Machines which exhibit intelligent nature, Basic Computer Science

Assignment Help:

Machines which exhibit intelligent nature

Machines in this case could easily be personal computers, or they could be robots with embedded systems, or a combination of both. Why would we want to make intelligent systems? One answer occurs  for the reasons why we utilize computers in general terms: to complete tasks which, if we performed them by hand would be error prone. For instance how many persons of us will  not reach for  calculator if it requires to multiply two six digit numbers together? If we scale this up to more intelligent operations, then it should be able to utilize computers to do some fairly complicated tasks reliably. This  reliability may be very helpful if the operation  is beyond  some cognitive limitation of the mind, or when human intuition is counter-constructive, such as in the Monty Hall problem explained below, which many people - some of whom say themselves mathematicians - do not get right.

 

Another cause we might want to built intelligent machines is to enable us to performe tasks we could not do before. Basically a large part of science depends on the utilization of computers  already,  and  more  intelligent  applications  are developing  being employed. The capability for intelligent software to develope our capabilities do not have limt to science, of course, and canditates are performing on AI programs which can take a creative input to human activities such as painting composing, and writing.At last, in developing intelligent application, we can get some information for intelligence in humanity and other things. This deserves a type of its own. Another cause to learn Artificial Intelligence is to assist us to:

 


Related Discussions:- Machines which exhibit intelligent nature

Data communication , (iv) Suppose that the TCP entity receives a 1.5 megaby...

(iv) Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the

Algorithm implementation, Implementing the -Crochemore-Perrin algorithm Th...

Implementing the -Crochemore-Perrin algorithm The software must be functional, code must be clear and including comments and it must have a nice and decent user interface

Write a long note letters to the editor, Question 1 What is meant by typog...

Question 1 What is meant by typography? Describe the process in which one can choose and use type Question 2 What is investigative reporting? Write a long note Question 3

Assigment, how to measure marginal utility.?

how to measure marginal utility.?

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Networking, what is computer topology .

what is computer topology .

Spidering or web crawling, Spidering or Web crawling: Spider or Web c...

Spidering or Web crawling: Spider or Web crawler is a computer program that browses the web pages of WWW in a systematic, automated manner. Search Engines use spider for gett

Hill climbing - artificial intelligence , Hill Climbing - artificial intell...

Hill Climbing - artificial intelligence: As we've seen, in some particular problems, searching the search path from primly to goal state is the point of the exercise. In anothe

Perform a mail merge to send invitation, Question Elaborate the various...

Question Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conducted in your organ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd