Prolog artificial intelligence , Computer Engineering

Assignment Help:

1. countdown Example: countdown(5,[5,4,3,2,1]).

 NOTE - your function should be able to answer questions such as: ?- countdown(5,L).

 2. count_occur Example: count_occur(7,[5,2,6,7,8,7,0],2).

 the list [5,2,6,7,8,7,0] has 2 occurences of 7

 3. array insert Example: ains([0,0,1,1,2,2],4,53,[0,0,1,1,53,2,2]).

 and array get Example: aget([0,0,1,1,53,2,2],4,53).

 These functions simulate array operations, using lists.  "ains" takes a list, an index, and a value to insert, and produces a list with the value inserted at the index point.  "aget" takes a list and an index, and produces the value from the list at the index point.


Related Discussions:- Prolog artificial intelligence

Difference between shadow and override in programming, Overriding tell us o...

Overriding tell us only the methods, but shadowing tells us the entire element.

Discuss on wbmp, Question 1 How to call a WML Script from a WML page Q...

Question 1 How to call a WML Script from a WML page Question 2 Discuss on the following WML Script data type Question 3 Discuss on the following WML script statements

Define main memory and auxiliary memory, Define main memory and auxiliary m...

Define main memory and auxiliary memory? The memory unit that communicates directly with the cpu is known as main memory [RAM].Devices that give backup storage are known as aux

Discuss in detail about micro computer, Discuss in detail about Micro compu...

Discuss in detail about Micro computer A microcomputer's CPU is a microprocessor. The microcomputer was originated in late 1970s. The first microcomputer was built around 8-bit

Determine the o/p when i/p A=11001 is applied to a NOT gate, When an input ...

When an input signal A=11001 is applied to a NOT gate serially, its output signal is ? Ans. First input applied will be LSB 00110, as A=11001 is serially applied to a NOT gate

Name the popular security measures, Name the popular security measures ...

Name the popular security measures A number of security products covering a broad range of methods are available in the market. Most popular of all the security measures are th

Meaning of every field in mips instruction, Q. Meaning of every field in MI...

Q. Meaning of every field in MIPS instruction? The meaning of every field in MIPS instruction is given below: op: operation code or opcode rs: First register source

Do we require an x server to run in batch mode for gimp, Yes, you have to h...

Yes, you have to have some form of X server (unless you're running Windows, of course). It requires an X server for image processing, and for font manipulation. Though, if you wish

Design a model for object oriented development, Design a model for object o...

Design a model for object oriented development The model for object oriented development could be shown as in Figure. It could be classified as dynamic / static and physical /

What is meant by inter process communication, What is meant by inter proces...

What is meant by inter process communication? Inter process Communication: The OS give the means for cooperating processes to communicate with each other through an inter pro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd