Common problem with hill climbing, Computer Engineering

Assignment Help:

Common problem with Hill climbing:

An alternative way of justifying the problem is that the states are boards with 8 queens already on them, so an action is a movement of one of the queens. In this type of case, our agent can use an evaluation function and do hill climbing. Which, it counts the number of pairs of queens where one can take the other, and only moves a queen if the movement reduces the number of pairs of that. When there is a choice of movements both resulting in the same decrease, the agent can be chosen one randomly from the choices. In this sequence the 8-queens problem, and there are only 56 * 8 = 448 possible ways to move one queen, so that's why our agent only has to calculate the evaluation function 448 times at each stage. If it single chooses moves to where the situation with respect to the evaluation function improves, so it is doing hill climbing or gradient descent if it's better to think of the agent going downhill rather than uphill.

A common problem with this search strategy is a local maxima: the search has not been yet reached at a solution, but it one of the way to go downhill in terms of the evaluation function. For example, we could get to the stage where only two queens can take each other, to moving any queen increases this number to at least three. In cases like this, the agent can do a random re-start whereby they randomly choose a state to start the whole process from again. This search strategy has the appeal of never requiring be store more than one state at any one time that is the part of the hill the agent is on. Russell and Norvig make the analogy that this kind of search is like trying to climb Mount Everest in the fog with amnesia, but they do concede that it is often the search strategy of choice for some industrial problems.


Related Discussions:- Common problem with hill climbing

Skip to line line number, The "SKIP TO LINE line number" is dependent on wh...

The "SKIP TO LINE line number" is dependent on which statement included in the report statement of the program. The "SKIP TO LINE line number" is dependent on "LINE-COUNT" stat

Name the widely used language processor development tool, Name the widely u...

Name the widely used Language Processor Development Tools ( LPDTs). Widely used Language processor development tools are: Lex - A Lexical Analyzer Generator Lex assi

Write a menu driven program to perform addition, Q. Write a menu driven pr...

Q. Write a menu driven program to perform addition and subtraction in base 5. Check that entered numbers are in base 5 or not else error message should be displayed.

What is component diagrams in uml, A component diagram is mainly useful wit...

A component diagram is mainly useful with teams of larger size. UML components are great to perform architectural landscape for an exact system. The component diagram permits to mo

Registers used in organisation of an associative memory, In the organisatio...

In the organisation of an associative memory, many registers are used: Comparand Register (C): This register is used to grasp the operands, which are being searched for, or

Illustrate function of 4-input multiplexer using basic gates, Illustrate fu...

Illustrate functional diagram of digital multiplexer . Write the scheme of a 4- input multiplexer using basic gates (AND/OR/NOT) and explain its operation. Ans: Multiple

Signalling connection control part and message transfer part, The Signallin...

The Signalling connection control part (SCCP) and message transfer part (MTP) together are referred to as (A) Signal Switching Points (SSPs) (B)  Signal Transfer Points

What is binary, Binary is an alternative number system which works very goo...

Binary is an alternative number system which works very good for computers. Humans have ten fingers; that's probably why we use ten digits (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) in our

Advantages and disadvantages of public key cryptography, What are the advan...

What are the advantages and disadvantages of public key cryptography? Advantages and Disadvantages: Improved security and convenience: private keys never require be trans

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd