Forward chaining, Computer Engineering

Forward Chaining:

Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal state to be our theorem statement there that this is a simple approach that can be used to prove theorems. Now we need call this approach forward chaining, this means that the agent employing the search constructs chains of reasoning and from the axiom and hopefully to the goal. If once a path has been found from the axioms to the theorem than this path constitutes a proof and the problem has been solved. 

Moreover, the problem with forward chaining in generally in which it cannot easily use the goal (theorem of statement) to drive the search. Thus it really must just explore the search space until it comes across the solution. Just to goal-directed searches are often more effective than non-goal directed ones as like forward chaining.

Posted Date: 1/11/2013 6:06:57 AM | Location : United States

Related Discussions:- Forward chaining, Assignment Help, Ask Question on Forward chaining, Get Answer, Expert's Help, Forward chaining Discussions

Write discussion on Forward chaining
Your posts are moderated
Related Questions
Interrupts Interrupt-request line o   Interrupt-acknowledge signal o   Interrupt-request signal Interrupt-service routine o   May have no relationship t

What is time division switching? With the help of block diagram explain basic time division and time switching method. Time Division Switching: A switching component can be s

Apply this algorithm to your MASM program 1) Declare the following variables in your data segment: .data ; ; These are the values of the variables ; Variables

Define the Information System Growing sophistication in products and markets is driving the organisational requirement for increasing amounts of information. This req

Write a program to display grade message according to the marks

While using FTP what is wildcard expansion in file names? To make this easy for users to identify a set of file names, FTP permits a remote computer system to perform usual fil

Q. Show the MIPS Addressing Modes? MIPS Addressing Modes MIPS employs various addressing modes: 1. Uses Register as well asimmediate addressing modes for operations.

Vector-Memory Instructions : When vector operations with memory M are executed then these are vector-memory instructions. These instructions are denoted with the many function mapp

What is layer? A layered system is ordered set of virtual worlds. Every build-in terms of one's below it and providing the execution basis for one above it. The objects in ever

This unit starts by discussing the importance of involving users in the interaction design process, explaining the reasons why user involvement can be useful, the different degrees