Generic techniques developed - artificial intelligence, Computer Engineering

Generic Techniques Developed:

In the pursuit of solutions to various problems in the above categories, various individual fundamental techniques have sprung up which have been shown to be helpful for solving a range of problems (usually within the general problem category). These techniques are established enough now to have a name or any kind of symbol and provide at least a partial characterisation of "AI". The following list is not contains to be complete in whole programming, but rather to introduce some techniques you will able to learn later in the course. Assign that some of these overlap with the general techniques above. 

1.       Forward/backward chaining (reasoning)

2.       Defining based (learning) 

3.       Resolution theorem and concept proving (reasoning)

4.       Proof planning (reasoning) 

5.       Constraint satisfaction and self motivation(reasoning)

6.        Davis-Putnam method (reasoning) 

7.       Mini-max search (games)

8.       Alpha-Beta pruning (games) 

9.       Case-based reasoning (expert systems)

10.    Knowledge elicitation (expert systems) 

11.   Neural networks (learning)

12.    Bayesian methods (learning) 

13.   Inductive logic programming (learning)

14.    Reinforcement (learning) 

15.   Genetic algorithms (learning)

16.   Genetic fundamental programming (learning) 

17.   Strips (planning)

18.   N-grams (NLP)

19.   Parsing (NLP)

20.   Behavior based (robotics) 

21.   Cell decomposition (robotics)

Posted Date: 1/9/2013 6:49:03 AM | Location : United States







Related Discussions:- Generic techniques developed - artificial intelligence, Assignment Help, Ask Question on Generic techniques developed - artificial intelligence, Get Answer, Expert's Help, Generic techniques developed - artificial intelligence Discussions

Write discussion on Generic techniques developed - artificial intelligence
Your posts are moderated
Related Questions
Add -20 to +26 by using 2's complement ? Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -

Q. Explain Optimization process of Pipelining ? RISC machines can use a very efficient pipeline scheme due to the regular and simple instructions. Similarly all other instructi

What is visibility give UML notation? Visibility refers to the ability of a process to reference a feature from another class and has possible valued of public, private, protec

What are the different parameter passing mechanisms to a function? The different parameter-passing mechanisms are given below: 1.   Call by value 2.   Call by value-resu

What are the difference between heap and stack? The Stack is more or less responsible for maintaining track of what's executing into our code or what's been "called". The Heap

Explain at least one modulation technique used for high speed modems. FSK - Frequency Shift Keying: In such technique the frequency of the carrier signal is changed as per to

Suppose there are 2 copies of resource A, 3 copies of resource B, and 3 copies of resource C. Suppose further that process 1 holds one unit of resources B and C and is waiting for

Blue Sky events is an organisation that devices and runs large outdoor events. They have been commissioned to organise and run an event for four months over the summer period in a

Define Overflow.  An overflow is a problem in digital computer due to the width of registers is finite. A result that contains n+ 1 bit cannot be accommodated in a register wit

Learning Abilities of Perceptrons: Conversely computational learning theory is the study of what concepts particular learning schemes as representation and method detail as a