Backward chaining, Computer Engineering

Assignment Help:

Backward Chaining:

In generally given that we are only interested in constructing the path whether we can set our initial state to be the theorem statement and search backwards until we find an axiom or set of axioms. There if we restrict ourselves to just utilising equivalences as rewrite rules for this approach is OK, is just because we can use equivalences both ways, and any path from the theorem to axioms that is found will provide a proof. In fact, if we use inference rules to traverse from theorem to axioms like we will have proved that and if the theorem is true then the axioms are true. Whether we already know that the axioms are true! Just to get around this we must invert our inference rules and try to work backwards. Means that, the operators in the search basically answer the question: as what could be true in order to infer the state like logical sentence we are at right now? In the Arch space if we set our agent starts searching from the theorem statement and reaches the axioms, than it has proved the theorem. In fact this is also problematic means there are numerous answers to the inversion question so and the search space gets very large.


Related Discussions:- Backward chaining

Hypertext markup language, Web pages or materials which are in the form of ...

Web pages or materials which are in the form of hypermedia documents accessed through Internet can be located anywhere in world. No matter from where they originated, most Web d

Explain the use of ssl to secure the network, Explain the use of SSL to sec...

Explain the use of SSL to secure the network.  SSL (Secure Sockets Layer) is a protocol developed by Netscape for transferring private documents by the Internet. SSL works by u

How do active web pages work, How do active web pages work? Describe with a...

How do active web pages work? Describe with a small example. Active Web Pages: An active document is not completely specified through the server. Instead an active documen

A luminous jewel game, a luminous jewel game c programming start with t and...

a luminous jewel game c programming start with t and end with t the output will yes or no

An algorithm, find cos(x) and sin(x) an pseudocode (while loop

find cos(x) and sin(x) an pseudocode (while loop

What is memory address register, Q. What is Memory Address Register? Me...

Q. What is Memory Address Register? Memory Address Register (MAR): It specifies address of memory location from that data or instruction is to be accessed (read operation) or t

How to clear computer motherboard cmos password, As CMOS is a special chip ...

As CMOS is a special chip with its own battery, the best way to clear out a CMOS chip is to cut off it from its power supply. To clear the CMOS password you just take away the

Device drivers in unix, Device Drivers in UNIX, MS-DOS and Windows System ...

Device Drivers in UNIX, MS-DOS and Windows System Though device drivers are in effect add-on modules they are however considered to be part of system because they are closely i

Explain an expression tree with a suitable example, What is an expression t...

What is an expression tree? How an expression is evaluated using an expression tree? Algebraic expressions is as given here a/b+(c-d)e That has an inherent tree-like structure

QUELING SYTEM , SHOW THAT AVERAGE NUMBER OF UNIT IN A (M/M/1) QUELING SYTEM...

SHOW THAT AVERAGE NUMBER OF UNIT IN A (M/M/1) QUELING SYTEM IS EQUAL TO P/(1-p). NOTE:P=ROW

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd