Forward chaining, Computer Engineering

Forward Chaining:

Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal state to be our theorem statement there that this is a simple approach that can be used to prove theorems. Now we need call this approach forward chaining, this means that the agent employing the search constructs chains of reasoning and from the axiom and hopefully to the goal. If once a path has been found from the axioms to the theorem than this path constitutes a proof and the problem has been solved. 

Moreover, the problem with forward chaining in generally in which it cannot easily use the goal (theorem of statement) to drive the search. Thus it really must just explore the search space until it comes across the solution. Just to goal-directed searches are often more effective than non-goal directed ones as like forward chaining.

Posted Date: 1/11/2013 6:06:57 AM | Location : United States







Related Discussions:- Forward chaining, Assignment Help, Ask Question on Forward chaining, Get Answer, Expert's Help, Forward chaining Discussions

Write discussion on Forward chaining
Your posts are moderated
Related Questions
Data phases: After the address phase (particularly, starting with the cycle that DEVSEL# goes low) comes a burst of one or more data phases. In all the cases, initiator drives

How is network examined by intranets, extranets and Internet? When more and more businesses seek to build their mission critical business solutions onto IP networks, networking

Q. Explain about Hexadecimal Numbers system? Hexadecimal system has 16 digits that are represented as 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F. A number (F2) H is equivalent to

What are multi-cycle paths? Multi-cycle paths are paths among registers which take more than one clock cycle to turn out to be stable. For illustration analyzing the de

Q. Library of functions of parallel virtual machine? PVM offers a library of functions libpvm3.a, that application programmer calls. Every function has some specific effect in

Explain the term Confidentiality - Firewall Design Policy Whilst some corporate data is for public consumption, the vast majority of it should remain private.

What are the disadvantages of Bespoke Software -  Very dependent on suppliers of the software; if they go out of business there would be little or no support if problems occ

Determine the level of state decomposition The level of state decomposition must be determined by judgement. A too fine grained model is unsuitable, such as, modelling all poss

Briefly explain how the server control validation controls work? A validation control works by evaluating the value of an input server control on the page to see whether it me

Q. Describe key features of the von Neumann Architecture? Describe key features of the von Neumann Architecture: The mainly basic function performed by a computer is exe