General considerations for search - artificial intelligence, Basic Computer Science

Assignment Help:

General Considerations for Search

If we may specify the starting state, the operators and the goal check for a search problem, then we know from where to start, how to move and when to discontinue in our search. This leaves the essential question of how to decide which operator to apply to which state at any particular stage in the duration of search. We call an answer to this question a search strategy. Before we concern about exactly what strategy to use, the following need to be taken into consideration:

Path or Artefact

Broadly speaking, there are two different reasons to undertake a search: to find an artefact (a particular state), or to search a way from given state to another given state. Whether you are finding for a way or an artefact will affect several aspects of search of your agent, by including its goal test, what it records along the way and the search scheme available to you.

For example, in the jumble below, the game involves finding a route from the top left hand corner to the bottom right hand corner. We know what the exit looks like (a gap in the outer wall), so we do not find for an artefact. Rather then, the point of the search is to find a path, so the agent might remember where it has been.

 

1367_General Considerations for Search.png

However, in another search, the point of the search is to find something, and it may be immaterial how you searched it. 


Related Discussions:- General considerations for search - artificial intelligence

Explain the important features of creational patterns, Question 1 Explain ...

Question 1 Explain the role of object oriented designers in developing a software system Question 2 What are the four essential elements of design patterns? Explain Question 3

Cisc, two characteristics og CISC architecture?

two characteristics og CISC architecture?

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Unspecified bit rate, ATM Theory - Unspecified Bit Rate Is intended for no...

ATM Theory - Unspecified Bit Rate Is intended for non-real time applications, that is, those not requiring tightly constrained delay and delay variation. Examples of applications

SQL 2008 Server Management Studio, 4. Provide a list of productid’s, the n...

4. Provide a list of productid’s, the name of the vendor and their credit rating. The results should be ordered by last name and then by credit rating. Write out the SQL that wo

System software, System software: System software helps run the  compu...

System software: System software helps run the  computer hardware and system. It is designed to control the operations of a computer and coordinate all external devices like c

Definition of assembler structure, In assembly language code lines have t...

In assembly language code lines have two fractions, the earliest one is the name of the instruction which is to be executed, and the next one are the parameters of the command. For

Cryptography, Question 1 Consider the one-time pad encryption scheme to e...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the ev

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd