Depth first search - artificial intelligence, Computer Engineering

Assignment Help:

Depth First Search - artificial intelligence:

Depth first search is very similar to breadth first, except for that the things are added to the top of this agenda rather than of the bottom. In our example we can notice, the first three things on the agenda would still be: 

Conversely, once the 'D' state has been found, the actions for this:  

1.(empty,add'D')

2.(empty,add'N')

3. (empty,add 'A')

They would be added to the top of the agenda for a certain reason, so it would look like this: 

4. ('D',add 'D')

5. ('D',add 'N')

6. ('D',add 'A')

 Obviously, carrying out this action at the top of the agenda and would introduce the string 'DD', but this would cause the action for: 

('DD',add 'D')

 Add to the top, and the next string found would be 'DDD'. Undoubtedly this can't go on indefinitely, and in the practice, we must have to specify a depth limit to stop for going down a particular path forever. Because is, our agent will need to record how far down a particular path it has been gone, and have to avoid putting actions on the agenda if there is the state in the agenda item that is past a certain depth.


Related Discussions:- Depth first search - artificial intelligence

What are the requirements of the user, This step of systems examination is ...

This step of systems examination is one of the most difficult. In this stage systems specifications are identified by asking what, who, when, where and how. A few questions address

Order in which filters get implemented, If we have multiple filters implet...

If we have multiple filters impleted, what is the order in which these filters get implemented?   Ans) 1. Authorization filters 2. Response filters 3. Action filters

How do you save data in bdc tables, How do you save data in BDC tables? ...

How do you save data in BDC tables? The data in BDC tables is saved by using the field name 'BDC_OKCODE' and field value of '/11'.

Software Engineering, Software Engineering is a layered technology. Explain...

Software Engineering is a layered technology. Explain

Explain disk cartridges, Q. Explain Disk Cartridges ? Disk Cartridges:...

Q. Explain Disk Cartridges ? Disk Cartridges: Removable disk cartridges are an option to hard disk units as a form of secondary storage. Cartridge generally comprises one or

Memory that can be used in a 16-bit computer, What is the maximum size of t...

What is the maximum size of the memory that can be used in a 16-bit computer and 32 bit computer? The maximum size of the memory that can be used in a 16-bit computer is 2 memo

#title.linear programming, zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>...

zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>=3 x1-x2+x3>=2 x1,x2,x3>=0

Explain deadlock, What is a deadlock? A deadlock is a situation that ca...

What is a deadlock? A deadlock is a situation that can increase when two units, A and B use a shared resource. Assume that unit B cannot complete its task unless unit A complet

What is a privileged instruction, What is a privileged instruction? To ...

What is a privileged instruction? To protect the operating system of a computer from being corrupted by user programs, particular instructions can be executed only whereas the

Give the solutions for critical section problem, Give the solutions for cri...

Give the solutions for critical section problem? A solution to the critical section problem must specify the subsequent requirements. (a) Mutual exclusion (b) Progress (c)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd