 1576.20 | 648.57 | 2224.77 | |
rc205 | rrc205_ILS | 1390.44 | 430.08 | 1820.52 | rrc205 | 1887.67 | 627.22 | 2515.19 | |
rc206 | rrc206_ILS | 1197.44 | 219.54 | 1416.97 | rrc206 | 1811.11 | 693.55 | 2504.66 | |
rc207 | rrc207_ILS | 1082.12 | 181.30 | 1263.42 | rrc207 | 1487.43 | 675.30 | 2162.73 | |
rc208 | rrc208_ILS | 894.30 | 329.86 | 1224.16 | rrc208 | 1556.21 | 604.91 | 2161.12 |
Instances | Best-Known | Algorithms | RPIs | ||||
---|---|---|---|---|---|---|---|
IIG | DI | TSH | IIG | DI | TSH | ||
rc101 | 1578.66 | 1676.79 | 1732.33 | 0.06 | 0.10 | ||
rc102 | 1636.47 | 1765.23 | 1961.10 | 0.08 | 0.20 | ||
rc103 | 1776.77 | 1856.43 | 1813.18 | 0.04 | 0.02 | ||
rc104 | 1856.71 | 1901.38 | 2030.77 | 0.02 | 0.09 | ||
rc105 | 1719.88 | 1817.41 | 1832.61 | 0.06 | 0.07 | ||
rc106 | 1546.24 | 1765.18 | 1977.82 | 0.14 | 0.28 | ||
rc107 | 1794.20 | 1894.03 | 2047.19 | 0.06 | 0.14 | ||
rc108 | 1811.98 | 2035.64 | 2064.53 | 0.12 | 0.14 | ||
rc109 | 1901.80 | 1915.19 | 2184.02 | 0.01 | 0.15 | ||
rc201 | 1790.76 | 1993.16 | 2037.44 | 0.11 | 0.14 | ||
rc202 | 1748.79 | 1961.77 | 2093.95 | 0.12 | 0.20 | ||
rc203 | 1829.92 | 1977.69 | 2038.81 | 0.08 | 0.11 | ||
rc204 | 1864.45 | 2057.87 | 2039.72 | 0.10 | 0.09 | ||
rc205 | 1875.74 | 2081.99 | 2098.25 | 0.11 | 0.12 | ||
rc206 | 1815.31 | 1856.45 | 2026.22 | 0.02 | 0.12 | ||
rc207 | 1891.17 | 2097.25 | 2084.41 | 0.11 | 0.10 | ||
rc208 | 1807.60 | 1877.47 | 2115.49 | 0.04 | 0.17 | ||
rr101 | 2066.81 | 2193.85 | 2398.23 | 0.06 | 0.16 | ||
rr102 | 1973.20 | 2030.98 | 2070.14 | 0.03 | 0.05 | ||
rr103 | 1701.48 | 1735.84 | 1889.48 | 0.02 | 0.11 | ||
rr104 | 1709.25 | 1729.50 | 1791.51 | 0.01 | 0.05 | ||
rr105 | 1899.16 | 2026.72 | 2084.20 | 0.07 | 0.10 | ||
rr106 | 1758.03 | 1891.18 | 1946.39 | 0.08 | 0.11 | ||
rr107 | 1752.79 | 1807.77 | 1826.68 | 0.03 | 0.04 | ||
rr108 | 1646.06 | 1807.17 | 1763.29 | 0.10 | 0.07 | ||
rr109 | 1813.14 | 1897.91 | 1981.40 | 0.05 | 0.09 | ||
rr110 | 1749.96 | 1905.14 | 1956.02 | 0.09 | 0.12 | ||
rr111 | 1709.33 | 1774.36 | 1916.03 | 0.04 | 0.12 | ||
rr112 | 1697.29 | 1842.53 | 1882.52 | 0.09 | 0.11 | ||
rr201 | 2047.40 | 2125.49 | 2177.37 | 0.04 | 0.06 | ||
rr202 | 1831.80 | 2007.04 | 1996.64 | 0.10 | 0.09 | ||
rr203 | 1697.65 | 1890.90 | 1927.94 | 0.11 | 0.14 | ||
rr204 | 1570.38 | 1701.69 | 1929.08 | 0.08 | 0.23 | ||
rr205 | 1821.63 | 1876.99 | 2178.59 | 0.03 | 0.20 | ||
rr206 | 1819.81 | 1962.74 | 1959.20 | 0.08 | 0.08 | ||
rr207 | 1691.80 | 1804.68 | 1961.28 | 0.07 | 0.16 | ||
