A* search-artificial intelligence, Basic Computer Science

Assignment Help:

A* Search-Artificial intelligence:

 

A* search combines the best parts of uniform cost search that  called the fact that it's optimal and complete, and the best parts of greedy search that called its speed. This search method simply combines the path cost function g(n) and the heuristic function h(n) by summing them to form a new heuristic measure f(n):

f(n) = h(n) + g(n)

Remembering that g(n) gives the path cost from the began  state to state n and h(n) estimates the path cost from n to a goal state, we see that f(n) estimates the cost of the cheapest solution which passes through n.

The most essential aspect of A* search is that, given one limitation on h(n), it is possible to prove that the search strategy is complete and optimal. The limitation to h(n) is that it might always underestimate the cost to achieve a goal state from n. Such heuristic measures are called admissible. See Norvig and Russell for verification that A* search with an admissible heuristic is complete and optimal.


Related Discussions:- A* search-artificial intelligence

Standard Data Types, The data stored in memory can be of a lot of types. In...

The data stored in memory can be of a lot of types. In case, a person’s age is stored as a numeric value and his or her address is stored as alphanumeric characters. Python has som

Unspecified bit rate, ATM Theory - Unspecified Bit Rate Is intended for no...

ATM Theory - Unspecified Bit Rate Is intended for non-real time applications, that is, those not requiring tightly constrained delay and delay variation. Examples of applications

Discuss the attributes of speech codec, Question 1 What is mobile telephon...

Question 1 What is mobile telephone initialization? Explain the three main goals of this procedure Define GSM system operations Introduction to mobile telephone initializ

How Round robin scheduling algorithm is useful than others ?, Round robin (...

Round robin (RR) is one of the simplest, oldest, fairest and most extensively used algorithms. • In the round robin scheduling, processes are posted in a FIFO manner but are given

Definition of User-Level Thread?, User-level threads apply in user-level li...

User-level threads apply in user-level libraries, before via systems calls, so thread switching does not require to call operating system and to cause interrupt to the kernel. Actu

Database, Q1: ER modelling & logical design. An information system is requi...

Q1: ER modelling & logical design. An information system is required for an online auction site, based on the following speci?cation: Only registered users can use the site. Privat

Classification of database management systems, Question 1: (a) Describ...

Question 1: (a) Describe the three ways of classification of Database management systems (DBMS). (b) Why are System Analysts and Database Administrators needed in compa

Execution of a machine instruction, Execution of a machine instruction: ...

Execution of a machine instruction: Execution of a machine instruction on modern processors involves a complex sequence of operations with multiple cycles. One instruction cyc

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd