Constraint satisfaction problems, Computer Engineering

Constraint Satisfaction Problems:

Furthermore I was perhaps most proud of AI on a Sunday. However this particular Sunday, a friend of mine found an article in the Observer regarding the High-IQ society, a before brash and even more elitist version of Mensa. Since their founder said that their entrance test was much difficult that some of the problems had never been solved. However the problem given below was in the Observer as that an unsolved problem. Now after looking at it for a few minutes there I confidently told my friend as I would have the answer in half an hour. 

Then after just over 45 minutes there I did indeed have an answer so my friend was suitably impressed. In fact see the end of these notes for the details. Obviously, I didn't spend my time trying to figure it out as whether you want to split the atom, you don't sharpen a knife.

So there instead I used the time to describe the problem to a  constraint solver that is infinitely better at these things than me. Thus the constraint solver is part of good old Sicstus Prolog then specifying the problem was a matter of writing it as a logic program - it's worth pointing out that I didn't justify how to find the solution that just what the problem was. So now with "AI" programming languages as Prolog to every then the intelligence behind the scenes comes in very handy, of course. Hence once I had justified the problem to the solver as a mere 80 lines of Prolog and it took only one hundredth of a second to solve the problem.

Posted Date: 1/11/2013 7:31:24 AM | Location : United States







Related Discussions:- Constraint satisfaction problems, Assignment Help, Ask Question on Constraint satisfaction problems, Get Answer, Expert's Help, Constraint satisfaction problems Discussions

Write discussion on Constraint satisfaction problems
Your posts are moderated
Related Questions
Determine the types of software There are two types of software today: Application and systems. Meaning of the two changes computer to computer. As we concentrate on large c

Advantages on electronic payment system It gives good security schemes.  Four necessary security requirements for safe e-payments are Authentication, Encryption, Integrity,

Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience  (ii) Electronic records may be authenticated by affixing

Question 1: (a) What is the difference between IT (Information Technology) and ICT(Information Communication Technology) (b) Explain why information systems are so im

The output of SR flip flop when S=1, R=0 is ? Ans. When for the SR flip-flop S=set i/p R=reset i/p, as S=1, R=0, Flip-flop will be set means output will be one.

Does the minimum spanning tree of a graph give the shortest distance between any 2 specified nodes? No. The Minimal spanning tree makes sure that the total weight of the tree i

Define the Character Set of C Language? C uses the lower case letter a to z, the upper case letters A to Z, the digits 0 to 9 and certain characters as building blocks to form

What do you mean by consumer behavior? Explain the factors influencing consumer behavior? Factors Influencing Consumer Choice: Consumer choice or decision behaviour refers to t

Desk Top Publishing (DTP) As word processors develop increasingly more sophisticated features, differences with desk top publishing (DTP) packages becomes more and more blurred