Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Completeness in search - artificial intelligence:

It's also importance trying to calculate the number of solutions to a problem, and the density of those solutions amongst the non solutions. In a search problem, there can be any number of solutions, and the problem specification can involve, finding some, finding just one or finding all the solutions. For example, imagine a military application searches for routes that an opponent might take. The question: "Can the opponent get from A to B" requires searching only one solution, whereas the question: "How many ways can the opponent get from A to B" will require the agent to find all the solutions.

When an agent is asked to search just one solution, we can frequently program it to prune its search space quite heavily, for example, govern out particular operators at particular times to be more efficient. However, this can also prune some of the solutions, so if our agent is asked to search all of them, the pruning has to be controlled so that we know that  pruned  areas  of  the  search  space  e  contain  no  solutions or  contain solutions which are repeated in another (non-pruned) part of the space.

If our search method is guaranteed to search all the solutions eventually, then we say that it is complete. Repeatedly, it is clear that all the solutions are in the search space, but in other cases, we have to prove this fact mathematically to be confident that our space is complete. A  complete  search problem is that - where the solution is

Surely it can take much time to find the solution, sometimes so long that the strategy is effectively useless. Some of the people use the word exhaustive when they describe complete searches, because the strategy exhausts  whole possibilities in the search space.

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9509887

Have any Question?


Related Questions in Computer Engineering

Case study 1 requirement analysis and gathering for the

Case Study 1: Requirement Analysis and Gathering for the State Firefighters Association Read the mini case on The State Firefighters Association located in Chapter 3 of the textbook and complete the assignment. Write a t ...

Explain the differences between working in the web based

Explain the differences between working in the web based version of Outlook in Office 365 to the desktop application version of Outlook.

Submit a proposal of your ideal computer-in narrative form

Submit a proposal of your "ideal" computer-in narrative form. Make sure to answer the following questions: • State the technical specifications of your ideal computer • What would you like your ideal computer to accompli ...

One of the issues in early virtualization use was slow

One of the issues in early virtualization use was slow performance due to translation of system commands. Which piece of computer hardware was revised to run hypervisors natively? Also There are three "families" of opera ...

What are the tax reforms included in the train lawhow would

What are the tax reforms included in the TRAIN law? How would it impact the bottom 60% of the households and the top 40% of the households? Lastly, how does the being proposed transfer scheme works? Source: https://opini ...

Small business e-commerce portalscheck out small business

Small Business e-Commerce Portals Check out Small Business Center and the other e-commerce portals mentioned. Then answer the questions. Note: Small Business Center and Entrabase.com are interesting sites that offer a wi ...

The root of the equation fx 0 is found by using the

The root of the equation f(x) = 0 is found by using the Newton-Raphson method. The initial estimate of the root is x0 = 3, f(3) = 5. The angle the line tangent to the function f(x) makes at x = 3 is 57 degrees with respe ...

Question 1 identify all the dfd data flow diagram elements

Question: 1. Identify all the DFD (data flow diagram) elements (Shostack, 2014, p.531.). 2. Identify all threat types to each element(Shostack, 2014, p.531.). 3. Identify threats (three or more), one each for data flow, ...

Question suppose a class car is a child of a class vehicle

Question : Suppose a class Car is a child of a class Vehicle. Suppose Vehicle and Car have methods Move(). Method Move() of the class Car calls method Move() of the class Vehicle(). Write the statement in Move() of the c ...

Do you need computers or information and communication

Do you need computers or information and communication technologies to store, organize, and manage data in organizations? Explain how the present day organizations in a developed country like the USA store and manage the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As