rr208 | 1544.55 | 1708.31 | 1923.56 | 0.11 | 0.25 | ||
rr209 | 1727.37 | 1806.67 | 1915.69 | 0.05 | 0.11 | ||
rr210 | 1767.35 | 1834.68 | 2073.05 | 0.04 | 0.17 | ||
rr211 | 1694.36 | 1809.62 | 1760.74 | 0.07 | 0.04 | ||
rrc101 | 2417.88 | 2513.64 | 2452.82 | 0.04 | 0.01 | ||
rrc102 | 2263.87 | 2266.88 | 2391.28 | 0.06 | 0.00 | ||
rrc103 | 1906.91 | 2084.93 | 2268.32 | 0.09 | 0.19 | ||
rrc104 | 2024.61 | 2132.79 | 2176.89 | 0.05 | 0.08 | ||
rrc105 | 2253.53 | 2388.88 | 2531.48 | 0.06 | 0.12 | ||
rrc106 | 2165.61 | 2424.50 | 2399.76 | 0.12 | 0.11 | ||
rrc107 | 2089.70 | 2165.82 | 2148.35 | 0.04 | 0.03 | ||
rrc108 | 1979.60 | 2133.42 | 2328.98 | 0.08 | 0.18 | ||
rrc201 | 2509.85 | 2607.89 | 2611.76 | 0.04 | 0.04 | ||
rrc202 | 2407.12 | 2503.57 | 2863.43 | 0.04 | 0.19 | ||
rrc203 | 2262.37 | 2440.52 | 2471.48 | 0.08 | 0.09 | ||
rrc204 | 2224.77 | 2370.84 | 2394.29 | 0.07 | 0.08 | ||
rrc205 | 2380.76 | 2515.19 | 2770.01 | 0.06 | 0.16 | ||
rrc206 | 2504.66 | 2627.29 | 2556.88 | 0.05 | 0.02 | ||
rrc207 | 2162.73 | 2461.72 | 2656.62 | 0.14 | 0.23 | ||
rrc208 | 2161.12 | 2325.33 | 2466.77 | 0.08 | 0.14 | ||
Mean | 1904.50 | 1929.38 | 2039.65 | 2089.79 | 0.01 | 0.07 | 0.10 |
Instances | Best-Known | Algorithms | RPIs | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
IIG | IABC | ALNS | VNIG | SAIG | IIG | IABC | ALNS | VNIG | SAIG | ||
rc101 | 1646.27 | 1797.77 | 1725.45 | 1752.38 | 1906.85 | 9.20 | 4.81 | 6.45 | 15.83 | ||
rc102 | 1723.15 | 1774.46 | 1790.25 | 1876.03 | 1937.90 | 2.98 | 3.89 | 8.87 | 12.46 | ||
rc103 | 1861.14 | 1884.37 | 1890.11 | 1988.72 | 1965.67 | 1.25 | 1.56 | 6.85 | 5.62 | ||
rc104 | 1917.06 | 2014.80 | 1921.70 | 1985.40 | 2264.61 | 5.10 | 0.24 | 3.56 | 18.13 | ||
rc105 | 1802.07 | 1888.92 | 1908.45 | 2113.25 | 2039.27 | 4.82 | 5.90 | 17.27 | 13.16 | ||
rc106 | 1741.29 | 1796.88 | 1780.32 | 2023.76 | 1949.68 | 3.19 | 2.24 | 16.22 | 11.97 | ||
rc107 | 1893.48 | 1984.87 | 1934.17 | 2060.32 | 2298.90 | 4.83 | 2.15 | 8.81 | 21.41 | ||
rc108 | 1932.38 | 2005.98 | 1977.62 | 2052.50 | 2409.94 | 3.81 | 2.34 | 6.22 | 24.71 | ||
rc109 | 1875.56 | 1924.37 | 1941.96 | 1878.39 | 2273.27 | 2.60 | 3.54 | 0.15 | 21.20 | ||
rc201 | 1971.68 | 1990.10 | 2148.42 | 2283.46 | 2102.45 | 0.93 | 8.96 | 15.81 | 6.63 | ||
rc202 | 1926.09 | 1980.53 | 1971.66 | 1983.05 | 2112.97 | 2.83 | 2.37 | 2.96 | 9.70 | ||
rc203 | 1893.91 | 1993.15 | 1978.87 | 2117.33 | 2296.98 | 5.24 | 4.49 | 11.80 | 21.28 | ||
rc204 | 2037.70 | 2097.60 | 2060.78 | 2212.94 | 2324.72 | 2.94 | 1.13 | 8.60 | 14.09 | ||
