Uninformed search strategies, Basic Computer Science

Assignment Help:

Uninformed Search Strategies:

To be able to undertake a regular search, our entire agent ought to know is the starting state, the possible operators and how to check whether the goal has been reached. Once these have been described, we might then select a search method for the agent: a pre-defined way in which the operators will be applied.

The example we will use is the case of a genetics professor finding  for a name for her newborn  boy - of course, it might  only contain the letters D, A and N. The states in this search are strings of letters (but only Ds, As and Ns), and the starting  state is an empty string. Also, the operators available are: (i) add an 'N' to an existing string (ii) add a 'D' to an existing string and (iii) add an 'A' to an existing string. The goal check is feasible using a book of boy's names against which the professor may check a string of letters.

To help us think about the different kind of search method  , we use 2 analogies. Initially, we imagine that the professor keeps an agenda of actions to undertake, like wise : add an  'A'  to  the string  'AN'.  So, the agenda contain of pairs (O,S)  of states and operators, whereby the operator is to be applied to the state. At the top of the plan, the action is the one which is carried out, then that action is removed. How these actions are added to the plan differs for each search method. Next, we think of a search graphically: by making each state a node in a graph and every operator an edge, we might think of the search progressing as movement from node to node along edges in the graph. We then allow ourselves to talk about nodes in a search space (rather than the graph) and we say that a node in a search space has been expanded if the state that node represents has been visited and searched from. Notice that graphs which have no cycles in them are called trees and many Artificial Intelligence searches can be represented as trees.


Related Discussions:- Uninformed search strategies

Transmission control protocol, The TCP/IP networking protocol suite is so b...

The TCP/IP networking protocol suite is so basically named for two of its very most and important protocols: Transmission Control Protocol online tutoring Indication Manage

Computer processing, Computer Processing: Most of the earliest compute...

Computer Processing: Most of the earliest computer memories have been based on physical elements which can exist in just one of the two states (on or off): such an element cor

What is the basic model of cpu structure?, As there are many variations i...

As there are many variations in architecture between the different kinds of CPU, we shall begin my looking at an easy model of the structure. The basic model consists of five part

Write a note on file permissions on linux, Question 1 Write a note on a...

Question 1 Write a note on advantages and disadvantages of Linux 2 Write a note on "File Permissions" on linux 3 Explain the usage of following Linux commands Cd kill

General considerations for search - artificial intelligence, General Consid...

General Considerations for Search If we may specify the starting state, the operators and the goal check for a search problem, then we know from where to start, how to move and

HOMEWORK 9.., AsBased on Chapter Review Problems from the book. 1 #1. Wh...

AsBased on Chapter Review Problems from the book. 1 #1. What is meant by data independence? Explain your answer. #2. Identify two benefits of separating application software fr

Medical counter/shop, Medical Counter/Shop The Software for medical co...

Medical Counter/Shop The Software for medical counter/shop should maintain: Complete customer Details  Inventory Control  Billing  Linked to Accounts  Have c

Omputer applications 2, true or false-- most designs of a desktop publishin...

true or false-- most designs of a desktop publishing document needs to follow clear, specific rules pertaining to design

Networking, what is computer topology .

what is computer topology .

Buses, BUSES It can be seen from Figure 4 that there are three buses ...

BUSES It can be seen from Figure 4 that there are three buses - the data bus, the address bus, and the control bus. Each bus consists of a group of parallel wires. The da

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd