Greedy search-artificial intelligence, Basic Computer Science

Assignment Help:

Greedy Search-artificial intelligence:

If we have a heuristic function for states, as defined above, then we may simply measure each state with respect to this measure and order the plan items in terms of the score of the state in the item. So, at every stage, the agent determines which state scores lowest and puts agenda items on the top of the plan which contain operators acting on that state. Like this, the most promising nodes in a search space are expanded before the less promising ones. This is a type of best first search known particularly as a greedy search.

In some situations, a greedy search may lead to a solution very rapidly However, a greedy search can frequently go down blind alleys that look promising to start with, but ultimately don't lead to a solution. Often the best states at the beginning of a search are actually really quite poor in comparison to those further in the search space. One way to counteract this blind-alley effect is to turn off the heuristic until a amount of the search space has been enclosed, so that the truly high scoring states can be identified. Another problem with a greedy search is that the agent will have to keep a record of which states have been explored in order to avoid repetitions (and ultimately end up in a cycle), so greedy search might keep all the agenda items it has undertaken in its memory. Also, this search method is not optimal, because the optimal solution can have nodes on the path which score faultily for the heuristic function, and thus a non-optimal solution will be found before an optimal one. (Remember that the heuristic function only estimates the path cost from a node to a solution).

 


Related Discussions:- Greedy search-artificial intelligence

Operating system, advantage and disadvantage of operating system

advantage and disadvantage of operating system

Hypertext markup language (html), HTML is a Formatting language which is mo...

HTML is a Formatting language which is most commonly used for web documents.

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

What is Load and store the assembly programs?, It would not emerge practica...

It would not emerge practical to type an entire program each time it is required, and to avoid this it is possible to store a program on the disk, with the vast advantage that by b

Define procedure of Building Assembler programs, In order to be able to mak...

In order to be able to make a program, quite a lot of tools are needed: Earliest an editor is used to create the source program. Next a compiler, which is nothing more than a progr

What is mixing, Question 1 Briefly explain waveform Characteristics ...

Question 1 Briefly explain waveform Characteristics Question 2 Write a note on: types of Microphones Question 3 Briefly explain Magnetic Properties of Audiotape

Discuss the objectives of query processing, Question 1 Differentiate betwe...

Question 1 Differentiate between PL/SQL functions and procedures Question 2 Draw the diagram of logical structure of oracle database and explain it in brief Question 3 D

System software, note on high level language and low level language

note on high level language and low level language

Project on ASP .NET MVC 5, I am looking for a project which is based on ASP...

I am looking for a project which is based on ASP.NET MVC 5.Could you please help me ?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd