Static or dynamic - artificial intelligence, Computer Engineering

Assignment Help:

Static or Dynamic - artificial intelligence

An environment is static if it doesn't change while an agent's program is making the decision about how to act. When programming agents to performance in dynamic (non-static) environments, the underlying program may have to refer to the changing atmosphere while it deliberates, or to anticipate the change in the environment between the time when it arrives an input and when it has to react upon that. 

RHINO was very fast in making decision. However, because of the amount of visitor movement, by the time RHINO had planned a route, because plan was sometimes wrong because someone was now jamming the route. However, because of the speed of decision making, instead of referring to that environment during the planning process, as we have said before, the designers of RHINO chose to enable it to continually update its plan as it moved.


Related Discussions:- Static or dynamic - artificial intelligence

Create a social network application, A software development company wants t...

A software development company wants to create a social network application where users can post brief audio messages giving their thoughts. Each user of the application will ha

Timing in mpi program, Q. Timing in MPI program? MPI_Wtime ( ) returns ...

Q. Timing in MPI program? MPI_Wtime ( ) returns lapsed wall clock time in seconds because some random point in past. Elapsed time for program section is given by difference bet

Examples of artificial neural networks, Examples of artificial neural netwo...

Examples of artificial neural networks: Now here as an example consider a ANN that has been trained to learn the following rule categorising the brightness of 2x2 black and wh

Give a technical description of e-mail, E-mail system is mostly used for se...

E-mail system is mostly used for sending message electronically to group or individuals of individuals in inter and intra office environment. It needs networks to connect them. In

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Shm, composition of two shm in right angles to each other to havingg time p...

composition of two shm in right angles to each other to havingg time period in the ratio 1:2

Generic techniques developed - artificial intelligence, Generic Techniques ...

Generic Techniques Developed: In the pursuit of solutions to various problems in the above categories, various individual fundamental techniques have sprung up which have been

Determine reduced boolean equation and the karnaugh map, Determine reduced ...

Determine reduced Boolean equation and the Karnaugh Map? Illustration : Determine reduced Boolean equation and the Karnaugh Map for the truth table shown below:

Why do we need dma, Why do we need DMA? DMA is used to transfer the blo...

Why do we need DMA? DMA is used to transfer the block of data directly among an external device and the main memory without the continuous intervention by the processor.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd