Depth first search - artificial intelligence, Computer Engineering

Depth First Search - artificial intelligence:

Depth first search is very similar to breadth first, except for that the things are added to the top of this agenda rather than of the bottom. In our example we can notice, the first three things on the agenda would still be: 

Conversely, once the 'D' state has been found, the actions for this:  

1.(empty,add'D')

2.(empty,add'N')

3. (empty,add 'A')

They would be added to the top of the agenda for a certain reason, so it would look like this: 

4. ('D',add 'D')

5. ('D',add 'N')

6. ('D',add 'A')

 Obviously, carrying out this action at the top of the agenda and would introduce the string 'DD', but this would cause the action for: 

('DD',add 'D')

 Add to the top, and the next string found would be 'DDD'. Undoubtedly this can't go on indefinitely, and in the practice, we must have to specify a depth limit to stop for going down a particular path forever. Because is, our agent will need to record how far down a particular path it has been gone, and have to avoid putting actions on the agenda if there is the state in the agenda item that is past a certain depth.

Posted Date: 1/9/2013 7:20:02 AM | Location : United States







Related Discussions:- Depth first search - artificial intelligence, Assignment Help, Ask Question on Depth first search - artificial intelligence, Get Answer, Expert's Help, Depth first search - artificial intelligence Discussions

Write discussion on Depth first search - artificial intelligence
Your posts are moderated
Related Questions
Illustrates several names of popular internet browsers? Popular Internet Browsers are: Internet Explorer, Netscape Navigator and Mosaic, Google chrome and Mozilla and Opera.

Benefits of using UML breaks the complex system into discrete pieces that can be understood simply. Handover the system to new team becomes simpler. Complex system can be un

Explain the meaning of LISTEN socket primitive The listen Primitive: After identifying a protocol port a server should instruct the operating system to place a socket

Five popular hashing functions are as follows:- Division Method Midsquare Method Folding Method Multiplicative method Digit Analysis

Another useful feature of an experts system is its predicative modelling power. The system can act as an information processing theory or model of problem solving in th

Define the Process of dynamic modelling: Analyse applicability of actions Recognize object states Create dynamic model diagram Express every state in terms o

Q. Define Interrupts and Instruction Cycle? Let's precise the interrupt process, on the event of an interrupt, an interrupt request (in form of a signal) is concerned to CPU. T

Name the languages introduced in second  generation During  the time of  second  generation  many  high  level  programming  languages  were introduced, such as FORTRAN (1956),

Classify Scheduler. Scheduler is a kernel function decide which method  be  thought to be implemented by the processor: the scheduler scans the list of processes in the ready s

Explain the Real time process control Process control is a real time system. Though this is very different to real time (transaction) processing; this system generally involves