Generic techniques developed - artificial intelligence, Computer Engineering

Assignment Help:

Generic Techniques Developed:

In the pursuit of solutions to various problems in the above categories, various individual fundamental techniques have sprung up which have been shown to be helpful for solving a range of problems (usually within the general problem category). These techniques are established enough now to have a name or any kind of symbol and provide at least a partial characterisation of "AI". The following list is not contains to be complete in whole programming, but rather to introduce some techniques you will able to learn later in the course. Assign that some of these overlap with the general techniques above. 

1.       Forward/backward chaining (reasoning)

2.       Defining based (learning) 

3.       Resolution theorem and concept proving (reasoning)

4.       Proof planning (reasoning) 

5.       Constraint satisfaction and self motivation(reasoning)

6.        Davis-Putnam method (reasoning) 

7.       Mini-max search (games)

8.       Alpha-Beta pruning (games) 

9.       Case-based reasoning (expert systems)

10.    Knowledge elicitation (expert systems) 

11.   Neural networks (learning)

12.    Bayesian methods (learning) 

13.   Inductive logic programming (learning)

14.    Reinforcement (learning) 

15.   Genetic algorithms (learning)

16.   Genetic fundamental programming (learning) 

17.   Strips (planning)

18.   N-grams (NLP)

19.   Parsing (NLP)

20.   Behavior based (robotics) 

21.   Cell decomposition (robotics)


Related Discussions:- Generic techniques developed - artificial intelligence

Essential features of an algorithm, Necessary features of an algorithm: ...

Necessary features of an algorithm: 1.Input: The algorithm should take zero or more input. 2. Output: The algorithm should generate one or more outputs.  3. Definiteness:

Explain rmtrack, Highlights of the RMTrack application: ? Web based ac...

Highlights of the RMTrack application: ? Web based access permits your users to access the database from anywhere. ? Available as a hosted solution or a download for local in

What is gimp?, The GNU Image Manipulation Program, or GIMP, is a raster gra...

The GNU Image Manipulation Program, or GIMP, is a raster graphics editor application with some support for vector graphics. GIMP is used to process digital graphics & photographs.

What is persistence, What is Persistence When you make an object, it e...

What is Persistence When you make an object, it exists for so long as you need it, but under no circumstances object exist when program terminates. While this makes sense at s

Illustrate about compact disk rewritable, Q. Illustrate about Compact Disk ...

Q. Illustrate about Compact Disk Rewritable? CD-RW optical disk can be repeatedly written and overwritten same as with a magnetic disk. Even though a number of techniques have

How call processing takes place, How call processing takes place? Fund...

How call processing takes place? Fundamental Call Procedure: Fig. demonstrates a simplification diagram exemplifying how two telephone sets (as subscribers) are interconnecte

Automated injection, There are tools to automate the process of SQL Injecti...

There are tools to automate the process of SQL Injection into login and other fields. One hacker process, using a one tool, will be to search out a number of weak targets using Goo

COA, During instruction execution, there are other parts of the CPU that ca...

During instruction execution, there are other parts of the CPU that can determine when a physical register might be freed. Briefly describe where else we can put freeing logic and

Magnetic storage - computer architecture, Magnetic storage - computer archi...

Magnetic storage - computer architecture: Magnetic storage uses different type of patterns of magnetization on a magnetically coated surface to store information. Magnetic sto

Direct isp service through leased line, The most expensive method of access...

The most expensive method of accessing Internet is to use leased lines which connect directly to the ISP. This will increase access rate to anywhere between 64 K and 1.5 Mbps, rely

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd