General considerations for search - artificial intelligence, Basic Computer Science

Assignment Help:

General Considerations for Search

If we may specify the starting state, the operators and the goal check for a search problem, then we know from where to start, how to move and when to discontinue in our search. This leaves the essential question of how to decide which operator to apply to which state at any particular stage in the duration of search. We call an answer to this question a search strategy. Before we concern about exactly what strategy to use, the following need to be taken into consideration:

Path or Artefact

Broadly speaking, there are two different reasons to undertake a search: to find an artefact (a particular state), or to search a way from given state to another given state. Whether you are finding for a way or an artefact will affect several aspects of search of your agent, by including its goal test, what it records along the way and the search scheme available to you.

For example, in the jumble below, the game involves finding a route from the top left hand corner to the bottom right hand corner. We know what the exit looks like (a gap in the outer wall), so we do not find for an artefact. Rather then, the point of the search is to find a path, so the agent might remember where it has been.

 

1367_General Considerations for Search.png

However, in another search, the point of the search is to find something, and it may be immaterial how you searched it. 


Related Discussions:- General considerations for search - artificial intelligence

Excell, grades computation

grades computation

What is .net framework, Qestion 1 What is .Net Framework? Qestion 2 W...

Qestion 1 What is .Net Framework? Qestion 2 Write short notes on constructors and destructors Qestion 3 Explain boxing and unboxing with examples Qestion 4 What is

Data communication & net centric computing, Suppose there are exactly five ...

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

Cryptography, #questionConsider the one-time pad encryption scheme to encry...

#questionConsider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event

Algorithm, algorithm to determine if a number is odd or even

algorithm to determine if a number is odd or even

Define Program formation process, For the formation of a program it is nece...

For the formation of a program it is necessary to follow five steps: Design of the algorithm, stage the problem to be solved is reputable and the best solution is proposed, creatin

C, wap to print padovan string in c

wap to print padovan string in c

What are the Proposals for Achieving Mutual Exclusion?, Proposal a) Disabli...

Proposal a) Disabling Interrupts (Hardware Solution) • Every process disables all interrupts just after entering in its critical section and re-enables all interrupts just previous

Data processing, Data Processing In any computer-based system, d...

Data Processing In any computer-based system, data storage and retrieval plays an important role. Data storage involves decision about the encoding of data, assignment o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd