Game playing - artificial intelligence, Computer Engineering

Assignment Help:

Game Playing:

We have now dispensed with the necessary background material for AI problem solving techniques, and we just considered to looking at particular types of problems which have been addressed using "AI" techniques. The first kind of problem we'll look at is getting an agent to compete, it may be against a human or another artificial agent. This area has been exceptionally well researched over the last 50 years. Definitely some of the first chess programs were written by Alan Turing, Claude Shannon and other fore-fathers of modern computing. We just have mostly one lecture to look at this topic, so we'll hamper ourselves to looking at two person games such as chess played by software agents. If you are concerned in games involving more teamwork and , or robotics, then a good place to begin would be with the Robo Cup project,5.1 MinMax Search Parents often get two children to share a cake fairly by asking one to cut the cake and the other to choose which half they want to eat. In fact in this two player cake-scoffing game, there is only one move like cutting the cake, other is player one soon learns that if he wants to maximize the amount of cake he gets, he had superior cut the cake into the same halves, this means that his opponent is going to try and minimize the cake that player 1 gets by choosing the biggest half for herself.

Suppose we have a two player game where the winner scores a positive number at the end, so that the loser scores is nothing. In board games like chess, the score is mostly just 1 for a win and 0 for a loss. In other games such as poker, however, one player wins the cash in prize amount that the other player loses. These are called zero-sum games, this means that whenever you add one player's winnings to the other player's loss, the sum is zero.


Related Discussions:- Game playing - artificial intelligence

Describe the role of software developers, Describe the role of Software dev...

Describe the role of Software developers Software developers have wide experience of tackling such issues. Students who develop software project spending days and nights strug

The variables that are declared outside all functions, The variable that ar...

The variable that are declared outside all the functions are called The variables that are declared outside every functions are known as global variable.

Instruction cycle-flynn’s classification, Instruction Cycle The instruc...

Instruction Cycle The instruction cycle consists of a series of steps needed for the implementation of an instruction in a program. A typical instruction in a program is descri

How can a function return a pointer to its calling routine, How can a funct...

How can a function return a pointer to its calling routine? The general form of a function is: type_specifier function_name(parameter list) { body of function; }

What is redundant array of independent disks, What is Redundant Array of In...

What is Redundant Array of Independent Disks? Researchers are constantly trying to improve secondary storage media by raising their, performance, capacity as well as reliabilit

Explain in brief about compact disks, Explain in brief about Compact disks ...

Explain in brief about Compact disks (CD) These are an optical storage media that have basically taken over from floppy disk. Software is now generally supplied on a CD (in for

Raid and data stripping, Explained RAID? Ans: High performance devices ...

Explained RAID? Ans: High performance devices tend to be costly. So we can gain very high performance at a reasonable cost using a number of low-cost devices operating in paral

State the datatypes of verilog, State the datatypes of Verilog Verilog....

State the datatypes of Verilog Verilog. Compared to VHDL, Verilog data types are very simple, easy to use and very much geared towards modeling hardware structure as opposed to

What are the aspects of security policy, What are the aspects of security p...

What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd