Forward checking - artificial intelligence, Computer Engineering

Assignment Help:

Forward checking:

Whether to add some sophistication to the search method there constraint solvers use a technique called as forward checking. So here the general idea is to work the like as a backtracking search but, where checking compliance with constraints behind assigning a  value to a variable there the agent also checks when this assignment is going to break constraints with  future variable assignments. Hence is supposing that Vc has been assigned to the current variable c, after then for each unassigned variable xi, as temporarily remove all values from Di that along with Vc break a constraint. Thus it may be that in doing so, Di becomes empty. Because the choice of Vc for the current variable is bad  -  so however it will not find its way into a solution to the problem just because there's no way to assign a value to xi without breaking a constraint. In that condition even though the assignment of Vc may not break any constraints such that already assigned variables so a new value is chosen as or backtracking occurs whether there are no values left, just because we know that V  is a bad assignment. 

Here the next diagram like again, taken from Smith's tutorial to shows how forward checking improves the search for a solution to the 4-queens problem as;:. 

2484_Forward checking.png

In such a scenario to forward checking, to improve the intelligence of the constraint solving agent so there are some possibilities for a heuristic search. Therefore firstly, our agent can worry about the order such that looks at the variables, that is, in example of the 4-queens problem so it might try to put a queen in row 2, after then one in row 3, one in row 1 and then finally one in row 4. Moreover a solver taking such care is said to be utilizing a variable-ordering heuristic. Conversely the ordering of variables can be done earlier than a search  is started and rigidly adhered to during the search. In fact this might be a good idea whether there is extra knowledge about the problem, like an example that a particular variable should be assigned a value sooner quite than later. In such a scenario  the ordering of the variables can be done dynamically so in response to some information gathered about that how the search is progressing during the search procedure.


Related Discussions:- Forward checking - artificial intelligence

Rpn procedure, Apply this algorithm to your MASM program 1) Declare the ...

Apply this algorithm to your MASM program 1) Declare the following variables in your data segment: .data ; ; These are the values of the variables ; Variables

Explain microcode and VLSI technology, Q. Explain Microcode and VLSI Techno...

Q. Explain Microcode and VLSI Technology? It is considered that CU of a computer be assembled using two ways; create micro-program which execute micro-instructions or construct

Illustrate the accumulator architecture, Accumulator Architecture: An accu...

Accumulator Architecture: An accumulator is anespecially designated register which supplies one instruction operand and receives result. Instructions in such machines are usually

Advantage of using interrupt initiated data transfer, What is the advantage...

What is the advantage of using interrupt initiated data transfer over transfer under program control without interrupt? In the interrupt initiated data transfer, the processor

Asp.net webforms and asp.mvc, Is it possible to join ASP.NET webforms and A...

Is it possible to join ASP.NET webforms and ASP.MVC and make a single web application? Ans) Yes, it is possible to join ASP.NET webforms and ASP.MVC and develop a single web a

Convert the decimal number to excess-3 code, Convert the decimal number 430...

Convert the decimal number 430 to Excess-3 code ? Ans. Excess  3  is  a  digital  code  acquired  from  adding  3  to  every  decimal  digit  and  after that converting the res

What is the purpose of guard bits, What is the purpose of guard bits used i...

What is the purpose of guard bits used in floating point operations? The guard bits are the extra bits which are used to retain the in-between steps to enhance the accuracy in

Define deadlock with resource request and allocation graph, Define Deadlock...

Define Deadlock with Resource request and allocation graph (RRAG) Deadlocks can be described through a directed bipartite graph termed as a RRAG that is Resource Request All

Determine about the web authoring tools, Web authoring tools CGI was cons...

Web authoring tools CGI was considered excellent in the beginning since it was also open standard. The only drawback it suffered was that it was slow. Major software developers v

Input output in assembly program, Q. Input output in assembly program? ...

Q. Input output in assembly program? Software interrupt is a call to an Interrupt servicing program situated in the operating system. Generally the input-output routine in 8086

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd