Forward chaining, Computer Engineering

Forward Chaining:

Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal state to be our theorem statement there that this is a simple approach that can be used to prove theorems. Now we need call this approach forward chaining, this means that the agent employing the search constructs chains of reasoning and from the axiom and hopefully to the goal. If once a path has been found from the axioms to the theorem than this path constitutes a proof and the problem has been solved. 

Moreover, the problem with forward chaining in generally in which it cannot easily use the goal (theorem of statement) to drive the search. Thus it really must just explore the search space until it comes across the solution. Just to goal-directed searches are often more effective than non-goal directed ones as like forward chaining.

Posted Date: 1/11/2013 6:06:57 AM | Location : United States

Related Discussions:- Forward chaining, Assignment Help, Ask Question on Forward chaining, Get Answer, Expert's Help, Forward chaining Discussions

Write discussion on Forward chaining
Your posts are moderated
Related Questions
What is Software and hardware interrupt The software interrupts are program instructions. These instructions are inserted at desired location in a program. A program formed int

Micro-instructions are stored in control memory. Address register for control memory comprises the address of subsequent instruction which is to be read. Control memory Buffer Regi

Subtraction of 01100-00011 using 2's complement method Ans. Firstly 1's complement of 00011 is 11100 and 2's complement is 11100 + 1 = 11101. Thus If a last carry is

Q. Explain Integrated Disk Electronics Devices? IDE devices are associated to PC motherboard by a 34-wire ribbon cable. Common drive used today for workstations has capacities

RDBMS relational database system - Relational databases are composed of relations and managed through relational operations, and governed through data integrity constraints.

Described different types of addressing modes available? Ans: The various types of addressing modes available are following:   Register addressing mode   Immediate ad

Write shorts notes on Digital Signature. This method is used to authenticate the sender of a message. For sign a message, the sender encrypts the message by using a key ident

Q. What is Gate? Explain Basic gates with truth table and necessary circuits. Q. Which gates are called Universal Gates? Why? Q. Give the Dual of the rule 17. Q. Realize

What are the modes in which any update tasks work? Synchronous and Asynchronous.

Data packets: USB communication takes the form of packets. Originally, all packets are sent from the host, using the root hub and possibly more hubs, to components. Some of th