Identify nodes that are cut-off

Assignment Help Data Structure & Algorithms
Reference no: EM13809961

1. Describes four ways of defining the AI field. For each of the following sentences, state which definition of AI it seems to follow and explain your answer.

"I replaced Bob our accountant with a program. I think the program is artificially intelligent because ..."

a. "... when the program makes mistakes, it makes the same mistakes that Bob would."

b. "...all of the program's work passed inspection by our auditors."

c. "... It was programmed using the information from How to Make Managerial Accounting Decisions."

d. "... the program models Bob's actual thought processes."

2. In the search tree shown, circles represent terminal nodes and the double circle represents the goal node. For the traversal schemes, show the node expansion order for non-terminal and non-goal nodes by placing a number near the top right of the node. Assume the search terminates when a goal is generated.

1402_img1.png

a. Breadth-first search

b. Depth-first search

3. The A* algorithm uses an evaluation function f(n) = g(n) + h(n). In one or two sentences, explain the meaning of g(n) and h(n).

4. What constraints are necessary on g and/or h* to make the A* algorithm behave equivalently to: Breadth-first, Uniform-cost, and Best-first?

5. One of your friends notices that for the A* algorithm and for the particular problem you are solving, you apply a g(n) = 1 between all nodes. He points out the fact that for all nodes at level I in the search tree, g(I) will simply equal I. Therefore, he claims, why even bother to take into account g(I)? He says, "Just forget about g(I) and let f*(n) = h*(n). Your A* algorithm will work just as good as before." Explain the fault in this reasoning.

6. Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to:

a. identify nodes that are cut-off

b. compute the final value of the root node

Note: The root node in this tree is a min node.

1467_img2.png

Values for terminal nodes (left to right): 15 5 10 9 14 20

7. You and your chess opponent, John, are in a strange predicament. Whoever wins the present game has to play "Dirty Harry" next. It is a well-known fact that "Dirty Harry" does not fully comprehend the game of chess, moves randomly, and almost always loses. This, in itself, is not so bad; however, it is also a well-known fact that "Dirty Harry" is a very sore loser, and unless he wins, winds up shooting his opponent. Obviously, neither you nor John wants to play "Dirty Harry" next. Therefore, your strategy is to force John to win, and John's strategy is to force you to win.

a. Assuming that both you and John are consistent in choosing the worst possible move for yourselves, could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

b. Now, assume that the very thing you dread most has presented itself; that is, despite your best attempts to lose to John, he has managed to force you to win. Now, you are stuck in a game with "Dirty Harry." Your last hope is to play the game in such a manner that "Dirty Harry" is assured a win. Same question: could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

8. Given the following symbols and their meanings, translate the following propositional logic statement into English and determine whether the assertion is valid.

p: 64k is better than no memory at all.

q: We will buy more memory.

r: We will buy a new computer.

p -> (q -> r), q-> (p -> r)

(p \/ q) ->r

9. Represent the following sentences in first-order logic, using a consistent vocabulary that you define:

a. Fred works in the bank.

b. At least one person is Fred's supervisor.

c. Everyone who works in the bank handles money.

10. Suppose we have the following rules:

∀x Knows(Bill, x) =>ThreatenedBy(Bill, x)

∀xThreatenedBy(Bill, x) => Buys(Bill, x)

Suppose our knowledge base is:

∀a Knows(a, Sun)

Can we assume Bill will buy Sun? Show how we can prove this.

Reference no: EM13809961

Questions Cloud

Describe how cryptography can be used to meet your goal : You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal
Write research review and analysis paper on korb vs raytheon : Write a research, review and analyze Korb v. Raytheon, 707 F.Supp. Analyze and explain the challenges with freedom of speech.
Performance control in the project : Control is the last element of your project. Add a summary about some of the things that would require performance control in the project.
Write paper on the effect of socioeconomic status on student : Write a paper about The effects of socioeconomic status on students' performance in school.
Identify nodes that are cut-off : Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to: identify nodes that are cut-off
What would the participants in the control group do : What would the participants in the control group do
National bureau of economic research : National Bureau of Economic Research
Hostile work environment sexual harassment claim : In a hostile work environment sexual harassment claim, the employer will have a successful defense if the employer can show which of the following
Terrorism and the media : Terrorism and the Media

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Design a recursive algorithm to implement

Design a recursive algorithm to implement this specification. That is, the body of FindLast should contain a recursive call FindLast(A,..,..).

  Create a flowchart to show the process that will allow the

1.create a flowchart to show the process that will allow the implementation of stack push and pop operations.2.create a

  Creating a database design in visio

Designing Databases with Visio Professional: A Tutorial," to help you complete Section 1: Visio Database Design. (Note: This tutorial focuses on the use of Microsoft Visio.

  Using the stack data structure for storing disk objects

Which parts of the assignment were you not able to complete fully? For each, explain why you were unable to complete this part and what steps you took to attempt to complete it. Give me as much detail as possible such that I may award partial cred..

  Explain spacewise efficient implementation two-stack data

Structure of such two-stack data type would consist of two arrays and two top pointers. Describe why this may not be a spacewise efficient implementation.

  Choosing computer passwords

Before logging on to computer, you must have a unique username and unique password. Analyze and explain considerations you must make when choosing a password.

  Create a loop structure to display all integer values

Determine if the first number is larger than, smaller than, or equal to the second number.

  Analyzing the use of databases

Create a paper analyzing the use of databases in your company. Include what database applications are used. Conclude through proposing improvements.

  How to work on datasturetur assignment kdfk dskf

kdfk dskf jkfjksdjkf jksdjfkjskfjksdjkf jksdjkf jsdkjfk dsk fkdsjkfj kdsjkf jdsk jksdjkf kdfk dskf jkfjksdjkf

  Oracle provides erp solutions for mid-size business

oracle provides erp solutions for mid-size business organizations. for this assignment you are to write a research

  Write the code of stack architecture

Write the code of stack architecture to compute the expression below. The result should be stored on the stack.

  Preepare a flowchart and give the pseudocode for searching

q1. describe an array.q2. what are the various implementations that can be used for an array?q3. provide the code that

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd