A* search-artificial intelligence, Basic Computer Science

A* Search-Artificial intelligence:

 

A* search combines the best parts of uniform cost search that  called the fact that it's optimal and complete, and the best parts of greedy search that called its speed. This search method simply combines the path cost function g(n) and the heuristic function h(n) by summing them to form a new heuristic measure f(n):

f(n) = h(n) + g(n)

Remembering that g(n) gives the path cost from the began  state to state n and h(n) estimates the path cost from n to a goal state, we see that f(n) estimates the cost of the cheapest solution which passes through n.

The most essential aspect of A* search is that, given one limitation on h(n), it is possible to prove that the search strategy is complete and optimal. The limitation to h(n) is that it might always underestimate the cost to achieve a goal state from n. Such heuristic measures are called admissible. See Norvig and Russell for verification that A* search with an admissible heuristic is complete and optimal.

Posted Date: 10/2/2012 2:43:11 AM | Location : United States







Related Discussions:- A* search-artificial intelligence, Assignment Help, Ask Question on A* search-artificial intelligence, Get Answer, Expert's Help, A* search-artificial intelligence Discussions

Write discussion on A* search-artificial intelligence
Your posts are moderated
Related Questions
Explain how the internet works

Question 1 What is the difference between Variable Bit Rate and Constant Bit Rate? Question 2 Write a note on: Normalization, Reverberation, Noise Reduction, Filters, and

SYSTEMS SOFTWARE Systems Software generally is the software which control the computers and other peripherals. Ex: MS DOS, Windows 95, Unix, NetWare and Windows NT et

Is IT a strategic weapon or a survival tool? Discuss.

A scaling constant indicates an expansion of length

requirement analysis and specification for online voting

Question 1 Convert the following binary numbers to its specified number system 1101.11 (2) to octal 1111 (2) to decimal 110.11 (2) to hexadecimal 1011.11 (2) to

The difference between kernel mode and user mode gives a rudimentary form of security in the following manner. Convinced instructions could be executed only when the CPU is in kern

Question 1 Convert the following binary numbers to decimal 101110 1110101 110110 101010 110010 Question 2 Explain CPU module and types of transfers betwe

The 21H function and the 22H function of the 21H interruption are the ones in charge of realizing the random readings and writings in that order. The random register number and the