Depth first search - artificial intelligence, Computer Engineering

Depth First Search - artificial intelligence:

Depth first search is very similar to breadth first, except for that the things are added to the top of this agenda rather than of the bottom. In our example we can notice, the first three things on the agenda would still be: 

Conversely, once the 'D' state has been found, the actions for this:  

1.(empty,add'D')

2.(empty,add'N')

3. (empty,add 'A')

They would be added to the top of the agenda for a certain reason, so it would look like this: 

4. ('D',add 'D')

5. ('D',add 'N')

6. ('D',add 'A')

 Obviously, carrying out this action at the top of the agenda and would introduce the string 'DD', but this would cause the action for: 

('DD',add 'D')

 Add to the top, and the next string found would be 'DDD'. Undoubtedly this can't go on indefinitely, and in the practice, we must have to specify a depth limit to stop for going down a particular path forever. Because is, our agent will need to record how far down a particular path it has been gone, and have to avoid putting actions on the agenda if there is the state in the agenda item that is past a certain depth.

Posted Date: 1/9/2013 7:20:02 AM | Location : United States







Related Discussions:- Depth first search - artificial intelligence, Assignment Help, Ask Question on Depth first search - artificial intelligence, Get Answer, Expert's Help, Depth first search - artificial intelligence Discussions

Write discussion on Depth first search - artificial intelligence
Your posts are moderated
Related Questions
Q. Define Parameters used in Program Annotation? Parameters: A parameter refines and extends the meaning that assembler attributes to keyword in a statement.  Number of param

Throughput Throughput of a pipeline may be defined as number of results which have been achieved per unit time. It can be referred as: T = n / [m + (n-1)]. c = E / c Th

Q. Function of OSI Transport Layer? - It takes the information to be sent as well as breaks it into individual packets that are sent and reassembled into a complete message by

In 32bit IP Addressing scheme all 1's represent? All 1's represent limited broadcast in 32 bit IP Addressing scheme.

Explain the Programmable ROM (PROM) - Computer Memory? This is a kind of ROM that can be programmed using special equipment it can be written to, but only once and this is usef

What are the mapping techniques? a)Direct mapping b) Associative mapping c)  Set associative mapping

Data Mining is an analytic method designed to explore data and then to validate the findings by applying the detected patterns to latest subsets of data.  The ultimate goal of dat

A combinational circuit has 3 inputs A, B, C and output F.  F is true for following input combinations A is False, B is True A is False, C is True A, B, C are

Q. What is Stack Addressing? In this addressing technique operand is implied as top of stack. It isn't explicit however implied. It employs a CPU Register known as Stack Pointe

Explain the concept of top-down design for a program. Top down Design: A top-down approach is fundamentally breaking down a system to gain insight into its compositional s