Backward chaining, Computer Engineering

Backward Chaining:

In generally given that we are only interested in constructing the path whether we can set our initial state to be the theorem statement and search backwards until we find an axiom or set of axioms. There if we restrict ourselves to just utilising equivalences as rewrite rules for this approach is OK, is just because we can use equivalences both ways, and any path from the theorem to axioms that is found will provide a proof. In fact, if we use inference rules to traverse from theorem to axioms like we will have proved that and if the theorem is true then the axioms are true. Whether we already know that the axioms are true! Just to get around this we must invert our inference rules and try to work backwards. Means that, the operators in the search basically answer the question: as what could be true in order to infer the state like logical sentence we are at right now? In the Arch space if we set our agent starts searching from the theorem statement and reaches the axioms, than it has proved the theorem. In fact this is also problematic means there are numerous answers to the inversion question so and the search space gets very large.

Posted Date: 1/11/2013 6:07:54 AM | Location : United States

Related Discussions:- Backward chaining, Assignment Help, Ask Question on Backward chaining, Get Answer, Expert's Help, Backward chaining Discussions

Write discussion on Backward chaining
Your posts are moderated
Related Questions
Define emulation. Given a computer with a particular instruction set, it is possible to explain additional machine instructions and execute them with extra micro routines. Emul

Execution error and compilation error: Errors like as mismatch of data types or array out of bound error are called as execution errors or runtime errors. These errors are us

What are problems of clock skew? This is typically because of two causes. The primary is a material flaw that causes a signal to travel faster or slower than imagined. The seco

Explain how the Web enables effective collaborative computing. Discuss the similarities and differences among WebEx, Microsoft NetMeeting and Novell Groupwise software (in less tha

A UNIX device driver is ? Ans. A UNIX device driver is structured in two halves termed as top half and bottom half.

Performance of computer system: Computer performance is frequently described in terms of clock speed (usually in MHz or GHz). It refers to the cycles per second of the main cl

Virtual Memory is a way of extending a computer's memory by using a disk file to replicate add'l memory space. The OS remain track of these add'l memory addresses on the hard disk

Tell me which queue having present queue depth should be greater than zero? Ans) Event queues Open MQ Explorer by selecting Start > Programs > IBM WebSphere MQ > WebSphere

Compare the architecture of SS7 with seven-layer OSI architecture The relationship among these levels and the layers of the OSI model is demonstrated in figure. The user part i