Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1)a) What is Artificial Intelligence (AI)? Describe intelligence behaviours of an AI model with ex.

b) What is state space search of a problem? prepare state space search to solve water jug problem.

problem 2)a) Describe the working principles of forward and backward reasoning technique with suitable ex.

b) Consider the following sentences Marcus was a man. Marcus was a Pompeian. All Pompeians were Romans. Caesar was a ruler. All Pompeians were either loyal to Caesar or hated him. Everyone is loyal to someone. People only try to assassinate rulers they are not loyal to. Marcus tried to assassinate Caesar.

Convert the sentences into clause form.

c) Using above Axioms in clause form prove that Marcus hate Caesar using Resolution principle.

problem 3)a) Describe the drawbacks of using Hill climbing technique. prepare a Best – First search algorithm.

b) prepare Minimax search algorithm to solve two-player game problem. Describe the importance of ‘MiniMax’ in the algorithm.

problem 4)a) What is Resolution? Discuss the steps required to transform a sentence into clausal form with a suitable ex.

b) Describe modus ponens inference rule with ex, also prepare the truth table.

c) Consider the following facts:

i) There is a person who loves everyone in the world

ii) Everyone is at NUS and everyone is smart

iii) Everyone who loves Santa loves any reindeer.

Represent these facts in Predicate Logic.

problem 5)a) With an suitable ex, describe the knowledge representation scheme, which involves nodes and links between the nodes.

b) Describe Circumscription with suitable ex to deal with uncertainties in Non-Monotonic reasoning.

c) What is planning in the process of solving a problem?

problem 6)a) What are the basic objective and activities of an Expert System? Briefly describe each one of them.

b) Describe the importance of machine learning process in acquiring knowledge. Also, support appropriate real time ex.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96520

Have any Question? 

Related Questions in Computer Engineering

Explain how microsoft project enables you to track

Explain how Microsoft Project enables you to track dependencies across multiple projects and establish resource pools. Critique what might be some downsides to one program manager tracking several projects. What if one o ...

1 again based on 1 above is it possible to continue

1. Again based on 1 above, is it possible to continue operating a sensor network with a selected number of sensors taken out? Is it possible to identify those nodes? 2. Devise ways (some cryptographic) of securing wirele ...

A babysitter charges 250 an hour until 900 pm when the rate

A babysitter charges $2.50 an hour until 9:00 PM when the rate drops to $1.75 an hour (the children are in bed). Write a program that accepts a starting time and ending time in hours and minutes and calculates the total ...

With the sun directly overhead an airplane takes off at a

With the sun directly overhead, an airplane takes off at a speed S of 226 mph at an angle θ of 16° above the horizontal. How fast is the airplane's shadow moving along the runway?

Writenbspa java program non-gui preferred to demonstrate

Write  a Java program (non-GUI preferred) to demonstrate the use of JDBC. The program should allow a user to do the following: Write a list of animal and its characteristics to a database using JDBC Display the character ...

Note solving this problem is best done with use of

(Note: solving this problem is best done with use of probability through the level of Markov chains.) You are designing a computer system to control the power grid for the Northeastern United States. If your system goes ...

Compare and discuss ipv4 and ipv6 in terms of their

Compare and discuss IPv4 and IPv6 in terms of their security advantages on the Internet.

1 discuss several ways to prevent node capture in sensor

1. Discuss several ways to prevent node capture in sensor networks. 2. Encryption is very difficult to implement in sensor networks. However, there have been several papers exploring limited ways of doing this. Look for ...

1 list and define the factors that are likely to shift in

1. List and define the factors that are likely to shift in an organization's information security environment. 2. Who decides if the information security program can adapt to change adequately? 3. List and briefly descri ...

1 can we have a data-transfer connection without a control

1. Can we have a data-transfer connection without a control connection in FTP? Explain. 2. Assume we need to download an audio using FTP. What file type should we specify in our command? 3. Both HTTP and FTP can retrieve ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen