Identify nodes that are cut-off

Assignment Help Data Structure & Algorithms
Reference no: EM13809961

1. Describes four ways of defining the AI field. For each of the following sentences, state which definition of AI it seems to follow and explain your answer.

"I replaced Bob our accountant with a program. I think the program is artificially intelligent because ..."

a. "... when the program makes mistakes, it makes the same mistakes that Bob would."

b. "...all of the program's work passed inspection by our auditors."

c. "... It was programmed using the information from How to Make Managerial Accounting Decisions."

d. "... the program models Bob's actual thought processes."

2. In the search tree shown, circles represent terminal nodes and the double circle represents the goal node. For the traversal schemes, show the node expansion order for non-terminal and non-goal nodes by placing a number near the top right of the node. Assume the search terminates when a goal is generated.

1402_img1.png

a. Breadth-first search

b. Depth-first search

3. The A* algorithm uses an evaluation function f(n) = g(n) + h(n). In one or two sentences, explain the meaning of g(n) and h(n).

4. What constraints are necessary on g and/or h* to make the A* algorithm behave equivalently to: Breadth-first, Uniform-cost, and Best-first?

5. One of your friends notices that for the A* algorithm and for the particular problem you are solving, you apply a g(n) = 1 between all nodes. He points out the fact that for all nodes at level I in the search tree, g(I) will simply equal I. Therefore, he claims, why even bother to take into account g(I)? He says, "Just forget about g(I) and let f*(n) = h*(n). Your A* algorithm will work just as good as before." Explain the fault in this reasoning.

6. Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to:

a. identify nodes that are cut-off

b. compute the final value of the root node

Note: The root node in this tree is a min node.

1467_img2.png

Values for terminal nodes (left to right): 15 5 10 9 14 20

7. You and your chess opponent, John, are in a strange predicament. Whoever wins the present game has to play "Dirty Harry" next. It is a well-known fact that "Dirty Harry" does not fully comprehend the game of chess, moves randomly, and almost always loses. This, in itself, is not so bad; however, it is also a well-known fact that "Dirty Harry" is a very sore loser, and unless he wins, winds up shooting his opponent. Obviously, neither you nor John wants to play "Dirty Harry" next. Therefore, your strategy is to force John to win, and John's strategy is to force you to win.

a. Assuming that both you and John are consistent in choosing the worst possible move for yourselves, could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

b. Now, assume that the very thing you dread most has presented itself; that is, despite your best attempts to lose to John, he has managed to force you to win. Now, you are stuck in a game with "Dirty Harry." Your last hope is to play the game in such a manner that "Dirty Harry" is assured a win. Same question: could you somehow adapt the alpha-beta algorithm to help you in this situation? Explain why and how, or explain why not.

8. Given the following symbols and their meanings, translate the following propositional logic statement into English and determine whether the assertion is valid.

p: 64k is better than no memory at all.

q: We will buy more memory.

r: We will buy a new computer.

p -> (q -> r), q-> (p -> r)

(p \/ q) ->r

9. Represent the following sentences in first-order logic, using a consistent vocabulary that you define:

a. Fred works in the bank.

b. At least one person is Fred's supervisor.

c. Everyone who works in the bank handles money.

10. Suppose we have the following rules:

∀x Knows(Bill, x) =>ThreatenedBy(Bill, x)

∀xThreatenedBy(Bill, x) => Buys(Bill, x)

Suppose our knowledge base is:

∀a Knows(a, Sun)

Can we assume Bill will buy Sun? Show how we can prove this.

Reference no: EM13809961

Questions Cloud

Describe how cryptography can be used to meet your goal : You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal
Write research review and analysis paper on korb vs raytheon : Write a research, review and analyze Korb v. Raytheon, 707 F.Supp. Analyze and explain the challenges with freedom of speech.
Performance control in the project : Control is the last element of your project. Add a summary about some of the things that would require performance control in the project.
Write paper on the effect of socioeconomic status on student : Write a paper about The effects of socioeconomic status on students' performance in school.
Identify nodes that are cut-off : Use Alpha-Beta Search to compute the final value of the root node for the tree below. Use depth-first, left-to-right progression. Be sure to: identify nodes that are cut-off
What would the participants in the control group do : What would the participants in the control group do
National bureau of economic research : National Bureau of Economic Research
Hostile work environment sexual harassment claim : In a hostile work environment sexual harassment claim, the employer will have a successful defense if the employer can show which of the following
Terrorism and the media : Terrorism and the Media

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Data array a has data series from 1000000 to 1 with step

data array a has data series from 1000000 to 1 with step size 1 which is in perfect decreasing order.data array b has

  Algorithm to decide flavor of ice cream from three option

A group of ten people require to decide which one flavor of ice cream they will all order, out of three options. The algorithm can question and re-question participants.

  Develop a solution for the problem and mention algorithms

Spaces between tokens are allowed but not required. The program will convert the (user input) infix expression to postfix (RPN) form and display the converted expression on the screen.

  Create a program that implements each mergesort an quicksort

Create a program that implements each mergesort and quicksort. For each the program should generate an array of 500 numbers in the range of 1-100.

  Reverse path flooding

Suppose we have a network of nodes connected via point to point links, and source S sends a message that will be broadcast to all nodes using Reverse Path Flooding.

  Describe an algorithm that takes as input a list of n

Describe an algorithm that takes as input a list of n distinct integers and finds the location of the largest even integer in the list or returns 0 if there are no even integers in the list.

  Decryption speed and diffie-hellman

Increase of a single bit in the size of the encryption key doubles the amount of needed computations - Show how the recipient of the message, who knows e, produces the plaintext.

  Possible external-memory map implementation

Another possible external-memory map implementation is to use a skip list, but to collect consecutive groups of  O ( B ) nodes, in individual blocks, on any level in the skip list

  Your employee delivered an algorithm for resolving a task

your employee delivered an algorithm for solving a task. you were told the running time is on3. you have a large amount

  Find a shortest-path from u to v

find a shortest-path from u to v, and we have a *valid* heuristic, i.e.: For every node w, we have a value a(w) such that the distance from w to v in G is at least a(w) for all nodes w.

  How is a pert chart useful?

How is a Pert chart useful? How is a Gantt chart useful? What are the differences and similarities between both?

  Write algorithm-compute total and weighted average of test

Write down the algorithm for the program which prompts the user to enter five test scores, compute the total of the five tests and determine the weighted average of each test.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd