Goals - artificial intelligence, Computer Engineering

Goals - artificial intelligence:

One desirable way to make perfect an agent's performance is to enable it to have some details of what it is trying to complete. If it is given some explanation of the goal (e.g., some information relates the solution to a problem it is trying to solve), then it can consign to that information to see if a particular action will lead to such goal. These agents are mostly called goal-based. Two tried and trusted methods for goal-based agents are planning (where the agent puts together and executes a plan for achieving its goal) and find (where the agent looks ahead in a look for space until it finds the goal). Planning and research issues are covered later in this course. 

In RHINO, there were two goals: get the robot to an exhibit chosen by the guests and, when it gets there, provide information about the display Obviously, RHINO used information about its goal of getting to an exhibit to plan its route to that exhibit.

Posted Date: 1/9/2013 7:02:05 AM | Location : United States







Related Discussions:- Goals - artificial intelligence, Assignment Help, Ask Question on Goals - artificial intelligence, Get Answer, Expert's Help, Goals - artificial intelligence Discussions

Write discussion on Goals - artificial intelligence
Your posts are moderated
Related Questions
application of de moiver theorem in software engineering

Perl is a language and MOD_PERL is a module of Apache used to increase the performance of the application.

What is the use of buffer register? The buffer register is used to avoid speed mismatch among the I/O device and the processor.

Eliminating data hazards: Forwarding NOTE: In the following instance, computed values are in bold, whereas Register numbers are not. Forwarding involves adding output

Automatic correlation from web point of sight can be set in recording options and correlation tab. Here we can enable correlation for the whole script and choose either issue onlin

B2C -Business to Consumer  This is where the consumer admittance the system of the supplier. It is still a two-way function but is usually complete solely by the Internet.

Enumerate about the Specialised hardware Specialised hardware such as protected memory or cryptographic memory module for storing and protecting the keys proves to be a good s

What are transmission bridges? A usual transmission bridge is demonstrated in figure. The series capacitance and the shunt inductances of the two relays give a high-pass filte

Question: (a) Provide types of computer systems and briefly describe each one. (b) With the help of example, explain the difference between open source software, freeware a

What are privileged instructions?  Some of the machine instructions that might cause harm to a system are designated as privileged instructions. The hardware permits the privil