Autonomous rational an agents, Computer Engineering

Assignment Help:

Autonomous Rational an Agents:

In many cases, it is inaccurate to talk about a single program or a single robot, as the multi-purpose and multi-tasking system of hardware and software in some intelligent systems is considerably more complicated. Instead, we'll follow the rule-regulation of Russell and Norving and describe "AI" through the autonomous, rational intelligent an agents paradigm. We're going to use the definitions from chapter 2 of Russell and Norvig's textbook, starting with these two: 

An agent is anything that can be viewed as perceiving its environment through sensors and acting upon that environment through effectors. 

A rational an agent is one that does the right thing. 

We see that the word 'an agent' covers humans (where the sensors are the senses and the effectors are the physical body parts) as well as robots (where the sensors are things like cameras and touch pads and the effectors are various motors) and personal computers (where the sensors are the keyboard and mouse and the effectors are the monitor and speakers).

To verify whether an agent has acted rationally, we require an objective measure of how successful it has been and we need to worry about when to make an evaluation using this measure. When designing an agent, it is important to think hard about how to evaluate its performance, and this evaluation should be independent from any internal measures that the an agent undertakes (for example as part of a heuristic search  -  see the next lecture). The performance should be measured in terms of how rationally the program acted, which depends not only on how well it did at a particular assignment but also on what the an agent experienced from its environment, what the an agent knew about its surrounding areas and what reactions the an agent could actually assume.


Related Discussions:- Autonomous rational an agents

What is winchester technology, What is Winchester technology? The disk ...

What is Winchester technology? The disk and the read/write heads are placed in a sealed air-filtered enclosure known as Winchester technology.

What is a binary tree, What is a binary tree? A binary tree 'T' is desc...

What is a binary tree? A binary tree 'T' is described as A finite set of elements, known as nodes, such that: either (i) or (ii) happens: (i) T is empty (known as the 'nu

Human–computer interaction, In the view of the M364 module team, HCI has be...

In the view of the M364 module team, HCI has been superseded by ID. This is because HCI traditionally concentrated upon desktop computers with single users, whereas ID includes the

Assembler, Assembler: Typically a modern assembler makes object code b...

Assembler: Typically a modern assembler makes object code by translating assembly instruction into op codes, & by resolving symbolic names for memory locations and any other e

Explain opening files for reading only in c, Opening Files for Reading Only...

Opening Files for Reading Only     : A data file is a file that you can open and read its contents visually - for example, C source files, .dat files, HTML etc - anything that look

Define the half duplex transmission, Define the Half Duplex Transmission ...

Define the Half Duplex Transmission A half-duplex channel can receive andsend, but not at the same time. It's like a one-lane bridge where two-way traffic should give way in

Bernstein conditions for detection of parallelism, Bernstein Conditions for...

Bernstein Conditions for Detection of Parallelism For implementation of instructions or block of instructions in parallel, it should be guaranteed that the instructions are ind

What is public, * Public, protected and private are 3 access specifier in C...

* Public, protected and private are 3 access specifier in C++. * Public data members and member functions are accessible outside the class. * Protected data members and memb

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

What do you mean by embedded system, It is a mixture of hardware and softwa...

It is a mixture of hardware and software to perform needed task

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd