Specifying constraint problems, Computer Engineering

Assignment Help:

Specifying Constraint Problems:

However as with most successful "AI" techniques there constraint solving is all about solving problems as: somehow phrase the intelligent task you are interested in as a problem or then massage it into the format of a constraint satisfaction problem as CSP, put it through a constraint solver and see if you get a solution. Now here CSPs consist of the following parts as: 

  • There a set of variables is X = {x1, x2, ..., xn} and
  • There a finite set of values that each variable can take. This is known as the domain of the variable. In the domain of variable xi is written Di and
  • There a set of constraints that specifies that values the variables can take simultaneously.

Furthermore in the high-IQ problem above, there are 25 variables: one for each of the 24 smaller square lengths or one for the length of the big square. In fact if we say that the smallest square is of length 1 so the big square is perhaps of length at most 1000. Thus the variables can each take values in the range 1 to 1000. Hence there are many constraints in this problem that including the fact that each length is different and that certain ones add up to give other lengths and for example the lengths of the three squares along the top must add up to the length of the big square.


Related Discussions:- Specifying constraint problems

Explain different parameter passing mechanisms to a function, What are the ...

What are the different parameter passing mechanisms to a function? The different parameter-passing mechanisms are given below: 1.   Call by value 2.   Call by value-resu

Explain working of bit serial associative processor, Q. Explain working of ...

Q. Explain working of Bit Serial Associative Processor? When associative processor accepts bit serial memory organization subsequently it is known as bit serial associative pr

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

What are the advantages of CMOS logic, What are the advantages of CMOS logi...

What are the advantages of CMOS logic Ans: Advantages of CMOS Logic: (i) The power dissipation is mini-mum of all the logic families (ii) LSI and VLSI are possible

What is xml, XML is the Extensible Markup Language. It betters the function...

XML is the Extensible Markup Language. It betters the functionality of the Web by letting you recognize your information in a more accurate, flexible, and adaptable way. It is e

What is the bios full form, BIOS - Basic Input Output System, Power On ...

BIOS - Basic Input Output System, Power On Self Test (POST) and Loading Bootloader from the Hard disk drive Boot Sector is being completed by BIOS. It started the system for

What is macro, A series of keystrokes and mouse clicks that can be abbrevia...

A series of keystrokes and mouse clicks that can be abbreviated into a one keystroke or mouse click.

How do subroutines help in program writing, How do subroutines help in prog...

How do subroutines help in program writing? Some of the significant characteristics of Subroutine that help in program writing are: A subroutine is named, each have a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd