Hill climbing - artificial intelligence, Computer Engineering

Hill Climbing - Artificial Intelligence:

As we've seen, in some problems, finding the search path from primary to goal state is the point of the exercise. In other problems, the path and the artefact at the end of the path are both important, and we regularly try to find optimal solutions. Just for a certain set of problems, the path is irrelevant and finding appropriate artefact is the sole purpose of the search. In such cases, it doesn't be matter whether our agent searches down a path for 10 or 1000 steps, as long as it may be finds a solution in the end.

For example, consider the 8-queens problem in which we decided where the task is to find an sequence of 8 queens on a chess board such that no one can "take" another (one queen can take another if it's on the same horizontal, vertical or diagonal line. A Solution for this type of problem is:

One possible way to justify this problem is with states where there are a number of queens (1 to 8) on the board, and an action is to add a queen in this like a way that it can't take another. Its tottaly depending on your strategy, you may find that the search needs much more back-tracking, i.e., towards the end, and you find that you simply can't put the last queens on anywhere, so that you have to move one of the queens you put down earlier (you go back-up the search tree).

Posted Date: 1/10/2013 4:32:51 AM | Location : United States

Related Discussions:- Hill climbing - artificial intelligence, Assignment Help, Ask Question on Hill climbing - artificial intelligence, Get Answer, Expert's Help, Hill climbing - artificial intelligence Discussions

Write discussion on Hill climbing - artificial intelligence
Your posts are moderated
Related Questions
Simple codes for robot using applet

What are synchronous counters? Design a Mod-5 synchronous counter using J-K Flip-Flops. Ans. Synchronous Counters : It means that all flip-flops are clocked concurrently. T

Vector-Scalar Instructions : In this type, when the combination of vector and scalar are fetched and saved in vector register. These instructions are denoted with the many function

Elucidate in brief the functions of the clock generator chip, 8284. 8284 Clock generator: 8284 is an ancillary component to the microprocessors. Without clock generator, many

What are the four significant factors that led to the development of open source software? 1. To diminish the high control value of the Proprietary Software 2. To avoid disc

Which scheduler selects processes from secondary storage device? Ans. Medium term scheduler selects processes from secondary storage device.

Explain how a centralized SPC organization works under load sharing operation. Under load sharing operation, an incoming call is allocated randomly or in a predetermined sequen

Q. Connection Machine FORTRAN? Connection Machine Fortran was a subsequent SIMD language developed by Thinking Machines Corporation. Connection Machine Fortran incorporated all

CPU burst time indicates the time, the process needs the CPU. The following are the set of processes with their respective CPU burst time     (in milliseconds). Process

a. What is the meaning of aliasing? What are its drawbacks? Describe a method to remove aliasing, using post filtering. b. How can you copy a Pixmap from one place to another