Solved

golf league schedule

Posted on 2012-03-13
4
294 Views
Last Modified: 2012-03-16
I am seeking assistance in setting up a golf league schedule that will result in a reasonably equitable schedule.

Parameters:
-the season consists of 13 Tuesday nights
-we have 12 golfers in the league
-each of the three weekly teams consists of 4 golfers
-each golfer competes individually and the 4 person teams change from week to week

I would like to set the league schedule up so that each golfer will play with each of the other 11 golfers in the league either 3 or 4 times during the 13 weeks.

Last year I manully worked out a schedule but had between 3-5 times that certain players played with each other.  I would like to make this more equitable.

Any assistance that can be provided would be appreciated.  Thanks.
0
Comment
Question by:lergolf
  • 2
  • 2
4 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 37718614
( a b c d ) ( e f g h ) ( i j k l )
( a b h l ) ( d e f j ) ( c g i k )
( a b j k ) ( c e g h ) ( d f i l )
( a c f h ) ( b d e k ) ( g i j l )
( a c f l ) ( d e g j ) ( b h i k )
( a c g j ) ( b d e i ) ( f h k l )
( a d g k ) ( c e i l ) ( b f h j )
( a d h i ) ( e f j k ) ( b c g l )
( a e h i ) ( c d f k ) ( b g j l )
( a e j l ) ( b c f i ) ( d g h k )
( a e k l ) ( b f g i ) ( c d h j )
( a f g k ) ( b e h l ) ( c d i j )
( a f i j ) ( b c e k ) ( d g h l )
0
 

Author Comment

by:lergolf
ID: 37723178
Thank you for the response.   The solution presented is close to meeting the requirements.  
d & l and h & j only golf together twice.
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
ID: 37726953
( a h i l ) ( b f g k ) ( c d e j )
( a d f j ) ( b e h i ) ( c g k l )
( a c e k ) ( b d g h ) ( f i j l )
( a g i j ) ( b c d l ) ( e f h k )
( a c f h ) ( b j k l ) ( d e g i )
( a e g l ) ( b c f i ) ( d h j k )
( a d i k ) ( b e f l ) ( c g h j )
( a b e j ) ( c h i k ) ( d f g l )
( a b c g ) ( d e h l ) ( f i j k )
( a b d k ) ( c h j l ) ( e f g i )
( a f g h ) ( b d i l ) ( c e j k )
( a h k l ) ( b g i j ) ( c d e f )
( a c d i ) ( b f h j ) ( e g k l )
0
 

Author Comment

by:lergolf
ID: 37729795
ozo, thank you very much.  The second solution works.  I was also able to make a couple of manual changes to the first solution and made it work.  I now have a couple of options to choose from.  Thanks again.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Introduction On a scale of 1 to 10, how would you rate our Product? Many of us have answered that question time and time again. But only a few of us have had the pleasure of receiving a stack of the filled out surveys and being asked to do somethi…
Foreword (May 2015) This web page has appeared at Google.  It's definitely worth considering! https://www.google.com/about/careers/students/guide-to-technical-development.html How to Know You are Making a Difference at EE In August, 2013, one …
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now