Common problem with hill climbing, Computer Engineering

Assignment Help:

Common problem with Hill climbing:

An alternative way of justifying the problem is that the states are boards with 8 queens already on them, so an action is a movement of one of the queens. In this type of case, our agent can use an evaluation function and do hill climbing. Which, it counts the number of pairs of queens where one can take the other, and only moves a queen if the movement reduces the number of pairs of that. When there is a choice of movements both resulting in the same decrease, the agent can be chosen one randomly from the choices. In this sequence the 8-queens problem, and there are only 56 * 8 = 448 possible ways to move one queen, so that's why our agent only has to calculate the evaluation function 448 times at each stage. If it single chooses moves to where the situation with respect to the evaluation function improves, so it is doing hill climbing or gradient descent if it's better to think of the agent going downhill rather than uphill.

A common problem with this search strategy is a local maxima: the search has not been yet reached at a solution, but it one of the way to go downhill in terms of the evaluation function. For example, we could get to the stage where only two queens can take each other, to moving any queen increases this number to at least three. In cases like this, the agent can do a random re-start whereby they randomly choose a state to start the whole process from again. This search strategy has the appeal of never requiring be store more than one state at any one time that is the part of the hill the agent is on. Russell and Norvig make the analogy that this kind of search is like trying to climb Mount Everest in the fog with amnesia, but they do concede that it is often the search strategy of choice for some industrial problems.


Related Discussions:- Common problem with hill climbing

What is a recursively enumerable language, What is a recursively enumerable...

What is a recursively enumerable language?            The languages that is accepted by TM is said to be recursively enumerable (r. e) languages.  Enumerable means that the stri

Task of the computer systems consultant, You are required to carry out the ...

You are required to carry out the task of the Computer Systems Consultant mentioned above. Your quotation/recommendations, which must be justified, should include information wi

Forward chaining, Forward Chaining: Now we have suppose we have a set ...

Forward Chaining: Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal

Explain briefly the generic framework for e-commerce, Explain briefly the g...

Explain briefly the generic framework for e-commerce.  Generic framework of e-commerce contains the Applications of EC   (like as banking, shopping in online stores and malls,

Command line argument value, Make a console application to show different m...

Make a console application to show different messages depending on the command line argument value. Use Select-case statements.(same to switch block)

What are the disadvantages of a smart card, What are the disadvantages of a...

What are the disadvantages of a Smart Card? Disadvantages of Smart Cards are as follows: a. The value of money can be depleted and recharged. b. Customers should keep

What is delayed branching, What is delayed branching? A method called d...

What is delayed branching? A method called delayed branching can minimize the penalty incurred as a result of conditional branch instructions. The idea is easy. The instruction

Illustrate the basic structure of the von neumann machine, Illustrate the b...

Illustrate the basic structure of the von Neumann machine The following figure shows basic structure of the von Neumann machine. A von Neumann machine has only a single path be

Truth tables, Any function can be expressed in a truth table.A truth table ...

Any function can be expressed in a truth table.A truth table lists all possible combinations ofinputs and gives the output produced in eachcase.Truth tables must include all combin

Explain the significance of encryption, Problem: (i) What are the main...

Problem: (i) What are the main threats that an organisation holding sensitive data, such as Public Data, on computer storage must guard against? (ii) To protect such data,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd