Prolog artificial intelligence , Computer Engineering

1. countdown Example: countdown(5,[5,4,3,2,1]).

 NOTE - your function should be able to answer questions such as: ?- countdown(5,L).

 2. count_occur Example: count_occur(7,[5,2,6,7,8,7,0],2).

 the list [5,2,6,7,8,7,0] has 2 occurences of 7

 3. array insert Example: ains([0,0,1,1,2,2],4,53,[0,0,1,1,53,2,2]).

 and array get Example: aget([0,0,1,1,53,2,2],4,53).

 These functions simulate array operations, using lists.  "ains" takes a list, an index, and a value to insert, and produces a list with the value inserted at the index point.  "aget" takes a list and an index, and produces the value from the list at the index point.

Posted Date: 2/21/2013 5:41:18 AM | Location : United States







Related Discussions:- Prolog artificial intelligence , Assignment Help, Ask Question on Prolog artificial intelligence , Get Answer, Expert's Help, Prolog artificial intelligence Discussions

Write discussion on Prolog artificial intelligence
Your posts are moderated
Related Questions
Write a four-page paper how relational data solution is applied to presnt Video Store business. 1.       Describe Relational Databases   2.       Write History of databases

Explain with the help of Nyquist theorem, the data rate limitations in PSTN's. Data rates in PSTNs : A voice channel in a public switched telephone network is band restricted

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

There are two methods for organising the associative memory based on bit slices: Bit parallel organisation: In this organisation every bit slices which are not masked off,

Compare the architecture of SS7 with seven-layer OSI architecture The relationship among these levels and the layers of the OSI model is demonstrated in figure. The user part i

As an employee of an up and coming web Design Company, you have been approached by a small local cinema, called Valley Viewing who are looking to revamp their existing HTML website

The default Look and Feel of swing components are Java Look-and-Feel.

Q. Describe Critical Directive in FORTAN? The critical directive permits one thread executes associated structured block. When one or more threads attain critical directive the

Investigate the MIPS programmers model and develop an object-oriented design that will reflect aspects of the MIPS architecture. Consider the functional units of the architecture a

The most common type of non-volatile memory is the ROM device. This device is read only and the data is masked into the chip during manufacture. Variations of the ROM are one off p