rc205 | 1868.28 | 1996.43 | 2020.63 | 1980.78 | 2634.99 | 6.85 | 8.15 | 6.02 | 41.04 | ||
rc206 | 1947.04 | 1977.86 | 1984.33 | 2062.08 | 2649.70 | 1.58 | 1.92 | 5.91 | 36.09 | ||
rc207 | 1938.67 | 2016.15 | 2055.05 | 2059.97 | 2600.96 | 4.00 | 6.00 | 6.26 | 34.16 | ||
rc208 | 1997.49 | 2046.07 | 2000.75 | 2039.01 | 2696.20 | 2.43 | 0.16 | 2.08 | 34.98 | ||
rr101 | 2684.64 | 3022.86 | 3096.27 | 3162.39 | 3109.69 | 0.13 | 15.00 | 18.00 | 16.00 | ||
rr102 | 2033.62 | 2077.13 | 2169.49 | 2213.74 | 2167.79 | 2.14 | 6.68 | 8.86 | 6.60 | ||
rr103 | 1794.85 | 1870.71 | 1896.33 | 1972.20 | 1945.93 | 4.23 | 5.65 | 9.88 | 8.42 | ||
rr104 | 1735.86 | 1738.09 | 1903.84 | 1743.39 | 1968.11 | 0.13 | 9.68 | 0.43 | 13.38 | ||
rr105 | 2065.52 | 2127.28 | 2195.04 | 2271.79 | 2226.11 | 2.99 | 6.27 | 9.99 | 7.77 | ||
rr106 | 1920.16 | 1981.65 | 2027.87 | 2057.64 | 2145.01 | 3.20 | 5.61 | 7.16 | 11.71 | ||
rr107 | 1792.15 | 1855.79 | 1938.33 | 1836.75 | 2015.37 | 3.55 | 8.16 | 2.49 | 12.46 | ||
rr108 | 1699.01 | 1792.71 | 1925.74 | 1737.92 | 1848.04 | 5.51 | 13.34 | 2.29 | 8.77 | ||
rr109 | 1938.55 | 2019.06 | 2036.17 | 2166.92 | 2223.12 | 4.15 | 5.04 | 11.78 | 14.68 | ||
rr110 | 1807.02 | 1824.12 | 1971.65 | 1832.97 | 1906.87 | 0.95 | 9.11 | 1.44 | 5.53 | ||
rr111 | 1764.78 | 1803.27 | 1932.27 | 1918.23 | 1925.53 | 2.18 | 9.49 | 8.70 | 9.11 | ||
rr112 | 1763.50 | 1792.94 | 1937.91 | 1838.86 | 1965.29 | 1.67 | 9.89 | 4.27 | 11.44 | ||
rr201 | 2059.73 | 2106.75 | 2072.58 | 2404.25 | 2571.16 | 2.28 | 0.62 | 16.73 | 24.83 | ||
rr202 | 1924.95 | 1971.59 | 2130.51 | 2002.56 | 2256.09 | 2.42 | 10.68 | 4.03 | 17.20 | ||
rr203 | 1811.40 | 1860.81 | 2040.99 | 2064.73 | 2104.38 | 2.73 | 12.67 | 13.98 | 16.17 | ||
rr204 | 1612.58 | 1680.88 | 1809.39 | 1711.52 | 1806.95 | 4.24 | 12.20 | 6.14 | 12.05 | ||
rr205 | 1859.54 | 1871.79 | 2050.15 | 2029.72 | 2195.36 | 0.66 | 10.25 | 9.15 | 18.06 | ||
rr206 | 1857.82 | 1897.48 | 2010.60 | 2072.26 | 2203.35 | 2.13 | 8.22 | 11.54 | 18.60 | ||
rr207 | 1701.91 | 1748.88 | 1890.49 | 1713.59 | 1906.55 | 2.76 | 11.08 | 0.69 | 12.02 | ||
rr208 | 1598.95 | 1628.37 | 1738.48 | 1728.63 | 1755.39 | 1.84 | 8.73 | 8.11 | 9.78 | ||
rr209 | 2129.60 | 2336.35 | 2541.20 | 2505.66 | 2886.51 | 10.00 | 19.00 | 17.66 | 35.57 | ||
rr210 | 1782.63 | 1871.75 | 2021.39 | 1966.07 | 2129.54 | 5.00 | 13.39 | 10.29 | 19.46 | ||
rr211 | 1735.94 | 1767.11 | 1908.10 | 1847.12 | 2052.21 | 1.80 | 9.92 | 6.40 | 18.22 | ||
rrc101 | 2472.05 | 2714.31 | 2583.59 | 2581.84 | 2551.06 | 9.80 | 4.51 | 4.44 | 3.20 | ||
rrc102 | 2309.12 | 2413.71 | 2393.93 | 2552.78 | 2414.67 | 4.53 | 3.67 | 10.55 | 4.57 | ||
rrc103 | 2165.93 | 2298.33 | 2342.60 | 2318.29 | 2195.55 | 6.11 | 8.16 | 7.03 | 1.37 | ||
rrc104 | 2045.94 | 2193.79 | 2221.56 | 2258.76 | 2468.93 | 7.23 | 8.58 | 10.40 | 20.67 | ||
rrc105 | 2454.70 | 2624.85 | 2681.30 | 2489.15 | 2498.68 | 6.93 | 9.23 | 1.40 | 1.79 | ||
rrc106 | 2333.60 | 2487.12 | 2489.82 | 2384.91 | 2546.56 | 6.58 | 6.69 | 2.20 | 9.12 | ||
rrc107 | 2159.70 | 2272.74 | 2356.52 | 2218.53 | 2608.24 | 5.23 | 9.11 | 2.72 | 20.77 | ||
rrc108 | 2172.61 | 2202.60 | 2336.79 | 2286.66 | 2319.16 | 1.38 | 7.56 | 5.25 | 6.75 | ||
rrc201 | 2610.57 | 2741.56 | 2612.54 | 2770.38 | 3249.81 | 5.02 | 0.08 | 6.12 | 24.49 | ||
rrc202 | 2422.05 | 2560.35 | 2731.28 | 2591.50 | 2905.86 | 5.71 | 12.77 | 7.00 | 19.98 | ||
rrc203 | 2396.92 | 2426.70 | 2586.54 | 2622.43 | 2658.06 | 1.24 | 7.91 | 9.41 | 10.89 | ||
rrc204 | 2245.18 | 2327.69 | 2466.37 | 2338.17 | 2375.21 | 3.67 | 9.85 | 4.14 | 5.79 | ||
rrc205 | 3165.74 | 3342.36 | 3398.85 | 3361.03 | 4134.57 | 6.00 | 7.00 | 6.00 | 31.00 | ||
rrc206 | 2614.92 | 2755.82 | 2784.37 | 2724.47 | 3053.46 | 5.39 | 6.48 | 4.19 | 16.77 | ||
rrc207 | 2380.57 | 2466.01 | 2423.22 | 2409.92 | 2534.57 | 3.59 | 1.79 | 1.23 | 6.47 | ||
rrc208 | 2248.49 | 2362.23 | 2401.33 | 2587.38 | 2428.97 | 5.06 | 6.80 | 15.07 | 8.03 | ||
Mean | 1996.71 | 2018.88 | 2056.52 | 2141.19 | 2135.33 | 2279.45 | 1.06 | 2.95 | 7.26 | 7.04 | 14.33 |
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
Cui, X.; Yang, K.; Wang, X.; Duan, P. An Improved Iterated Greedy Algorithm for Solving Collaborative Helicopter Rescue Routing Problem with Time Window and Limited Survival Time. Algorithms 2024 , 17 , 431. https://doi.org/10.3390/a17100431
Cui X, Yang K, Wang X, Duan P. An Improved Iterated Greedy Algorithm for Solving Collaborative Helicopter Rescue Routing Problem with Time Window and Limited Survival Time. Algorithms . 2024; 17(10):431. https://doi.org/10.3390/a17100431
Cui, Xining, Kaidong Yang, Xiaoqing Wang, and Peng Duan. 2024. "An Improved Iterated Greedy Algorithm for Solving Collaborative Helicopter Rescue Routing Problem with Time Window and Limited Survival Time" Algorithms 17, no. 10: 431. https://doi.org/10.3390/a17100431
Article access statistics, further information, mdpi initiatives, follow mdpi.
Subscribe to receive issue release notifications and newsletters from MDPI journals
IMAGES
VIDEO
COMMENTS
Introduction. In computer science, problem-solving refers to synthetic intelligence techniques, which include forming green algorithms, heuristics, and acting root reason analysis to locate suited solutions. Search algorithms are fundamental tools for fixing a big range of issues in computer science. They provide a systematic technique to ...
In general, exponential-complexity search problems cannot be solved by uninformed search for any but the smallest instances. 3.4.2 Dijkstra's algorithm or uniform-cost search When actions have different costs, an obvious choice is to use best-first search where the evaluation function is the cost of the path from the root to the current node.
The search algorithms in this section have no additional information on the goal node other than the one provided in the problem definition. The plans to reach the goal state from the start state differ only by the order and/or length of actions. ... It is used for solving real-life problems using data mining techniques. The tool was developed ...
eral general-purpose search algorithms that can be used to solve these problems and compare the advantages of each algorithm. The algorithms are uninformed, in the sense that they are given no information about the problem other than its definition. Chapter 4 deals with informed search algorithms, ones that have some idea of where to look for ...
Toy problems (but sometimes useful) Illustrate or exercise various problem-solving methods Concise, exact description Can be used to compare performance Examples: 8-puzzle, 8-queens problem, Cryptarithmetic, Vacuum world, Missionaries and cannibals, simple route finding. Real-world problem. More difficult No single, agreed-upon description ...
Problem-solving agents use atomic representations (see Chapter 2), where states of the world are considered as wholes, with no internal structure visible to the problem-solving agent. We consider two general classes of search: (1) uninformed search algorithms for which the algorithm is provided no information about the problem other than its
A search algorithm is a type of algorithm used in artificial intelligence to find the best or most optimal solution to a problem by exploring a set of possible solutions, also called a search space. A search algorithm filters through a large number of possibilities to find a solution that works best for a given set of constraints. Search algorithms typically operate by organizing the search ...
But a fast test determining whether a state is reachable from another is very useful, as search techniques are often inefficient. 21. when a problem has no solution. It is often not feasible (or too. 8-puzzle Æ 362,880 states. 0.036 sec. 15-puzzle Æ 2.09 x 1013 states. ~ 55 hours.
Problem Solving as Search •Search is a central topic in AI -Originated with Newell and Simon's work on problem solving. -Famous book: "Human Problem Solving" (1972) •Automated reasoning is a natural search task •More recently: Smarter algorithms -Given that almost all AI formalisms (planning,
Else pick some search node N from Q. If state(N) is a goal, return N (we have reached the goal) Otherwise remove N from Q. Find all the children of state(N) not in visited and create all the one-step extensions of N to each descendant. Add the extended paths to Q, add children of state(N) to Visited. Go to step 2.
State space graphs vs. search trees S a b d p a c e p h f r q q c G a e q p h f r q q c G a S G d b p q c e h a f r We construct both on demand -and we construct as little as possible. Each NODE in the search tree is an entire PATH in the state space graph. State Space Graph Search Tree 20
Many current engineering problems have been solved using artificial intelligence search algorithms. To conduct this research, we selected certain key algorithms that have served as the foundation for many other algorithms present today. This article exhibits and discusses the practical applications of A*, Breadth-First Search, Greedy, and Depth-First Search algorithms. We looked at several ...
Got it. Searching algorithms are essential tools in computer science used to locate specific items within a collection of data. These algorithms are designed to efficiently navigate through data structures to find the desired information, making them fundamental in various applications such as databases, web search engines, and more. Searching ...
3 5 Example: N Queens 4 Queens 6 State-Space Search Problems General problem: Given a start state, find a path to a goal state • Can test if a state is a goal • Given a state, can generate its successor states Variants: • Find any path vs. a least-cost path • Goal is completely specified, task is just to find the path - Route planning • Path doesn't matter, only finding the goal ...
Most problem solving tasks may be formulated as state space search. State space search is formalized using. graphs, simple paths, search trees, and pseudo code. Depth-first and breadth-first search are framed, among others, as instances of a. generic search strategy.
Problem-solving agents are the goal-based agents and use atomic representation. In this topic, we will learn various problem-solving search algorithms. Search Algorithm Terminologies: Search: Searchingis a step by step procedure to solve a search-problem in a given search space. A search problem can have three main factors:
The same problem (with a little variation) also appeared a programming exercise in the Coursera Course Algorithm-I (By Prof. ROBERT SEDGEWICK, Princeton).The description of the problem taken from the assignment is shown below (notice that the goal state is different in this version of the same problem): Write a program to solve the 8-puzzle problem (and its natural generalizations) using the ...
Example problems: Euclid algorithm of finding GCD, Binary Search, Josephus problem. Problem-solving using Binary Search. When an array has some order property similar to the sorted array, we can use the binary search idea to solve several searching problems efficiently in O(logn) time complexity.
In recent years, the Cuckoo Optimization Algorithm (COA) has been widely used to solve various optimization problems due to its simplicity, efficacy, and capability to avoid getting trapped in local optima. However, COA has some limitations such as low convergence when it comes to solving constrained optimization problems with many constraints.
1 2 3. We care about your data privacy. HackerEarth uses the information that you provide to contact you about relevant content, products, and services. will help you understand that you are in control of your data at HackerEarth. Solve practice problems for Linear Search to test your programming skills. Also go through detailed tutorials to ...
An interactive version of Problem Solving with Algorithms and Data Structures using Python. ... Search Page. Problem Solving with Algorithms and Data Structures using Python by Bradley N. Miller, David L. Ranum is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Next, a problem-specific local search strategy is developed to improve the algorithm's local search effectiveness. In addition, the simulated annealing (SA) method is integrated as an acceptance criterion to avoid the algorithm from getting trapped in local optima. ... solving it using an improved iterative greedy (IIG) algorithm. In the ...