Depth first search - artificial intelligence, Computer Engineering

Depth First Search - artificial intelligence:

Depth first search is very similar to breadth first, except for that the things are added to the top of this agenda rather than of the bottom. In our example we can notice, the first three things on the agenda would still be: 

Conversely, once the 'D' state has been found, the actions for this:  

1.(empty,add'D')

2.(empty,add'N')

3. (empty,add 'A')

They would be added to the top of the agenda for a certain reason, so it would look like this: 

4. ('D',add 'D')

5. ('D',add 'N')

6. ('D',add 'A')

 Obviously, carrying out this action at the top of the agenda and would introduce the string 'DD', but this would cause the action for: 

('DD',add 'D')

 Add to the top, and the next string found would be 'DDD'. Undoubtedly this can't go on indefinitely, and in the practice, we must have to specify a depth limit to stop for going down a particular path forever. Because is, our agent will need to record how far down a particular path it has been gone, and have to avoid putting actions on the agenda if there is the state in the agenda item that is past a certain depth.

Posted Date: 1/9/2013 7:20:02 AM | Location : United States







Related Discussions:- Depth first search - artificial intelligence, Assignment Help, Ask Question on Depth first search - artificial intelligence, Get Answer, Expert's Help, Depth first search - artificial intelligence Discussions

Write discussion on Depth first search - artificial intelligence
Your posts are moderated
Related Questions
Q. Use of Intrinsic Functions in FORTRAN? HPF initiates some new intrinsic functions also to those defined in F90. The two mainly often used in parallel programming are system

What is critical section problem? A race condition at data item occurs when many processes simultaneously update its value data consistency, needs that only one process should

What is CTS and CLS? CLS stands for common language specification CTS stands for common type system.

It depends on our requirement. When we are needed an integer to be stored in 1 byte (means less than or equal to 255) we use short int, for 2 bytes we use int, for 8 bytes we use l

Explain SPC. Also discuss the different modes of Centralized SPC In stored program control systems, set of instructions or a program to the computer is stored into its memory a

What is Collation Collation refers to a set of rules that verify how data is sorted and compared. Character data is sorted using rules that explain  the correct character se

List all seven layer of OSI model and describe function of application layer. The layers of OSI model are as follows: (1) The Physical Layer: It defines an interface in

How different control function categories help in signalling and control. Events happening outside the exchange on the line units, trunk junctions and inter exchange signalin

What are the three basic types of web documents? There are three fundamental types of web documents: Static, Dynamic and Active. STATIC A static web document resides i

Problem: (a) What do you understand by the principle of locality of reference and explain how this is exploited in cache design. (b) Consider a 32-bit microprocessor that h