Backward chaining, Computer Engineering

Assignment Help:

Backward Chaining:

In generally given that we are only interested in constructing the path whether we can set our initial state to be the theorem statement and search backwards until we find an axiom or set of axioms. There if we restrict ourselves to just utilising equivalences as rewrite rules for this approach is OK, is just because we can use equivalences both ways, and any path from the theorem to axioms that is found will provide a proof. In fact, if we use inference rules to traverse from theorem to axioms like we will have proved that and if the theorem is true then the axioms are true. Whether we already know that the axioms are true! Just to get around this we must invert our inference rules and try to work backwards. Means that, the operators in the search basically answer the question: as what could be true in order to infer the state like logical sentence we are at right now? In the Arch space if we set our agent starts searching from the theorem statement and reaches the axioms, than it has proved the theorem. In fact this is also problematic means there are numerous answers to the inversion question so and the search space gets very large.


Related Discussions:- Backward chaining

Implement the concept of true and radix minus one complement, Q. Develop a...

Q. Develop a program to implement the concept of true and radix minus one complement. Program should ask for radix and two numbers from that radix. For that two numbers program

Convert the octal number 7401 to binary, Convert the octal number 7401 to B...

Convert the octal number 7401 to Binary. Ans. Octal number 7401 to Binary conversion: Every octal digit represents 3 binary digits. To change an octal number to binary number,

What is high level formatting, Q. What is High level formatting? In any...

Q. What is High level formatting? In any disk system the space at some time in use would become discarded and therefore will be free for other application. Operating system ass

Example of asymptotic notations, Q. Example of asymptotic notations? Th...

Q. Example of asymptotic notations? The function f (n) belongs to the set  (g(n)) if there exists positive constants c such that for satisfactorily large values of n we have 0

First-order logic - artificial intelligence, First-Order Logic : There'...

First-Order Logic : There's Reasoning, and then There's Reasoning As humans, we have always prided ourselves on our capability to think things by: to reason things out and c

Write a bash shell script, Write a BASH/C shell script which takes name of ...

Write a BASH/C shell script which takes name of one or more files as a command line argument, and prints the following information for each file: owner, number of words in the file

What is a unix device driver, A UNIX device driver is ? Ans. A UNIX devi...

A UNIX device driver is ? Ans. A UNIX device driver is structured in two halves termed as top half and bottom half.

Optimality - heuristic search strategies, Optimality - Heuristic search str...

Optimality - Heuristic search strategies: The path cost of a solution is considered as the sum of the costs of the actions that led to which solution is given. This is only on

Produce an analysis model of the proposed system, Question: Read the fo...

Question: Read the following case study and answer the questions based on it. The local airline company needs to develop a system for controlling air traffic at the airport

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd