Knowledge representation in artificial intelligence , Computer Engineering

Assignment Help:

Knowledge Representation:

To recap, now we have some characterizations of Artificial Intelligence, so  when an Artificial Intelligence problem arises, you will enable  to put it into context, search the right techniques and apply them. We have introduced the agent's language so that we may talk about intelligent job and how to carry them out. We have also looked at search in the common case, which is central to AI problem solving. Most pieces of software have to deal with data of some type, and in AI we use the additional grandiose title of "knowledge" to stand  for  data  including 

(i)   procedures, like how to treat a patient with a high temperature

(ii) facts,  like  the  temperature of a patient and

(iii) meaning, likewise why a patient with a high temperature should not be given a hot bath. Accessing and using all these kinds of information will be very important for an intelligent agent to act rationally. For this reason, knowledge representation is our final common consideration before we look at specific problem types.

To a big extent, the way in which you arrange information available to and generated by your intelligent agent will be dictated by the type of problem you are addressing. Regularly,   the best   ways of representing knowledge   for particular techniques are known. But, as with the problem of how to search, you will have to great flexibility in the way you represent information. so, it is worth looking at 4 common  schemes for representing  knowledge, namely frames ,semantic networks, production rules and logic. Knowledge representation continues to be a much-researched topic in AI because of the realization early on that how information is arranged may often make or break an AI application.


Related Discussions:- Knowledge representation in artificial intelligence

Performance evaluation-parallel computing, Performance Evaluation In th...

Performance Evaluation In this part, we talk about the primary attributes used to measure the performance of a computer system. Unit 2 of block 3 is totally devoted to performa

Write short notes on proton – proton fusion in sun, Q. Write short notes on...

Q. Write short notes on proton - proton fusion in sun. Proton - Proton cycle 1 H 1 + 1 H 1 → 1 H 2 + 1 e 0 + ν (emission of positron as well as neutrino) 1

Client server using c, client server or multithreaded client-server, where ...

client server or multithreaded client-server, where server will create pool of worker threads (say 5) to provide services to pool of clients (say 5 ).Server should be behaving as a

In which page replacement policies balady’s anomaly occurs, In which page r...

In which page replacement policies Balady’s anomaly occurs? FIFO that is First in First Out.

Explain about the links and association, Links and Association Links a...

Links and Association Links and associations are the basic means used for establishing relationships among objects and classes of the system. In the next subsection we will di

What is information technology, Information Technology is nothing but the s...

Information Technology is nothing but the study, design, development, execution, support and management of computer based information systems mainly the applications software & har

Digital forensics, a) What do you meant by digital forensics? b) What ...

a) What do you meant by digital forensics? b) What is the job of Computer Forensic Analyst c) From the point of view of : i. An employer ii. An employee Give thre

What is mmu, What is MMU? MMU is the Memory Management Unit. It is a sp...

What is MMU? MMU is the Memory Management Unit. It is a special memory control circuit used for executing the mapping of the virtual address space onto the physical memory.

What is a demultiplexer, What is a Demultiplexer ? Ans. Demultiplex...

What is a Demultiplexer ? Ans. Demultiplexer has similar circuit as decoder but here E is obtained as the particular input line, the output lines are similar as decode

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd