Search strategy-artificial intelligence, Basic Computer Science

Assignment Help:

Search strategy-artificial intelligence:

Soundness:

You  can hear  in  some  application domains  -  i.e.  automated  theorem proving - that a search is "sound and complete". Soundness in theorem proving means that the search to find a evidence will not succeed if you give it a wrong theorem to prove. In general, this extends to searching, where a search is unsound if it search a solution to a problem with no solution. This kind of unsound search cannot be the end of the world if you are only interested in using it for problems where you know there is a solution (and it performs well in finding this kind of solutions). Another kind of unsound search is when a search finds the wrong solution to a problem. It is  more  worrying  and  the  problem  will  probably  lie  with  the  goal  testing method.

Additional Knowledge in Search

The amount of extra knowledge available to your agent will affect how it performs. In  the  following  sections  of this  chapter,  we  will  look  at  uninformed  search strategy, where no additional knowledge is given, and heuristic searches, where any information about the goal, intermediate states and operators may be used to improve the efficiency of the search strategy.


Related Discussions:- Search strategy-artificial intelligence

Cmis, how much it cost for 8 week class

how much it cost for 8 week class

Hypertext transfer protocol (http), It's a common protocol or "language" co...

It's a common protocol or "language" computers use to "speak" to each other over the Web.

Analog transmission, Analog Transmission: In analog transmission, ther...

Analog Transmission: In analog transmission, there is a continuous up and down pattern. For example, one wave constitutes one cycle, which is measured in the unit called Hertz

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Cryptography, Question 1 Consider the one-time pad encryption scheme to e...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the ev

Neural Network, The following data set describes whether a given coordinate...

The following data set describes whether a given coordinate is on land owned by XX government. (x,y) | Class ------------------------ (1.5,6) | owned (2,5) | owned (3,4) | owned (

Java programming, Write a program that lets the user play the game Rock, Pa...

Write a program that lets the user play the game Rock, Paper, Scissors against the computer. The program should work as follows: ? When the program begins, the results of the prev

Specify the steps to creating a powerpoint presentation, FUNDAMENTALS OF CO...

FUNDAMENTALS OF COMPUTERS 1. Describe the importance of video in multimedia. What are some of the tips to keep in mind while making video for the web? 2. Specify the steps t

Give birth to new life forms, Give birth to new life forms A research ...

Give birth to new life forms A research of Artificial Life will definitely throw light on what it means for a complex application to be 'alive'. Moreover, ALife researchers th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd