Acting rationally - artificial intelligence, Computer Engineering

Assignment Help:

Acting Rationally:

"Al" Capone was finally convicted for tax evasion. Were the police reacting on rationally?? To solve this puzzle, we must first look at how the performance of police forces is viewed: arresting and convicting the people who have committed a crime starting, because their success in getting criminals off the street is also a reasonable, if contentious, measure. Given that they didn't convict Capone for the murders he committed, they failed on that measure. More ever, they did get him off the street, so they succeeded in there aims. We must also look at that what the police knew and what they had experienced about the surrounding: they had experienced murders which they knew were undertaken by Capone, but they had not experienced any evidence which could convict Capone of the murders. More ever, they had evidence of tax evasion. As this got them off the street, we have to say they were acting rationally because they did.  

This answer is controversial, and highlights the basic purpose why we have to much worry hard about how to assess the rationality of an agent before we consider building it.


Related Discussions:- Acting rationally - artificial intelligence

Global fon, GlobalFon is an international communication company, which offe...

GlobalFon is an international communication company, which offers international prepaid calling cards. They introduced three different types of cards, (1) AsiaFon: is cheapest for

Why we need web browser, Q. why we need Web Browser? A Web browser is s...

Q. why we need Web Browser? A Web browser is software program which allows you to easily display Web pages and navigate the Web. The first graphical browser, Mosaic, was develo

Security features used in client-server types of network, Security features...

Security features used in Client-Server types of network are as follows :  i) Digital Signatures ii)  Encryption / Decryption iii) Secure Socket Layer (SSL) iv) Firewa

Write hit policies, Write Hit Policies: Write through o   Upd...

Write Hit Policies: Write through o   Update next level on every write o   Cache is always clean o   A lots of traffic to next level (mostly write) Write

Determine about the virtual private networks, Virtual Private Networks (VPN...

Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

What is boundary scan, What is Boundary Scan?  Boundary scan is a board...

What is Boundary Scan?  Boundary scan is a board level design method that provides test access to the input and output pads of ICs on PCBs. Boundary scan changes the IO circuit

SIDE EFFECT , EXPLAIN SIDE EFFECT OF SCAN CONVERSION WITH DIGRAM

EXPLAIN SIDE EFFECT OF SCAN CONVERSION WITH DIGRAM

What is a pre-processor, What is a pre-processor? A pre-processor is a ...

What is a pre-processor? A pre-processor is a program that procedure the source code before it passes by the compiler. It handles under the control of pre-processor directive.

Execution of micro-program, The micro-instruction cycle can comprises two b...

The micro-instruction cycle can comprises two basic cycles: the fetch and execute. Here in the fetch cycle address of micro-instruction is produced and this micro-instruction is pu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd