Rational performance of an agent - artificial intelligence, Computer Engineering

Assignment Help:

Rational performance of an agent - artificial intelligence:

To summarize, an agent takes input from its violence and affects that environment. The rational performance of an agent must be assessed in terms of the task it was meant to assume, its awareness and knowledge of the environment and the actions it was actually able to undertake. This performance should be objectively measured independently of any internal measures used by an agent. In English language, the word 'autonomy' means an ability to govern one's actions independently. In this situation, we need to specify the extent to which an agent's behavior is affected by its surroundings, we can say that:

-The autonomy of an agent is measured by the extent to which its behaviour is determined by its own experience.

At a level, an agent might never pay any kind of attention to the input from its background in which case, it's reactions are determined entirely by its built-in knowledge. At the other level, if an agent does not initially act using its important information and knowledge, it will have to act randomly, which is not wanted. Hence, it is desirable to take a balance between whole autonomy and no autonomy. Thinking of hum agents, we are born with certain reflexes which govern our actions to begin with. However, through our ability to learn from our atmosphere we begin to react more autonomously as a result of our experiences in the world. Imagine a baby learning to crawl about, it must use in-built information to enable it to correctly employ its arms, legs and fingers; otherwise it would just thrash around. More ever, as it moves, and bumps into things, it learns to stay away from objects in the environment. When we leave home, we are supposed to be fully autonomous agents ourselves. We just have expected similar of the agents we build for "AI" tasks: their autonomy increases in line with their experience of the surroundings.


Related Discussions:- Rational performance of an agent - artificial intelligence

Illustrate master-slave flip-flop, Q. Illustrate Master-Slave Flip-Flop? ...

Q. Illustrate Master-Slave Flip-Flop? Master slave flip-flop comprise two flip-flops. One is master flip-flop and other one is known as slave flip-flop. Fig below shows impleme

Post interrupts - computer architecture, Post interrupts - computer archite...

Post interrupts - computer architecture: Post interrupts Exact interrupts examine interrupt bit on entering WB Longer latency Handle immediately

Explain about the term e-cash, Explain about the term E-Cash. E-cash is...

Explain about the term E-Cash. E-cash is cash demonstrated by two models. E-cash has one is on-line form of e-cash, that is introduced by DigiCash that permits for the completi

Define the term internet, Internet:  The Internet, an umbrella term cov...

Internet:  The Internet, an umbrella term cover countless network and services that comprise a super-network, is a global network of computer networks that was started in the 1

Show the bus and memory transfers, Q. Show the Bus and Memory Transfers? ...

Q. Show the Bus and Memory Transfers? A digital computer has many registers and rather than connecting wires amid all registers to transfer information between them a common bu

Accept commands from the user, Your shell must accept commands from the use...

Your shell must accept commands from the user. The first step to implement this will be reading a line of input. This section will focus on what to do with the line of input after

What is the purpose of guard bits, What is the purpose of guard bits used i...

What is the purpose of guard bits used in floating point operations? The guard bits are the extra bits which are used to retain the in-between steps to enhance the accuracy in

Arithmetic-logic section in computer system, Arithmetic-logic section in co...

Arithmetic-logic section in computer system: The   arithmetic-logic section performs arithmetic   operations, such subtraction, addition, multiplication, and division. Throug

Password cracking, Hashed strings can often be deciphered by 'brute forcing...

Hashed strings can often be deciphered by 'brute forcing'. Bad news, eh? Yes, and particularly if your encrypted passwords/usernames are floating around in an unprotected file some

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd