Estimate the probability of a burglary

Assignment Help Computer Engineering
Reference no: EM131444893

Question 1. (a) Solve the given puzzle using crypt arithmatic method.

      B  A  S  E

  +  B  A  L  L

  G  A  M E  S

(b) Apply uniform cost search Algorithm on given graph.

587_figure1.jpg

Question 2. (a) Consider the examples.

(i) If Triangle is equilateral then it is isosceles.
(ii) If Triangle is isosceles then two sides 'A' and 'B' are equal.
(iii) If 'AB' and 'AC' are equal then Angle 'B' and 'C' are equal.
(iv) ABC is an equilateral Triangle.
Prove that angle 'B' is equal to angle 'C' using inferencing techniques of modus ponen and Resolution.

Question 3. (a) Consider the knowledge base KB that contains the following propositional logic sentences.

Q ⇒ P

P ⇒ ¬ Q

Q v R

(i) Construct a Truth table trat shows the truth value of each sentence in KB and indicate the model in which the KB is true.

(ii) Does KB entail R ? Use the definition of entailment to justify your answer.

(iii) Does KB R ⇒ ¬ P entail ? Extend the truth table and usQ the definition of entailment to justify your answer.

(iv) Does KB Q ⇒ ¬ R entail ? Extend truth table and use the definition of entailment to justify your answer.

Question 4. (a) You have two neighbours, John and Mary, who have promised to call you at work when they hear the alarm. John always calls when he hears the alarm, but sometimes confuses the telephone ringing with the alarm and calls then, too. Mary on the other hand, likes rather loud music and sometimes misses the alarm altogether. Given the evidence of who has or has not called, we would like to estimate the probability of a burglary.

Draw a Bayesian network for this domain with suitable probability tables.

Question 5. (a) Consider the given Game Tree. Apply the Aplpha- Beta pruning algorithm and 10 decide, what is to be the next best move ? (Δ - max node , ∇- min node)

2082_Figure.jpg

Reference no: EM131444893

Questions Cloud

What are the sources behind temperamental differences : In your words, define human development. What is its relationship to socialization/culture?What Is Temperament? Explain The Goodness of Fit Between Temperament and Culture. What are the sources behind Temperamental Differences?
What coverage do you think your company has and why : What are the benefits of the coverage? Who is eligible for coverage? How is the coverage financed? What coverage do you think your company has and why?
Specific heat of copper : An electric current heats a 335 g copper wire from 25oC to 100.oC.  How much heat was generated by the current? The specific heat of copper is 0.390 J/(g.Co).
Describe how your firm compares with the industry : BUS650- Identify where your firm seems to lag. Describe how your firm compares with the industry and speculate as to why you believe your firm is performing as it is.
Estimate the probability of a burglary : BEITC703 - Solve the given puzzle using crypt arithmatic method and Construct a Truth table trat shows the truth value of each sentence in KB and indicate the model in which the KB is true.
Calculate the value of bond a if the required return : Calculate the value of bond A if the required return is (1) 8%, (2) 11%, and (3) 14%. Calculate the value of bond B if the required return is (1) 8%, (2) 11%, and (3) 14%.
Does the electron gain or lose energy : The charge carried by an electron is -1.60×10-19 C. Suppose that an electron moves through a voltage of 120V from the negative polarity to the positive polarity. How much energy is transferred? Does the electron gain or lose energy?
Determine the magnitude of the net charge : A 5-μF capacitor has 100 V between its terminals. Determine the magnitude of the net charge stored on each plate and the total net charge on both the plates.
Multiple of earth mass : Spectroscopic studies indicate that the outermost particles have a speed of 17 km/s.Using the data in this problem, find the mass of Saturn. Express your answer result in kgand as a multiple of Earth's mass, ME

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain some benefits of code citations

What is an instance of how one would re-use a C# object. At the same time, one must avoid code plagiarism. How does one reconcile the two? Describe some benefits of code citations in addition to avoiding plagiarism.

  Prepare program that reads a text file and stores the data

Can you prepare the program that reads a text file and stores the data into an Object called fruit Say the text file data is as follows for

  List the primary key and functional dependencies

List the primary key and functional dependencies in the following table, subject to the specified conditions. Convert this table to an equivalent collection of tables that are in third normal form (3NF).

  Benefit and disadvantage of cloud pro for network admins

Discuss one benefit and one disadvantage of Cloud Pro for network admins. Search and view a video demo of Rackspace's Cloud Pro for the iPad. Does the app have amazing features, as Mike Mayo described

  Assignment on information and communication technology

A thorough executive summary and an overview of the company, its history, background, and stage in the company life cycle. The need(s) the company addresses and the customers it pursues. The role of the Internet in strategy: business strategy, Infor..

  You are a networking intern at richman investments you

you are a networking intern at richman investments. you recently developed a design for a remote access control policy

  What is the role of policy in formulating the information

What is the role of policy in formulating the information assurance manual? Why is it useful to have a template for documenting the information assurance system

  Formulate a debugging strategy

Formulate a debugging strategy. What module should be debugged first, what inputs should you use, what outputs should you expect to see? How should you begin to integrate the modules? What should you do on failure?

  Discuss the issues the project manager must consider

Discuss the issues the project manager must consider when assigning programming tasks to the programmers.

  Describe how concepts such as risc evolved over past years

Describe how concepts such as RISC, pipelining, cache memory, and virtual memory have evolved over the past 25 years to improve system performance.

  Xpath and xslt transformation

Explain the context in XPath. Explain at least three things you will require to perform an XSLT transformation.

  Describe the architecture of the hack platform

For example, in paragraphs 1-8 you describe the architecture of the hack platform. A good way to re-write that section would be: The Hack PC requires an FPGA development board that is capable of supporting:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd