Hill climbing - artificial intelligence, Computer Engineering

Assignment Help:

Hill Climbing - Artificial Intelligence:

As we've seen, in some problems, finding the search path from primary to goal state is the point of the exercise. In other problems, the path and the artefact at the end of the path are both important, and we regularly try to find optimal solutions. Just for a certain set of problems, the path is irrelevant and finding appropriate artefact is the sole purpose of the search. In such cases, it doesn't be matter whether our agent searches down a path for 10 or 1000 steps, as long as it may be finds a solution in the end.

For example, consider the 8-queens problem in which we decided where the task is to find an sequence of 8 queens on a chess board such that no one can "take" another (one queen can take another if it's on the same horizontal, vertical or diagonal line. A Solution for this type of problem is:

One possible way to justify this problem is with states where there are a number of queens (1 to 8) on the board, and an action is to add a queen in this like a way that it can't take another. Its tottaly depending on your strategy, you may find that the search needs much more back-tracking, i.e., towards the end, and you find that you simply can't put the last queens on anywhere, so that you have to move one of the queens you put down earlier (you go back-up the search tree).


Related Discussions:- Hill climbing - artificial intelligence

Explain inheritance, Can you explain what inheritance is and an example of ...

Can you explain what inheritance is and an example of when you might use it? The process of deriving a new class from an existing class is known as Inheritance. The old class i

Hyper-threading, Hyper-threading, officially known as Hyper-threading Techn...

Hyper-threading, officially known as Hyper-threading Technology (HTT), is Intel's trademark for their execution of the simultaneous multithreading technology on the Pentium 4 micro

Explain the instruction decode, Q. Explain the Instruction Decode? Ins...

Q. Explain the Instruction Decode? Instruction Decode: This phase is performed under control of Control Unit of computer. The Control Unit determines the operation which is t

Why do we need dma, Why do we need DMA? DMA is used to transfer the blo...

Why do we need DMA? DMA is used to transfer the block of data directly among an external device and the main memory without the continuous intervention by the processor.

Symmetric and asymmetric encryption algorithms, Compare and contrast symmet...

Compare and contrast symmetric & asymmetric encryption algorithms. Your response should contain a brief overview of the cryptographic basis for every type of algorithm, and a compa

Elaborate the various steps in performing a mail merge, COMPUTER FUNDAMENTA...

COMPUTER FUNDAMENTALS 1. Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conduc

Explain subscriber access to strowger systems, What are the basic approache...

What are the basic approaches to the design of subscriber access to Strowger systems? Describe them. A step by step switching system has three main parts as demonstrated in fig

What is trp, TRP is the number of clock cycles required to terminate access...

TRP is the number of clock cycles required to terminate access to an open row of memory, and open access to the next row. It stand for row precharge time.

What is preemptive and nonpreemptive scheduling, What is preemptive and non...

What is preemptive and nonpreemptive scheduling? Under nonpreemptive scheduling once the CPU has been allocated to a process, the process keeps the CPU unless it releases the C

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd