Internal structure of agents - artificial intelligence, Basic Computer Science

Assignment Help:

Internal Structure of Agents

We have looked at agents in terms of their external influences and behaviors: they take input from the environment and perform rational actions to alter that environment. We will now look at some generic internal mechanisms which are common to intelligent agents.

  • Architecture and Program

The  program of an  agent  is  the  mechanism  by  which  it  turns  input  from the environment into an action on the environment. The architecture of an agent is the computing device (including software and hardware) upon which the program operates. On this course, we mostly concern ourselves with the intelligence behind the programs, and do not worry about the hardware architectures they run on. In fact, we will mostly assume that the architecture of our agents is a computer getting input through the keyboard and acting via the monitor.

RHINO consisted of the robot itself, including the necessary hardware for locomotion (motors, etc.) and state of the art sensors, including laser, sonar, infrared and tactile sensors. RHINO also carried around three on-board PC workstations and was connected by a wireless Ethernet connection to a further three off-board SUN workstations. In total, it ran up to 25 different processes at any one time, in parallel. The  program  employed   by  RHINO  was   even  more  complicated  than  the architecture upon which it ran. RHINO ran software which drew upon techniques ranging from low level probabilistic reasoning and visual information processing to high level problem solving and planning using logical representations.

An agent's program will make use of knowledge about its environment and methods for deciding which action to take (if any) in response to a new input from the environment. These methods include reflexes, goal based methods and utility based methods.

 


Related Discussions:- Internal structure of agents - artificial intelligence

Ipv4 and ipv6, IPv6 documented in 1994 (RFC 1752) is still a collection...

IPv6 documented in 1994 (RFC 1752) is still a collection of Draft and Proposed standards Several pre-standard implementations exist IPv6 was intended to be a pragmatic up

Hill climbing - artificial intelligence , Hill Climbing - artificial intell...

Hill Climbing - artificial intelligence: As we've seen, in some particular problems, searching the search path from primly to goal state is the point of the exercise. In anothe

Development of UNIX , Development of UNIX: The original UNIX developme...

Development of UNIX: The original UNIX development was performed on a Digital PDP-7 minicomputer and later moved to a PDP-11 minicomputer, the forerunner of the VAX computer.

Software engineering, assignment 1:architectural design 2: component des...

assignment 1:architectural design 2: component design

Python Identifiers, A Python identifier is a name used for classify a funct...

A Python identifier is a name used for classify a function, variable, class, module or any other object. An identifier begins with a letter A to Z or a to z or an underscore (_) fo

Software licensing, Software Licensing: Until early 1970's, sharing of...

Software Licensing: Until early 1970's, sharing of software was the accepted norm. Hardware came bundled with software products which could be freely redistributed and the acc

Draw a neat diagram of the organization of computer, Question 1 Draw a nea...

Question 1 Draw a neat diagram of the organization of computer and explain about each unit Question 2 Explain batch processing system and multi-processing in brief Questi

Differentiate Preemptive and Nonpreemptive Scheduling?, The Scheduling algo...

The Scheduling algorithms can be divided into two parts with respect to how they deal with clock interrupts. 1) Nonpreemptive Scheduling: A scheduling

Definition of assembler structure, In assembly language code lines have t...

In assembly language code lines have two fractions, the earliest one is the name of the instruction which is to be executed, and the next one are the parameters of the command. For

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd