Initial considerations in problem solving, Computer Engineering

Assignment Help:

Initial considerations in problem solving:

Three initial considerations in problem solving for easiest(as described in Russell and Norvig): 

  • Initial State

 Firstly, the agent have wishes to be told exactly what the initial state is before it starts its search and its level comparing, so then it can keep track of the state as it searches.

  • Operators

An operator is a function of controlling when taking one state to another via an action undertaken by the agent. For example, as in chess, an operator operates one arrangement of pieces on the desk-board to another arrangement same like the action of the agent moving a piece.

  • Goal Test

It is very essential when designing or developing any task solving agent to know when the query has been solved, i.e., to have a able defined goal test. Suppose that any assignment we had set our agent was to find a name and address for a newborn baby, with some assets. In this case, there are lists of "documentary" names for babies with mother, and any solution must appear in that directory which is use for searching purpose so goal-checking amounts to simply testing whether the name appears in the list. In chess, there is term of goal is get to a checkmate. While there are only a finite number of ways in which have the pieces on a desk-board can represent a checkmate, the number of these is vast so checking a point against them is a bad idea. Instead, much more abstract for the notion of checkmate is used for winning such match, whereby our agent trying to checking that the opponent's king cannot move without or being captured.


Related Discussions:- Initial considerations in problem solving

Parallelism conditions, Parallelism Conditions As discussed earlier, pa...

Parallelism Conditions As discussed earlier, parallel computing needs that the segments to be implemented in parallel must be free of each other. Thus, before implementing para

Describe about analysis, Analysis describes about the logical and statistic...

Analysis describes about the logical and statistical analysis needed for an efficient output. This involves writing of code and performing calculations, but most part of these lang

Implementation of 4-to-1 multiplexer, Implement the Y(A, B, C) = ∑(2,3,5,6)...

Implement the Y(A, B, C) = ∑(2,3,5,6) function using 4-to-1 multiplexer.   Ans. Y(A,B,C)=∑(2,3,5,6) Here we take B,C as the select bits also A as input. To select the input we can

What is assembler, What is Assembler A macro-assembler or assembler nor...

What is Assembler A macro-assembler or assembler normally forms a part of operating system. That translates an assembly language program into machine language program.

What are the process states, What are the Process states? By the course...

What are the Process states? By the courses of implementation, processes change state. Status of a process is express by its present activity. Dissimilar practical states of

Exit command, Your shell must accept the exit command. This command will ...

Your shell must accept the exit command. This command will be in the form: e x i t When you encounter this command, your shell should terminate. Please note that when you

Illustrate role of world wide web in field of e-commerce, Illustrate the ro...

Illustrate the role of World Wide Web into the field of e-commerce. In the 1990 year, the advent of the World Wide Web upon the Internet represented a turning point into e-com

Write the game using writing functions, The year is 2199. For many generati...

The year is 2199. For many generations, the robotic Cyleth have faithfully served humanity. However, under the direction of the computerized superintelligence Skyweb, they have tur

Difference between leave transaction and call transaction, What is the diff...

What is the difference between Leave Transaction and Call Transaction? In contrast to LEAVE TO TRANSACTION, the CALL TRANSACTION  statement causes the system to start a new SAP

Types of security features employed in client server network, What are the ...

What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd