Heuristic search strategies-artificial intelligence, Basic Computer Science

Assignment Help:

Heuristic Search Strategies-Artificial intelligence

In general speaking, a heuristic search is one which utilizes a rule of thumb to improve an agent's performance in solving problems by search. A heuristic search is not to be confused with a heuristic measure .As discussed below, if you may identify a heuristic measure, then it opens up a range of generic heuristic searches which you can try to improve your agent's performance. However, it is importance remembering that any law of thumb, for instance, selecting the order of operators is a heuristic ,when applied in a simple breadth first search.

In terms of our plan analogy, a heuristic search select where to put a (state, operator) pair on the plan when it is proposed as a move in the state space. This option could be complexes and based on many factors. In the terms of the graph analogy, a heuristic search selects that node to expand at any point in the search. By definition, a heuristic search is not guaranteed to get better performance for a particular problem or set of problems, but they  all are implemented in the hope of improving the speed of which a solution is found or /and the quality of the solution searched. In fact, we may be able to search optimal solutions, which are as good as possible with reference to some measure.

Optimality

The path worth of a solution is calculated as the addition of the costs of the actions which led to that solution. This is only one example of a measure of value on the solution of a search problem, and there are many others. These measures may /may not be connected to the heuristic functions which estimate the likelihood of a specific state being in the path to a solution. We say that given a measure of value on the possible solutions to a search problem - 1 specific solution is best possible if it gain higher than all the others with respect to this measure (or costs less, in the case of path cost). I.e. in the maze example given in section 3.2, there are several paths from the start to the finish of the maze, but just one which crosses the fewest squares. This is the good solution in terms of the distance travelled.

Optimality may be guaranteed through a particular option of search strategy (for instance the uniform path cost search described below). On the other hand, an agent may select  to  prove that  a solution is optimal by  appealing  to  some mathematical argument. As a final resort, if optimality is required, then an agent might exhaust a full search strategy to  find all solutions, then choose the one  scoring the highest (alternatively costing the lowest).


Related Discussions:- Heuristic search strategies-artificial intelligence

Write down dijkstra''s algorithm, QUESTION (a) Write down the Update ...

QUESTION (a) Write down the Update Step in the Dijkstra's algorithm explaining its complexity. (b) Propose a Generic Algorithm for Depth-First Search Algorithm, assuming

Wcdma – fdd technology, WCDMA – FDD technology Multiple access technology i...

WCDMA – FDD technology Multiple access technology is wideband CDMA (WCDMA) All cells at same carrier frequency Spreading codes used to separate cells and users Signal bandwidth 3.8

Noemalization.., what is means with respect to software engineering?

what is means with respect to software engineering?

Explain briefly about gnome desktop, Question 1 Brief about the shells of ...

Question 1 Brief about the shells of Linux operating system Question 2 Explain briefly about GNOME desktop Question 3 Write note on the following Encryption Sig

Data communication , (iv) Suppose that the TCP entity receives a 1.5 megaby...

(iv) Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the

Ascii & unicode, ASCII code:  An alphanumeric code has to represent 10...

ASCII code:  An alphanumeric code has to represent 10 decimal digits, 26 alphabets and certain other symbols such as punctuation marks and special characters. Therefore, a min

What is the importance of using digital certificates, QUESTION a) Crypt...

QUESTION a) Cryptography is a set of techniques and mathematical algorithms. Describe four important areas where cryptography must be applied b) What is the importance of us

List the various applications of ai, Question 1 What are the important Iss...

Question 1 What are the important Issues in Search Problem Question 2 What do you mean by Predicates? Briefly explain Question 3 What are the advantages of Wireles

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Synchronous and asynchronous transmission, Synchronous and Asynchronous Tra...

Synchronous and Asynchronous Transmission: Another method of setting of terminals denotes synchronous or asynchronous transmission. Many terminals can only communicate in one

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd