What search method would be most appropriate and why, Computer Engineering

Assignment Help:

(a) Describe fully in your own words the following terms:

(i) Turing Test
(ii) Agent
(iii) Utility-based agent

(b) A Mars rover has to leave the lander, collect rock samples from three places and return to the lander.

Consider that it has a navigation module that can take it directly from any place of interest to any other place of interest. So it has primitive actions: go-to-lander, go-to-rock-1, go-to-rock-2 and go-to-rock-3.

We know the time it takes to traverse between each pair of special locations. Our goal is to search a sequence of actions that will perform this task in the shortest amount of time.

(i) Formulate this problem as a search problem by specifying the state space, initial state, path-cost function and goal test. Try to be sure that the state space is detailed enough to support solving the problem but not redundant.

(ii) Say what search method would be most appropriate and why.

(iii) One possible heuristic evaluation function for a state would be the amount of time required for the robot to go back to the lander from the location of the state. Is this function admissible?


Related Discussions:- What search method would be most appropriate and why

Superscalar processors, Superscalar Processors In scalar processors, on...

Superscalar Processors In scalar processors, only one instruction is implemented per cycle. That means only single instruction is issued per cycle and only single instruction i

Designing logic circuits, When designing a logic circuit with multipleoutpu...

When designing a logic circuit with multipleoutputs it is usual to treat it as several circuitseach with one output. So for our example wewould design three circuits; one with outp

What are invisible components, They are light weight components that do no ...

They are light weight components that do no painting, but can take space in the GUI. This is mainly used for layout management.

Communication traffic and message queues, The Communication Traffic gives a...

The Communication Traffic gives a pictorial view of the communication traffic in the interconnection network with respect to the time in progress. The Communication Traffic shows t

Uniform memory access model (uma), Uniform Memory Access Model (UMA) In...

Uniform Memory Access Model (UMA) In this model, the main memory is uniformly shared by all processors in multiprocessor systems and each processor has equal access time to sha

What do you understand by work flow automation, What do you understand by w...

What do you understand by work flow automation? Work Flow Automation: Organizations often standardize processes over the organization and encourage users to adopt them. Ev

Flip flop., the counter shown Q2Q1Q0=000 The status of Q2Q1Q0 after the pul...

the counter shown Q2Q1Q0=000 The status of Q2Q1Q0 after the pulse

Explain the term - integrity, Explain the term - Integrity In most c...

Explain the term - Integrity In most cases, corporate data should remain unchanged by third parties, so the system should be capable of ensuring that only authorised personn

Uninformed search strategies - artificial intelligence, Uninformed Search S...

Uninformed Search Strategies: To be able to undertake an unaware search, there is really important that the entire agent needs to know is the primary state, then the possible

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd