Specifying constraint problems, Computer Engineering

Assignment Help:

Specifying Constraint Problems:

However as with most successful "AI" techniques there constraint solving is all about solving problems as: somehow phrase the intelligent task you are interested in as a problem or then massage it into the format of a constraint satisfaction problem as CSP, put it through a constraint solver and see if you get a solution. Now here CSPs consist of the following parts as: 

  • There a set of variables is X = {x1, x2, ..., xn} and
  • There a finite set of values that each variable can take. This is known as the domain of the variable. In the domain of variable xi is written Di and
  • There a set of constraints that specifies that values the variables can take simultaneously.

Furthermore in the high-IQ problem above, there are 25 variables: one for each of the 24 smaller square lengths or one for the length of the big square. In fact if we say that the smallest square is of length 1 so the big square is perhaps of length at most 1000. Thus the variables can each take values in the range 1 to 1000. Hence there are many constraints in this problem that including the fact that each length is different and that certain ones add up to give other lengths and for example the lengths of the three squares along the top must add up to the length of the big square.


Related Discussions:- Specifying constraint problems

What are the advantages of open source system, What are the advantages of o...

What are the advantages of open source system? High-quality software Lesser hardware costs Integrated management No vendor lock-in Take control of our softwa

Don''t care states, The conflict between too hot and too cold or too slow a...

The conflict between too hot and too cold or too slow and too fast can be resolved using don't care states. Don't care states are used when i) the state of the output is not

Token packets - universal serial bus, Token packets in universal serial b...

Token packets in universal serial bus - computer architecture: Token packets consist of a PID byte followed by two payload bytes: a 5-bit CRC and 11 bits of address. Tokens

C, "Super ASCII", if it contains the character frequency equal to their asc...

"Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''a''-''z'') and the ascii values will starts from

Types of buses, different types of buses with diagram

different types of buses with diagram

What is soap and how does it relate to xml, The Simple Object Access Protoc...

The Simple Object Access Protocol (SOAP) uses XML to describe a protocol for the exchange of information in distributed computing environments. SOAP having of three components: an

What do you meant by erp, Question 1: What do you meant by ERP? What ar...

Question 1: What do you meant by ERP? What are the benefits of ERP? Definition of ERP Question 2: Describe briefly the advantages of the ERP. Explanation of six advanta

Explain debug monitors, Explain Debug monitors. Debug monitors give d...

Explain Debug monitors. Debug monitors give debugging support for a program. A debug monitor executes the program being debugged in its own control thereby giving execution e

Two independent mechanisms for controlling interrupt request, What are the ...

What are the two independent mechanisms for controlling interrupt request? At the device end, an interrupt enable bit in a control register verifies whether the device is permi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd