Forward chaining - artificial intelligence, Computer Engineering

Forward Chaining - Artificial intelligence:

Imagine we have a set of axioms which we know are true statements regarding the world. If we set these to each be a starting state of the search space and we set the aim state to be our theorem statement, then it is a simple approach which may be used to prove theorems. We call this approach forward chaining approach because the agent employing the search constructs chains of reasoning from the axioms, positively to the goal. Once a path has been found from the axioms to the theorem, this is the path to constitutes a proof and the problem has been solved.

However,in general, the problem with forward chaining is that it cannot easily use the goal (theorem statement) to drive the search. Hence it actually might just explore the search space until it comes across the solution. Goal-directed searches are frequently more effective than non-goal directed ones like forward chaining.

 

Posted Date: 10/2/2012 8:25:48 AM | Location : United States







Related Discussions:- Forward chaining - artificial intelligence, Assignment Help, Ask Question on Forward chaining - artificial intelligence, Get Answer, Expert's Help, Forward chaining - artificial intelligence Discussions

Write discussion on Forward chaining - artificial intelligence
Your posts are moderated
Related Questions
List the major components of the keyboard/Display interface. a. Keyboard section b. CPU interface section c. Display section d. Scan section

Q. Diffrence between RISC and CISC architecture? CISCs provide better support for high-level languages since they include high-level language constructs such as CASE, CALL etc

Granularity In 'Parallel computing', Granularity can be defined as a qualitative assess of the ratio of computation to communication. 1) Coarse Granularity - relatively hug

An EFI boot manager is also used to select and load the operating system, removing the require for a dedicated boot loader mechanism

Explain the functioning of Firewall Using Screening Router. Firewall Using Screening Router: The risk of break-within is large along with this form of firewall: Eve

Q. Returns and Procedures definitions in 8086? 8086 microprocessor supports RET and CALL instructions for procedure call. CALL instruction not only branches to indicate address

The velocity of sound in air is 49.02 feet per second where is the air temperature in degrees Rankine.  Write a function to execute this.  If just 1 argument is passed to the f

Basically I need implement program using LC3 assembly language where I can type any message using ASCII code (this will my input). Then read the output in cipher text. It has to be

Analysis of Algorithms For this task, each student should do two things: An empirical analysis of the runtime and comparisons made for all algorithms as a function of input si

Structural Classification Flynn's classification explains the behavioural idea and doesn't take concern into the computer's structure. Parallel computers can be categorized bas