Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Reflexes - artificial intelligence:
If an agent decides upon and executes an action in response to a sensor input without consultation of its world, then this can be considered a reflex response. Humans flinch if they touch something very hot, regardless of the particular social situation they are in, and this is clearly a reflex action. Similarly, chess agents are programmed with important tables for openings and endings, so that they do not have to do any processing to choose the exact shift they simply look it up. In timed chess matches, this kind of reflex action might keep vital seconds to be used in more hard situations later.
Unfortunately, relying on lookup tables is not a sensible way to program intelligent an agents: a chess agent would need 35100 entries in its lookup table (considerably more entries than there are atoms in the universe). And if we remember that the world of a chess agent consists of only 32 pieces on 64 squares, it's obvious that we need more intelligent means of choosing a rational action.
For RHINO, it's tough to discover any reflex actions. This is probably because performing an action without consulting the world representation is potentially hazardous for RHINO, because people get everywhere, and museum exhibits are expensive to replace if broken or damage!!
Fuzzy set theory provides a means for modeling the kind of uncertainty associated with vagueness, with imprecision, and/or with a lack of information regarding a particular element
Q. What is Shift operation? Shift: Shift operation is employed for transfer of bits either to left or to right. It can be used to comprehend simple arithmetic operation or da
What are the attributes of a field that can be activated or deactivated during runtime? Input, Output, Mandatory, Active, Highlighted, Invisible.
Define bus A group of lines that serves as a connecting path for various devices is known as a bus.
MAC address helps in (A) multimedia access control. (B) media access control. (C) mobile access control. (D) master access point control Ans: MAC addr
Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound
Explain with the help of examples FIFO algorithms? FIFO policy: This policy easy removes pages in the order they arrived into the main memory. By using this policy we easily
Design a MOD-6 synchronous counter using J-K Flip-Flops. Ans: Design of Mod-6 Counter: To design the Mod-6 synchronous counter, contain six counter states (that is, from
The success of a system relies on the approach of building it. If development approach is right then system will work successfully. Figure below portrays a System Development Life
Task Gantt Task Gantt shows different tasks being performed it implies that numerous kind of activities by set of processors connected to parallel computer as displayed in Fi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd