Search methods and heuristics - artificial intelligence, Computer Engineering

Assignment Help:

Search Methods and Heuristics - Artificial intelligence:

Here now we come to the question of how constraint solvers search for solutions -constraint preserving coursework of values to variables - for the CSPs they are given. In fact the most obvious approach is to utilize a depth first search as: assign a value there to the first variable and in which check whether this assignment doesn't break any constraints. After then, move at to the next variable and then assign it a value and check that this doesn't break any constraints so then move at to the next variable and so on. Where an assignment does break a constraint after then choose a different value for the assignment until one is found that satisfies the constraints. Whether one cannot be found then this is where the search must backtrack. However in such a situation there the previous variable is looked at again and so the next value for it is tried. Furthermore in this way, all possible sets of assignments that, will be tried for a solution be found. So therefore the following search diagram - taken from Smith's tutorial paper - shows that how the search for a solution to the 4-queens problem progresses until it finds a solution as: 

211_Search Methods and Heuristics.png

Conversely we see that the first time it backtracks is after the failure to put a queen in row three given queens in positions as (1,1) and (2,3). Moreover in this case there it backtracked and move the queen in as (2,3) to (2,4). Ultimately, this didn't work out either then it had to backtrack further and then moved the queen in as (1,1) to (1,2). Alternatively this led fairly quickly to a solution.


Related Discussions:- Search methods and heuristics - artificial intelligence

How to set cell properties in dreamweaver, Q. How to Set Cell Properties in...

Q. How to Set Cell Properties in dreamweaver? Cell height determines the height of space within a cell row. Notice the space around Compass logo. You want to remove the extra s

Does average velocity differ from its instantaneous velocity, Q. When an ob...

Q. When an object travels with constant velocity does its average velocity during any time interval differ from its instantaneous velocity at any instant? Answer:- No It i

What all 1's represents in 32bit ip addressing scheme, In 32bit IP Addressi...

In 32bit IP Addressing scheme all 1's represent? All 1's represent limited broadcast in 32 bit IP Addressing scheme.

Define the don''t care states - simplifying k maps, Define the Don't Care S...

Define the Don't Care States - Simplifying K Maps? The Truth table specifications for a logic function may not to include all possible combinations of the input binary digits for

Design a simple digital clock., Use a timer interrupt to design a easy digi...

Use a timer interrupt to design a easy digital clock.  This clock will count only minutes and seconds, and start at 00:00 every time your program starts.  The show on the screen sh

Explain handle graphics in matlab, This is the MATLAB graphics system. It c...

This is the MATLAB graphics system. It contains high-level commands for two-dimensional and three-dimensional data visualization, image processing, animation, and presentation grap

What is model view controller (mvc), Model-View-Controller (MVC) is a desig...

Model-View-Controller (MVC) is a design pattern in which "the user input, the modelling of the external world and the visual feedback to the user are explicitly splitted and handle

Functions of an operating system, Question a) In multitasking Operatin...

Question a) In multitasking Operating Systems, there are two kinds of multitasking such as the "Preemptive Multitasking" and the "Cooperative Multitasking". Explain the two me

Define restoring method, Define restoring method? The hardware method j...

Define restoring method? The hardware method just explained is called the restoring method. The reason for this name is that the partial reminder is restored by adding the divi

Which technique is an encryption technique, Which technique is an encryptio...

Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd