Hill climbing - artificial intelligence, Computer Engineering

Assignment Help:

Hill Climbing - Artificial Intelligence:

As we've seen, in some problems, finding the search path from primary to goal state is the point of the exercise. In other problems, the path and the artefact at the end of the path are both important, and we regularly try to find optimal solutions. Just for a certain set of problems, the path is irrelevant and finding appropriate artefact is the sole purpose of the search. In such cases, it doesn't be matter whether our agent searches down a path for 10 or 1000 steps, as long as it may be finds a solution in the end.

For example, consider the 8-queens problem in which we decided where the task is to find an sequence of 8 queens on a chess board such that no one can "take" another (one queen can take another if it's on the same horizontal, vertical or diagonal line. A Solution for this type of problem is:

One possible way to justify this problem is with states where there are a number of queens (1 to 8) on the board, and an action is to add a queen in this like a way that it can't take another. Its tottaly depending on your strategy, you may find that the search needs much more back-tracking, i.e., towards the end, and you find that you simply can't put the last queens on anywhere, so that you have to move one of the queens you put down earlier (you go back-up the search tree).


Related Discussions:- Hill climbing - artificial intelligence

Decoding of slightly encoded micro-instructions, Q. Decoding of slightly en...

Q. Decoding of slightly encoded micro-instructions? Generally micro-programmed control unit designs are neither totally unencoded nor highly encoded. They are slightly coded. T

Parallel edge or self loop of the total number of edges, A graph with n ver...

A graph with n vertices will definitely have a parallel edge or self loop of the total number of edges are More than n(n-1)/2

What are the main data structures used in rdbms, What are the main data str...

What are the main data structures used in the following areas: RDBMS, Network data model and Hierarchical data model? RDBMS = Array (i.e. Array of structures) Network data m

Define password methods and biometric systems, Define the password methods ...

Define the password methods and Biometric systems for implementing client server network security. In cyberspace, buyers and sellers cannot notice each other. Also within video

Autonomous rational an agents, Autonomous Rational an Agents: In many ...

Autonomous Rational an Agents: In many cases, it is inaccurate to talk about a single program or a single robot, as the multi-purpose and multi-tasking system of hardware and

Describe program control instructions, Q. Describe Program Control Instruct...

Q. Describe Program Control Instructions? These instructions specify conditions for altering the sequence of program execution or we can say in other words that the content of

A digital signature, A digital signature is   encrypting information

A digital signature is   encrypting information

Mips - computer architecture, MIPS - computer architecture: The MIPS ...

MIPS - computer architecture: The MIPS ISA, so far 3 instruction formats Fixed 32-bit instruction 3-operand, load-store architecture 32 general-purpose register

Define bidirectional bus, Define bidirectional bus? A bidirectional bus...

Define bidirectional bus? A bidirectional bus is that which permits the transfer of data either from memory to CPU during a read operation or from CPU to memory during write op

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd