Backward chaining, Computer Engineering

Backward Chaining:

In generally given that we are only interested in constructing the path whether we can set our initial state to be the theorem statement and search backwards until we find an axiom or set of axioms. There if we restrict ourselves to just utilising equivalences as rewrite rules for this approach is OK, is just because we can use equivalences both ways, and any path from the theorem to axioms that is found will provide a proof. In fact, if we use inference rules to traverse from theorem to axioms like we will have proved that and if the theorem is true then the axioms are true. Whether we already know that the axioms are true! Just to get around this we must invert our inference rules and try to work backwards. Means that, the operators in the search basically answer the question: as what could be true in order to infer the state like logical sentence we are at right now? In the Arch space if we set our agent starts searching from the theorem statement and reaches the axioms, than it has proved the theorem. In fact this is also problematic means there are numerous answers to the inversion question so and the search space gets very large.

Posted Date: 1/11/2013 6:07:54 AM | Location : United States







Related Discussions:- Backward chaining, Assignment Help, Ask Question on Backward chaining, Get Answer, Expert's Help, Backward chaining Discussions

Write discussion on Backward chaining
Your posts are moderated
Related Questions
What do they signify Which one is critical for calculating maximum clock frequency of a circuit? Ans) Set up time constraint implies how late the input signal can arrive befor

Blue Sky events is an organisation that devices and runs large outdoor events. They have been commissioned to organise and run an event for four months over the summer period in a

Utility Functions - artificial intelligence: A goal based on an agent for playing chess is infeasible: at every moment it decides which move to play next, it sees whether that

A binary tree can be converted in to its mirror image By traversing it in Preorder

What is Fork swap? "Fork ()" is a system call to make a child process. When the parent process calls "fork()" system call, the child process is formed and if there is short of

What are the critical capabilities for superior firm performance in e-commerce? Three firm capabilities which are critical for superior firm performance within e-commerce are:

Efficiency The effectiveness of pipeline can be measured the same as the ratio of busy time span to total time span counting the idle time. Let c be clock period of a pipeline

Q. Explain about Decimal Numbers? Decimal number system has 10 digits signified by 0,1,2,3,4,5,6,7,8 and 9. Any decimal number can be signified as a string of these digits an

explain the various types of computer systems

The last digit of a credit card number is the check digit, which protects against transcription errors like an error in a single digit or switching two digits. The following method