Reflex agent-artificial intelligence, Basic Computer Science

Assignment Help:

Reflex agent-Artificial Intelligence

If an agent decides and executes an action in response to a sensor input without consultation of its world, then it may be considered a reflex response. Humans flinch if they touch anything very hot, regardless of the specific social situation they are in, and this is obviously a reflex action. Likewise chess agents are programmed with lookup tables for endings and openings, so that they do not have to do any processing to select the right move, they simply look it up. In timed chess matches, this kind of reflex action must save several seconds to be used in more difficult situations later.

Unluckily, relying on lookup tables is an insensible way to program intelligent agents: a chess agent would need 35100 entries in this lookup table (noticeably more entries than there are atoms in the universe). And if we remember that the world of a chess agent consists of only thirty two pieces on sixty four squares, it's obvious that we need more intelligent means of selecting a rational action. For RHINO, it is not easy to identify any reflex actions. This is perhaps because performing an action without discussing   the world representation is potentially risky for RHINO, because people get everywhere, and museum exhibits are costly to replace if broken!

 


Related Discussions:- Reflex agent-artificial intelligence

What is raid?explain its levels, Question 1 What is fabric login and what ...

Question 1 What is fabric login and what are its functions Question 2 Explain how is IP SAN different from SAN Question 3 Discuss the product related to Fibre Channel Questio

Discuss the advantages and disadvantages of printed indexes, QUESTION 1 ...

QUESTION 1 Discuss the advantages and disadvantages of printed indexes. QUESTION 2 (i) The Library of Congress Subject Headings List and the Sears Subject Headings List

Introduction to FCB , There are two kinds of FCB, the normal, whose length...

There are two kinds of FCB, the normal, whose length is 37 bytes and the expanded one of 44 bytes. The FCB is created of data given by the programmer and by data which it takes dir

Server, Server In a network, the resources of computers comprising net...

Server In a network, the resources of computers comprising network are usually shareable. In fact, one of the main objectives of networking is to make the computing resources

Browser security, Browser Security: WWW is used for many applications ...

Browser Security: WWW is used for many applications today including Banking, reservation, trading,  e-commence and many such applications which require security and confidenti

C in, which one of the following is a valid identifier

which one of the following is a valid identifier

Flowchart, create a flowchart showing average score for the 3 quizzes assum...

create a flowchart showing average score for the 3 quizzes assume that there are 3 sections each having 5 students the only valid number to be entered is 1-100 for the quizzes shou

Programming, create a simple Visual Basic project

create a simple Visual Basic project

COMPUTER SYSTEM ARCHITECTURE, PLEASE HELP ME TO CONSTRUCT THE XOR GATE USIN...

PLEASE HELP ME TO CONSTRUCT THE XOR GATE USING ONLY NAND GATE

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd