Artificial intelligence-long term goals, Basic Computer Science

Assignment Help:

 

Simple Tasks to Accomplish

Once you've worried for why you're performing AI, what has inspired you and how you're going to approach the job, then you can initialize to think for what operation it is that you want to automate. AI is so often portrayed as a groupe of problem-solving methodes, but we think the relentless shoe-horning of intelligent tasks into one problem formulation or another is holding AI back. That said, we have examined a number of problem solving process in AI - most of which have been hinted at previously - which can be used as a characterization. The categories overlap a little bit because of the generality of the process. For  instance, planning could  be  found  in  many categories, as this is  a fundamental part of solving many types of problem.

 

 Simple Techniques Generated

In  the  pursuit  of  solutions  to  many  problems  in  the  above  categories,  many personal techniques have sprung up which have been shown to be useful for solving a domain of problems (often within the general problem category). These techniques are established sufficient now to have a name and given at least a partial characterisation of AI. The given list is not intended to be finshed, but rather to introduce some process you will study later in the course. See that some of those overlap in the general techniques above.

 

  • Forward/backward chaining (reasoning)
  • Resolution theorem proving (reasoning)
  • Proof planning (reasoning)
  • Constraint satisfaction (reasoning)
  • Davis-Putnam method (reasoning)
  • Minimax search (games)
  • Alpha-Beta pruning (games)
  • Case-based reasoning (expert systems)
  • Knowledge elicitation (expert systems)
  • Neural networks (learning)
  • Bayesian methods (learning)
  • Explanation based (learning)
  • Inductive logic programming
  • (learning)
  • Reinforcement (learning)
  • Genetic algorithms (learning)
  • Genetic programming
  • (learning)
  • Strips (planning)
  • N-grams (NLP)
  • Parsing (NLP)
  • Behavior based (robotics)
  • Cell decomposition (robotics)

 


Related Discussions:- Artificial intelligence-long term goals

Find shortest path in network, Find shortest path from node 1 to node 10 in...

Find shortest path from node 1 to node 10 in the network shown in figure, also find shortest path from node 3 to node 10. Please write all steps to finding shortest path mechanism

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Sequential reading in fcb files, Earlier than anything we must describe the...

Earlier than anything we must describe the file transfer area or DTA. With the intention of sequentially read we use the 14H function of the 21Hinterruption.The register to be read

Information security, can someone balance between information security and ...

can someone balance between information security and access, if yes,how can they balance?

Define Interprocess Communication and its race condition?, In view of the f...

In view of the fact that processes frequently need to communicate with other processes therefore, there is require for a well-structured interaction, devoid of using interrupts, a

ASSIGNMENTS, A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP...

A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP OF THE STAIRS AND ANOTHER AT THE BOTTOM OF STAIRS

Operating system problems, 1. In discussing software algorithms for mutual ...

1. In discussing software algorithms for mutual exclusion, we noted that optimizing compilers and out-of-order execution by processors could invalidate most of these algorithms bec

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Transmission control protocol, The TCP/IP networking protocol suite is so b...

The TCP/IP networking protocol suite is so basically named for two of its very most and important protocols: Transmission Control Protocol online tutoring Indication Manage

Adding macros to ms word 2010 for a particular format, Project Setting up ...

Project Setting up Microsoft Word 2010 to automatically handle as much as possible of the NDSU Graduate School requirements for a disquisition. Accessible from the Graduate Schoo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd