Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1)a) What is Artificial Intelligence (AI)? Describe intelligence behaviours of an AI model with ex.

b) What is state space search of a problem? prepare state space search to solve water jug problem.

problem 2)a) Describe the working principles of forward and backward reasoning technique with suitable ex.

b) Consider the following sentences Marcus was a man. Marcus was a Pompeian. All Pompeians were Romans. Caesar was a ruler. All Pompeians were either loyal to Caesar or hated him. Everyone is loyal to someone. People only try to assassinate rulers they are not loyal to. Marcus tried to assassinate Caesar.

Convert the sentences into clause form.

c) Using above Axioms in clause form prove that Marcus hate Caesar using Resolution principle.

problem 3)a) Describe the drawbacks of using Hill climbing technique. prepare a Best – First search algorithm.

b) prepare Minimax search algorithm to solve two-player game problem. Describe the importance of ‘MiniMax’ in the algorithm.

problem 4)a) What is Resolution? Discuss the steps required to transform a sentence into clausal form with a suitable ex.

b) Describe modus ponens inference rule with ex, also prepare the truth table.

c) Consider the following facts:

i) There is a person who loves everyone in the world

ii) Everyone is at NUS and everyone is smart

iii) Everyone who loves Santa loves any reindeer.

Represent these facts in Predicate Logic.

problem 5)a) With an suitable ex, describe the knowledge representation scheme, which involves nodes and links between the nodes.

b) Describe Circumscription with suitable ex to deal with uncertainties in Non-Monotonic reasoning.

c) What is planning in the process of solving a problem?

problem 6)a) What are the basic objective and activities of an Expert System? Briefly describe each one of them.

b) Describe the importance of machine learning process in acquiring knowledge. Also, support appropriate real time ex.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96520

Have any Question? 

Related Questions in Computer Engineering

1 how would you fi x the false sharing issue that can

1. How would you fi x the false sharing issue that can occur? 2. Consider the following portions of two different programs running at the same time on four processors in a symmetric multicore processor (SMP). Assume that ...

A click counter is a small hand-held device that contains a

A click counter is a small hand-held device that contains a push button and a count display. To increment the counter, the button is pushed and the new count shows in the display. Clicker counters also contain a button t ...

1 list as many of the emergency agencies in your community2

1. List as many of the emergency agencies in your community. 2. Of these listed in (1) above, which are dealing with information security? 3. We pointed out that the development of a good disaster recovery plan requires ...

The 2-d array described in chapter 2 is a simple

The 2-D array described in Chapter 2 is a simple rectangular structure consisting of the same number of elements in each row. Other layouts are possible and sometimes required by problems in computer science. For example ...

1 what is information extortion describe how such an attack

1. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. 2. Why do employees constitute one of the greatest threats to information security? 3. What measures ...

1 on average how many requests are being processed at any

1. On average, how many requests are being processed at any given instant? 2. If move to an 8-core system, ideally, what will happen to the system throughput (i.e., how many queries/second will the computer process)? 3. ...

1 what is security auditing why is it necessary for system

1. What is security auditing? Why is it necessary for system security? 2. What are the differences between security monitoring and auditing? Which is better? 3. What is risk? What is the purpose of calculating risk when ...

Define the aspects of a swot analysis and how it can

Define the aspects of a SWOT analysis and how it can benefit a company.

Alice has a video clip that bob is interested in getting

Alice has a video clip that Bob is interested in getting; Bob has another video clip that Alice is interested in getting. Bob creates a web page and runs an HTTP server. How can Alice get Bob's clip? How can Bob get Alic ...

When installing utp cable for a horizotnal link it is very

When installing UTP cable for a horizotnal link, it is very important to minimize crosstalk. Explain what crosstalk is, why crosstalk can be a problem, and how it is minimized when terminating UTP cables.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro