What search method would be most appropriate and why, Computer Engineering

(a) Describe fully in your own words the following terms:

(i) Turing Test
(ii) Agent
(iii) Utility-based agent

(b) A Mars rover has to leave the lander, collect rock samples from three places and return to the lander.

Consider that it has a navigation module that can take it directly from any place of interest to any other place of interest. So it has primitive actions: go-to-lander, go-to-rock-1, go-to-rock-2 and go-to-rock-3.

We know the time it takes to traverse between each pair of special locations. Our goal is to search a sequence of actions that will perform this task in the shortest amount of time.

(i) Formulate this problem as a search problem by specifying the state space, initial state, path-cost function and goal test. Try to be sure that the state space is detailed enough to support solving the problem but not redundant.

(ii) Say what search method would be most appropriate and why.

(iii) One possible heuristic evaluation function for a state would be the amount of time required for the robot to go back to the lander from the location of the state. Is this function admissible?

Posted Date: 11/13/2013 6:22:56 AM | Location : United States

Related Discussions:- What search method would be most appropriate and why, Assignment Help, Ask Question on What search method would be most appropriate and why, Get Answer, Expert's Help, What search method would be most appropriate and why Discussions

Write discussion on What search method would be most appropriate and why
Your posts are moderated
Related Questions
Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers

Redefines clause is used to permit the similar storage allocation to be referenced by dissimilar data names.

Explain the differences of casex and casez over the case statement? casex operator has to be used when both high impedance value (z) and unknown (x) in any bit  has  to  be  t

Chaining: In this method, instead of hashing function value as location we use it as an index into an array of pointers. Every pointer access a chain that holds the element having

Q. Show the categories of Web browser? The two basic categories of Web browser are: • Text-only browsers: A text-only browser like Lynx allows you to view Web pag

Proof by Contradiction - Artificial intelligence So, both backward chaining andforward chaining have drawbacks. Another approach is to think regarding proving theorems by contr

Steps in Building the Structure Chart 1. Recognize top level modules and decompose them into lower levels 2. Add control connections 3. Add couples 4. Review and revis

Define EMS The area at location C8000H-DFFFFFH is often free oropen. This area is used for the expanded memory system in a XT or PC system, or for the upper memory system in an

The Chocolate Delights Candy Company requires to add the following functionality to its cash register: When a customer is checking out, the cash register requires keeping the ne

What are the events by which we can program "help texts" and display "possible value lists"? -PROCESS ON HELP-REQUEST (POH). -PROCESS ON VALUE-REQUEST (POV).