A* search-artificial intelligence, Basic Computer Science

A* Search-Artificial intelligence:

 

A* search combines the best parts of uniform cost search that  called the fact that it's optimal and complete, and the best parts of greedy search that called its speed. This search method simply combines the path cost function g(n) and the heuristic function h(n) by summing them to form a new heuristic measure f(n):

f(n) = h(n) + g(n)

Remembering that g(n) gives the path cost from the began  state to state n and h(n) estimates the path cost from n to a goal state, we see that f(n) estimates the cost of the cheapest solution which passes through n.

The most essential aspect of A* search is that, given one limitation on h(n), it is possible to prove that the search strategy is complete and optimal. The limitation to h(n) is that it might always underestimate the cost to achieve a goal state from n. Such heuristic measures are called admissible. See Norvig and Russell for verification that A* search with an admissible heuristic is complete and optimal.

Posted Date: 10/2/2012 2:43:11 AM | Location : United States







Related Discussions:- A* search-artificial intelligence, Assignment Help, Ask Question on A* search-artificial intelligence, Get Answer, Expert's Help, A* search-artificial intelligence Discussions

Write discussion on A* search-artificial intelligence
Your posts are moderated
Related Questions
File Management:   The concept of a file is central to the effective use of a computer system. A file is generally loosely defined as a collection of related information such

what does it means

Examples of Online Databases: The adoption of modern technology has resulted in the proliferation of machine readable databases. The National Library of Medicine (USA) designe

E-MAIL: Internet has changed the art of writing letters to email.  Email is one of the ways on Internet to send messages to another person across the network. E-mail and posta


QUESTION (a) Describe what is meant by Clock Skew and Clock Drift among clocks in a distributed system. (b) A clock is reading 08:25:46.0 (hr:min:sec) when it is discovered

implement your own hashset

Question 1 Briefly explain main parts of the Camera Question 2 Write a note on: Ripple Edit Tool, Rate Stretch Tool & Track Selection Tool Question 3 What is Pixel

The difference between kernel mode and user mode gives a rudimentary form of security in the following manner. Convinced instructions could be executed only when the CPU is in kern

write a program to solve a 10x10 maze. prompt the user for an input text file containing ten rows(ten characters on each row). Use following characters in the input file: * startin