Generic techniques developed - artificial intelligence, Computer Engineering

Generic Techniques Developed:

In the pursuit of solutions to various problems in the above categories, various individual fundamental techniques have sprung up which have been shown to be helpful for solving a range of problems (usually within the general problem category). These techniques are established enough now to have a name or any kind of symbol and provide at least a partial characterisation of "AI". The following list is not contains to be complete in whole programming, but rather to introduce some techniques you will able to learn later in the course. Assign that some of these overlap with the general techniques above. 

1.       Forward/backward chaining (reasoning)

2.       Defining based (learning) 

3.       Resolution theorem and concept proving (reasoning)

4.       Proof planning (reasoning) 

5.       Constraint satisfaction and self motivation(reasoning)

6.        Davis-Putnam method (reasoning) 

7.       Mini-max search (games)

8.       Alpha-Beta pruning (games) 

9.       Case-based reasoning (expert systems)

10.    Knowledge elicitation (expert systems) 

11.   Neural networks (learning)

12.    Bayesian methods (learning) 

13.   Inductive logic programming (learning)

14.    Reinforcement (learning) 

15.   Genetic algorithms (learning)

16.   Genetic fundamental programming (learning) 

17.   Strips (planning)

18.   N-grams (NLP)

19.   Parsing (NLP)

20.   Behavior based (robotics) 

21.   Cell decomposition (robotics)

Posted Date: 1/9/2013 6:49:03 AM | Location : United States







Related Discussions:- Generic techniques developed - artificial intelligence, Assignment Help, Ask Question on Generic techniques developed - artificial intelligence, Get Answer, Expert's Help, Generic techniques developed - artificial intelligence Discussions

Write discussion on Generic techniques developed - artificial intelligence
Your posts are moderated
Related Questions
In a for loop, if the condition is missing, then, It is supposed to be present and taken to be true.

The combination of an IP address and a port number is known as a socket.

And-Elimination rule: In generally English says that "if you know that lots of things are all true, so you know like any one of them is also true". Because you can specify a c


Explain non-pre-emptive algorithms?   Non preemptive algorithms: In this algorithm a job is provided to CPU for execution as long as the job is non-completed the CPU cannot

CISC (Complex Instruction Set Computer) CISC stands for Complex Instruction Set Computer. If the control unit having a number of micro-electronic circuitry to make a set of con

Explain the E-cheques verses Credit Cards in brief. E-cheques: E-cheques are utilized for business dealing into e-commerce. Transactions of such cheques take place onto Inter

What are two reasons for using layered protocol? Layered protocol implies protocols used into each layer are the layer's own business that is they don't influence protocol of a

Hazard (computer architecture): In the computer architecture, a hazard is a possible problem that can occurs in a pipelined processor. It concern to the possibility of erroneo

Q. Observations of High Level Language Program? Observations Integer constants appeared nearly as frequently as structures or arrays. Most of the scalars were foun