Breadth first search, Computer Engineering

Breadth First Search:

Given a set of operators o1, ..., on in a breadth first search, every time a new state is reached, an action for each operator on  s  is added to the bottom of the agenda, i.e., the pairs (s,o1), ..., (s,on) are added to the end of the agenda in that order.

However, once the 'D' state had been found, the actions: 

1.(empty,add'D')

2.(empty,add'N')

3. (empty,add 'A')

would be added to the top of the agenda, so it would look like this:

4. ('D',add 'D')

5. ('D',add 'N')

6. ('D',add 'A') 

However, we can remove the first agenda item as this action has been undertaken. Hence there are actually 5 actions on the agenda after the first step in the search space. Indeed, after every step, one action will be removed (the action just carried out), and three will be added, making a total addition of two actions to the agenda. It turns out that this kind of breadth first search leads to the name 'DAN' after 20 steps. Also, after the 20th step, there are 43 tasks still on the agenda to do.

Posted Date: 1/9/2013 7:18:24 AM | Location : United States







Related Discussions:- Breadth first search, Assignment Help, Ask Question on Breadth first search, Get Answer, Expert's Help, Breadth first search Discussions

Write discussion on Breadth first search
Your posts are moderated
Related Questions
Multiplicity Multiplicity in an association specifies tells us about number of objects participate in a relationship. It decides the number of related objects. Multiplicity is

Solve the equation 23.6 10 = X 2 for X Ans. 23.6 10 = X 2 So as to find X, firstly convert the Decimal number 23.610 in its Binary form. After that take the decimal inte

Discuss the basic entities of World Wide Web in brief. World Wide Web: This is a complicated client/server system in that a web client communicates along with the web ser

Q. How can we use Ordered Lists? Lists having numbered items are termed as ordered lists. They are used when items in the list have a natural order. They can also be used when

The FontMetrics class is used to describe implementation-specific properties, like ascent and descent, of a Font object.

Explain the concept of top-down design for a program. Top down Design: A top-down approach is fundamentally breaking down a system to gain insight into its compositional s

Traffic Capacity is given by? Traffic Capacity = Switching capacity × Theoretical maximum load.

Explain UDP (User Datagram Protocol). UDP utilizes a connectionless communication paradigm. It is an application of using UDP doesn't require preestablishing a connection befor

What are the Disadvantages of a VPN implementation The greatest disadvantage of a VPN implementation is its non-flexibility to accept unknown locations. VPN works extremely wel

reate a directory "Unix" under your home directory. Command(s): ………………………………………….