What search method would be most appropriate and why, Computer Engineering

Assignment Help:

(a) Describe fully in your own words the following terms:

(i) Turing Test
(ii) Agent
(iii) Utility-based agent

(b) A Mars rover has to leave the lander, collect rock samples from three places and return to the lander.

Consider that it has a navigation module that can take it directly from any place of interest to any other place of interest. So it has primitive actions: go-to-lander, go-to-rock-1, go-to-rock-2 and go-to-rock-3.

We know the time it takes to traverse between each pair of special locations. Our goal is to search a sequence of actions that will perform this task in the shortest amount of time.

(i) Formulate this problem as a search problem by specifying the state space, initial state, path-cost function and goal test. Try to be sure that the state space is detailed enough to support solving the problem but not redundant.

(ii) Say what search method would be most appropriate and why.

(iii) One possible heuristic evaluation function for a state would be the amount of time required for the robot to go back to the lander from the location of the state. Is this function admissible?


Related Discussions:- What search method would be most appropriate and why

String, super string checker

super string checker

Describe the structure of a neuron - artificial intelligence, 1. Figure 1 b...

1. Figure 1 below shows the truth table for five different functions. Each truth table shows the inputs x1, x2 and the desired output d. (a) Write down which of these functions

Compiler software difficulty, IA-64 instead depends on the compiler for thi...

IA-64 instead depends on the compiler for this task. Even before the program is fed into the CPU, the compiler studies the code and makes the similar sorts of decisions that would

Determine the uses of smart cards, Determine the uses of Smart cards  ...

Determine the uses of Smart cards  These comprise embedded microchips and receive power from the card readers; Microchip is made up of RAM, ROM and 16-bit processor and the st

Flynns categorization, Normal 0 false false false EN-US...

Normal 0 false false false EN-US X-NONE X-NONE

Define functionality of application layer in tcp/ip protocol, Define the fu...

Define the functionality of application layer in TCP/IP protocol stack? Function of Application Layer: The top layer within the Internet reference model is the applicatio

Determine the handles data rate of broad band isdn, Broad Band ISDN handles...

Broad Band ISDN handles data rate of about (A) 64 kbps                                      (B) 100 mbps (C) 5.4 mbps                                    (D) 2.048 mbps

Classification of pipeline processors, Classification of Pipeline Processor...

Classification of Pipeline Processors In this part, we explain various types of pipelining that can be useful in computer operations. These types depend on the following factor

Give explanation about the use of SSL to secure the network, Give explanati...

Give explanation about the use of SSL to secure the network. SS L stands for Secure Sockets Layer is a protocol developed through Netscape for transmitting private document

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd