Common problem with hill climbing, Computer Engineering

Assignment Help:

Common problem with Hill climbing:

An alternative way of justifying the problem is that the states are boards with 8 queens already on them, so an action is a movement of one of the queens. In this type of case, our agent can use an evaluation function and do hill climbing. Which, it counts the number of pairs of queens where one can take the other, and only moves a queen if the movement reduces the number of pairs of that. When there is a choice of movements both resulting in the same decrease, the agent can be chosen one randomly from the choices. In this sequence the 8-queens problem, and there are only 56 * 8 = 448 possible ways to move one queen, so that's why our agent only has to calculate the evaluation function 448 times at each stage. If it single chooses moves to where the situation with respect to the evaluation function improves, so it is doing hill climbing or gradient descent if it's better to think of the agent going downhill rather than uphill.

A common problem with this search strategy is a local maxima: the search has not been yet reached at a solution, but it one of the way to go downhill in terms of the evaluation function. For example, we could get to the stage where only two queens can take each other, to moving any queen increases this number to at least three. In cases like this, the agent can do a random re-start whereby they randomly choose a state to start the whole process from again. This search strategy has the appeal of never requiring be store more than one state at any one time that is the part of the hill the agent is on. Russell and Norvig make the analogy that this kind of search is like trying to climb Mount Everest in the fog with amnesia, but they do concede that it is often the search strategy of choice for some industrial problems.


Related Discussions:- Common problem with hill climbing

Explain rudimentary file formats, Q. Explain rudimentary file formats? ...

Q. Explain rudimentary file formats? FTP only understands two rudimentary file formats. It classifies every file either as a text file or a binary file. A text file comprise a

What are the benefits of micro programmed control, a. What are the benefits...

a. What are the benefits of hardwired and micro programmed control? b. Sketch neat diagram of single bus organization of CPU showing ALU, all types of registers and the data pat

Cross bar-various interconnection networks-fully connected, Cross Bar ...

Cross Bar The crossbar network is the easiest interconnection network. It has a two dimensional grid of switches.  It is a non-blocking network and give connectivity among inp

Explain the violating basic security principles, Explain the violating basi...

Explain the violating basic security principles There are drawbacks to permitting users to access the Intranet as well as not permitting them. A simple consideration such as a

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Show the comparison of ascii and ebcdic, Q. Show the Comparison of ASCII an...

Q. Show the Comparison of ASCII and EBCDIC? EBCDIC is an easier to employ code on punched cards due to BCD compatibility. But ASCII has some of major benefits on EBCDIC. These

Explain pre-emptive scheduling, Explain Pre-emptive scheduling? Pre-em...

Explain Pre-emptive scheduling? Pre-emptive scheduling: in its approach, center processing unit can be taken away from a process if there is a require while in a non-pre-empt

Explain network security, Explain network security. Network security me...

Explain network security. Network security means the security of networks and their services from unauthorized access, changes, destruction or disclosure. It gives for assuranc

Explain about wildcard character in dos, Q. Explain about wildcard characte...

Q. Explain about wildcard character in DOS? Sometimes you may like to list files having similar names. Let as suppose that these files are present in a root directory of drive

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd