Formation of Non-Perfect Maze Using Prim’s Algorithm

نویسندگان

چکیده

Maze is a place that has many paths with tortuous are misleading and full of dead ends can be viewed as grid graph. A non-perfect maze cycle. This research produces an algorithm form size m×n which two types bias. The first bias the composition percentage horizontal vertical partitions. second number cycles. created in this study was generated by modifying Prim’s use Fisher-Yates used random selection algorithm. begins calculation parameter values continues forming perfect maze. been designed complexity O(|E|^2), where E set edges Flash-based application development also carried out order to implement algorithms obtain produced two-dimensional visual image along its corresponding capable displaying up 20 solutions biased

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A perfect maze based steganographic method

In steganography, several different types of media have been used as carriers, such as images, audios and video streams, to hide secret data. Nevertheless, various novel media and applications have been developed due to the rapid growth of internet. In this paper, we select maze games as carrier media to conceal secret data. The original idea of embedding data in a maze is proposed by Niwayama ...

متن کامل

Investigation of Vibrational Behavior of Perfect and Defective Carbon Nanotubes Using Non–Linear Mass–Spring Model

In the present study, the effects of arrangement and distribution of multifarious types of defects on fundamental frequency of carbon nanotubes are investigated with respect to different chirality and boundary conditions. Interatomic interactions between each pair of carbon atoms are modeled using two types of non–linear spring–like elements. To obtain more information about the influences of d...

متن کامل

The (non-)existence of perfect codes in Lucas cubes

A Fibonacci string of length $n$ is a binary string $b = b_1b_2ldots b_n$ in which for every $1 leq i < n$, $b_icdot b_{i+1} = 0$. In other words, a Fibonacci string is a binary string without 11 as a substring. Similarly, a Lucas string is a Fibonacci string $b_1b_2ldots b_n$ that $b_1cdot b_n = 0$. For a natural number $ngeq1$, a Fibonacci cube of dimension $n$ is denoted by $Gamma_n$ and i...

متن کامل

fault location in power distribution networks using matching algorithm

چکیده رساله/پایان نامه : تاکنون روش‏های متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روش‏ها در شبکه توزیع به دلایلی همچون وجود انشعاب‏های متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تک‏فاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...

Fuzzy Counter Ant Algorithm for Maze Problem

This effort explores the effectiveness of adding a layer of fuzzy logic to a group of swarming multi agent robots for exploration and exploitation of an unknown obstacle rich environment represented by a 2D maze problem. The generalized maze problem has been considered as an interesting test bed by various researchers in AI and neural networks. Using a cooperative multi agent robot system reduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JTAM (Jurnal Teori dan Aplikasi Matematika)

سال: 2023

ISSN: ['2597-7512', '2614-1175']

DOI: https://doi.org/10.31764/jtam.v7i2.12772