Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Depth First Search - artificial intelligence:
Depth first search is very similar to breadth first, except for that the things are added to the top of this agenda rather than of the bottom. In our example we can notice, the first three things on the agenda would still be:
Conversely, once the 'D' state has been found, the actions for this:
1.(empty,add'D')
2.(empty,add'N')
3. (empty,add 'A')
They would be added to the top of the agenda for a certain reason, so it would look like this:
4. ('D',add 'D')
5. ('D',add 'N')
6. ('D',add 'A')
Obviously, carrying out this action at the top of the agenda and would introduce the string 'DD', but this would cause the action for:
('DD',add 'D')
Add to the top, and the next string found would be 'DDD'. Undoubtedly this can't go on indefinitely, and in the practice, we must have to specify a depth limit to stop for going down a particular path forever. Because is, our agent will need to record how far down a particular path it has been gone, and have to avoid putting actions on the agenda if there is the state in the agenda item that is past a certain depth.
This step of systems examination is one of the most difficult. In this stage systems specifications are identified by asking what, who, when, where and how. A few questions address
If we have multiple filters impleted, what is the order in which these filters get implemented? Ans) 1. Authorization filters 2. Response filters 3. Action filters
How do you save data in BDC tables? The data in BDC tables is saved by using the field name 'BDC_OKCODE' and field value of '/11'.
Software Engineering is a layered technology. Explain
Q. Explain Disk Cartridges ? Disk Cartridges: Removable disk cartridges are an option to hard disk units as a form of secondary storage. Cartridge generally comprises one or
What is the maximum size of the memory that can be used in a 16-bit computer and 32 bit computer? The maximum size of the memory that can be used in a 16-bit computer is 2 memo
zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>=3 x1-x2+x3>=2 x1,x2,x3>=0
What is a deadlock? A deadlock is a situation that can increase when two units, A and B use a shared resource. Assume that unit B cannot complete its task unless unit A complet
What is a privileged instruction? To protect the operating system of a computer from being corrupted by user programs, particular instructions can be executed only whereas the
Give the solutions for critical section problem? A solution to the critical section problem must specify the subsequent requirements. (a) Mutual exclusion (b) Progress (c)
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd