Identify nodes that are cut-off

Assignment Help Data Structure & Algorithms
Reference no: EM13809961

1. Describes four ways of defining the AI field. For each of the following sentences, state which definition of AI it seems to follow and explain your answer.

"I replaced Bob our accountant with a program. I think the program is artificially intelligent because ..."

a. "... when the program makes mistakes, it makes the same mistakes that Bob would."

b. "...all of the program's work passed inspection by our auditors."

c. "... It was programmed using the information from How to Make Managerial Accounting Decisions."

d. "... the program models Bob's actual thought processes."

2. In the search tree shown, circles represent terminal nodes and the double circle represents the goal node. For the traversal schemes, show the node expansion order for non-terminal and non-goal nodes by placing a number near the top right of the node. Assume the search terminates when a goal is generated.

1402_img1.png

a. Breadth-first search

b. Depth-first search

3. The A* algorithm uses an evaluation function f(n) = g(n) + h(n). In one or two sentences, explain the meaning of g(n) and h(n).

4. What constraints are necessary on g and/or h* to make the A* algorithm behave equivalently to: Breadth-first, Uniform-cost, and Best-first?

5. One of your friends notices that for the A* algorithm and for the particular problem you are solving, you apply a g(n) = 1 between all nodes. He points out the fact that for all nodes at level I in the search tree, g(I) will simply equal I. Therefore, he claims, why even bother to take into account g(I)? He says, "Just forget about g(I) and let f*(n) = h*(n). Your A* algorithm will work just as good as before." Explain the fault in this reasoning.

6. Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to:

a. identify nodes that are cut-off

b. compute the final value of the root node

Note: The root node in this tree is a min node.

1467_img2.png

Values for terminal nodes (left to right): 15 5 10 9 14 20

7. You and your chess opponent, John, are in a strange predicament. Whoever wins the present game has to play "Dirty Harry" next. It is a well-known fact that "Dirty Harry" does not fully comprehend the game of chess, moves randomly, and almost always loses. This, in itself, is not so bad; however, it is also a well-known fact that "Dirty Harry" is a very sore loser, and unless he wins, winds up shooting his opponent. Obviously, neither you nor John wants to play "Dirty Harry" next. Therefore, your strategy is to force John to win, and John's strategy is to force you to win.

a. Assuming that both you and John are consistent in choosing the worst possible move for yourselves, could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

b. Now, assume that the very thing you dread most has presented itself; that is, despite your best attempts to lose to John, he has managed to force you to win. Now, you are stuck in a game with "Dirty Harry." Your last hope is to play the game in such a manner that "Dirty Harry" is assured a win. Same question: could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

8. Given the following symbols and their meanings, translate the following propositional logic statement into English and determine whether the assertion is valid.

p: 64k is better than no memory at all.

q: We will buy more memory.

r: We will buy a new computer.

p -> (q -> r), q-> (p -> r)

(p \/ q) ->r

9. Represent the following sentences in first-order logic, using a consistent vocabulary that you define:

a. Fred works in the bank.

b. At least one person is Fred's supervisor.

c. Everyone who works in the bank handles money.

10. Suppose we have the following rules:

∀x Knows(Bill, x) =>ThreatenedBy(Bill, x)

∀xThreatenedBy(Bill, x) => Buys(Bill, x)

Suppose our knowledge base is:

∀a Knows(a, Sun)

Can we assume Bill will buy Sun? Show how we can prove this.

Reference no: EM13809961

Questions Cloud

Describe how cryptography can be used to meet your goal : You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal
Write research review and analysis paper on korb vs raytheon : Write a research, review and analyze Korb v. Raytheon, 707 F.Supp. Analyze and explain the challenges with freedom of speech.
Performance control in the project : Control is the last element of your project. Add a summary about some of the things that would require performance control in the project.
Write paper on the effect of socioeconomic status on student : Write a paper about The effects of socioeconomic status on students' performance in school.
Identify nodes that are cut-off : Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to: identify nodes that are cut-off
What would the participants in the control group do : What would the participants in the control group do
National bureau of economic research : National Bureau of Economic Research
Hostile work environment sexual harassment claim : In a hostile work environment sexual harassment claim, the employer will have a successful defense if the employer can show which of the following
Terrorism and the media : Terrorism and the Media

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  List some of the attacks on the diffie-hellman key exchange

List some of the attacks on the Diffie-Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

  Write efficient backtracking algorithm to inputs integers

Write efficient backtracking algorithm which inputs the integer N, and outputs all of the ways which a group of ascending positive numbers can be summed to N.

  Design algorithm determining annual profit for company

Your goal is to solve the following simple programming exercise. You have been asked by your accounting department to design an algorithm determining the annual profit for your company.

  Using command line options in bash shell script

Design a script that will permit the user to enter one of several choices from the command line. The specific requirements are as follows:

  Design a complete algorithm or draw a flowchart

Design a complete algorithm or draw a flowchart that determines the sales tax on purchases under $1.00 for a state with a 7% sales tax rate. Display the sales tax amount if the number of cents entered was 99 or less; otherwise, display an error me..

  Write down a pseudocode version of the smart bubble sort

question a write a pseudocode version of the smart bubble sort algorithm.question b perform a smart bubble sort on the

  Implement bucket sort suing two-dimensional array

Where n is number of values to be sorted. Each row of two-dimensional array is referred to as bucket. Write class named BucketSort containing method called sort.

  Random walk simulation

A two dimensional array should be used to represent number of times the bug reached each tile on the floor. All cells of this array should be initialized to zero.

  Sort scheduling algorithms according to high throughput

Sort the scheduling algorithms (FCFS, SPF, RR, MLFB) according to each of High throughput (if we take averages of time intervals smaller than the sum of all processes' time)

  Design and build a prototype data warehouse

Design and build a prototype data warehouse using the data on Spend over £500 in the Department of Energy and Climate Change for the financial year 2012-2013 (April 2012 to March 2013 inclusive).

  Write algorithm segment for locating nth successor of item

Write an algorithm or code segment for locating the nth successor of an item in a circlar linked list (the nth item that follows the given item in the list).

  Discuss and define complex data binding

Discuss and define complex data binding and what benefits can this capability lend to a multiple table database application?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd