Identify nodes that are cut-off

Assignment Help Data Structure & Algorithms
Reference no: EM13809961

1. Describes four ways of defining the AI field. For each of the following sentences, state which definition of AI it seems to follow and explain your answer.

"I replaced Bob our accountant with a program. I think the program is artificially intelligent because ..."

a. "... when the program makes mistakes, it makes the same mistakes that Bob would."

b. "...all of the program's work passed inspection by our auditors."

c. "... It was programmed using the information from How to Make Managerial Accounting Decisions."

d. "... the program models Bob's actual thought processes."

2. In the search tree shown, circles represent terminal nodes and the double circle represents the goal node. For the traversal schemes, show the node expansion order for non-terminal and non-goal nodes by placing a number near the top right of the node. Assume the search terminates when a goal is generated.

1402_img1.png

a. Breadth-first search

b. Depth-first search

3. The A* algorithm uses an evaluation function f(n) = g(n) + h(n). In one or two sentences, explain the meaning of g(n) and h(n).

4. What constraints are necessary on g and/or h* to make the A* algorithm behave equivalently to: Breadth-first, Uniform-cost, and Best-first?

5. One of your friends notices that for the A* algorithm and for the particular problem you are solving, you apply a g(n) = 1 between all nodes. He points out the fact that for all nodes at level I in the search tree, g(I) will simply equal I. Therefore, he claims, why even bother to take into account g(I)? He says, "Just forget about g(I) and let f*(n) = h*(n). Your A* algorithm will work just as good as before." Explain the fault in this reasoning.

6. Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to:

a. identify nodes that are cut-off

b. compute the final value of the root node

Note: The root node in this tree is a min node.

1467_img2.png

Values for terminal nodes (left to right): 15 5 10 9 14 20

7. You and your chess opponent, John, are in a strange predicament. Whoever wins the present game has to play "Dirty Harry" next. It is a well-known fact that "Dirty Harry" does not fully comprehend the game of chess, moves randomly, and almost always loses. This, in itself, is not so bad; however, it is also a well-known fact that "Dirty Harry" is a very sore loser, and unless he wins, winds up shooting his opponent. Obviously, neither you nor John wants to play "Dirty Harry" next. Therefore, your strategy is to force John to win, and John's strategy is to force you to win.

a. Assuming that both you and John are consistent in choosing the worst possible move for yourselves, could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

b. Now, assume that the very thing you dread most has presented itself; that is, despite your best attempts to lose to John, he has managed to force you to win. Now, you are stuck in a game with "Dirty Harry." Your last hope is to play the game in such a manner that "Dirty Harry" is assured a win. Same question: could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

8. Given the following symbols and their meanings, translate the following propositional logic statement into English and determine whether the assertion is valid.

p: 64k is better than no memory at all.

q: We will buy more memory.

r: We will buy a new computer.

p -> (q -> r), q-> (p -> r)

(p \/ q) ->r

9. Represent the following sentences in first-order logic, using a consistent vocabulary that you define:

a. Fred works in the bank.

b. At least one person is Fred's supervisor.

c. Everyone who works in the bank handles money.

10. Suppose we have the following rules:

∀x Knows(Bill, x) =>ThreatenedBy(Bill, x)

∀xThreatenedBy(Bill, x) => Buys(Bill, x)

Suppose our knowledge base is:

∀a Knows(a, Sun)

Can we assume Bill will buy Sun? Show how we can prove this.

Reference no: EM13809961

Questions Cloud

Describe how cryptography can be used to meet your goal : You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal
Write research review and analysis paper on korb vs raytheon : Write a research, review and analyze Korb v. Raytheon, 707 F.Supp. Analyze and explain the challenges with freedom of speech.
Performance control in the project : Control is the last element of your project. Add a summary about some of the things that would require performance control in the project.
Write paper on the effect of socioeconomic status on student : Write a paper about The effects of socioeconomic status on students' performance in school.
Identify nodes that are cut-off : Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to: identify nodes that are cut-off
What would the participants in the control group do : What would the participants in the control group do
National bureau of economic research : National Bureau of Economic Research
Hostile work environment sexual harassment claim : In a hostile work environment sexual harassment claim, the employer will have a successful defense if the employer can show which of the following
Terrorism and the media : Terrorism and the Media

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd