Ask Question, Ask an Expert


Ask Computer Engineering Expert

Answer the following problems.

problem 1)

a) A useful analogy can be made between knowledge engineering and programming. Both activities can be seen as consisting of four steps. What are they?

b) Taking a grocery shopping domain as an ex, describe how you would break it down into smaller clusters of knowledge, work on each cluster separately and then examine how they fit together. One good way of decomposing the domain into clusters is to consider the tasks facing the agent. Give the name you would choose after dividing the domain into five clusters.

problem 2)

a) A famous problem in mathematics concerns colouring adjacent planar regions. Like cartographic maps, it is required that, whatever colours are actually used, no two adjacent regions may not have the same colour. Two regions are considered adjacent provided they share some boundary line segment. Consider the following map below.

i) Draw a graph to show how would you represent the said regions.

ii) prepare down a Prolog representation to represent your above information by unit clauses, or facts.

iii) How would you declare colourings for the regions in Prolog also using unit clauses.

iv) prepare Prolog definition of Conflictive colouring, meaning that two adjacent regions have the same colour.

v) prepare another version of “conflict? that has more logical parameters.

52_Cartographic maps.jpg

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95807

Have any Question? 

Related Questions in Computer Engineering

1 a client uses udp to send data to a server the data

1. A client uses UDP to send data to a server. The data length is 16 bytes. Calculate the efficiency of this transmission at the UDP level (ratio of useful bytes to total bytes). 2. The following is a dump (contents) of ...

Part a - complete the diagramsreview the activity diagram

Part A - Complete the diagrams Review the activity diagram and Use Case description documents. Both of these are partially completed. By analyzing them together, you can fill in the missing pieces to complete the diagram ...

1 although we discussed several sources of security threats

1. Although we discussed several sources of security threats, we did not exhaust all. There are many such sources. Name and discuss five. 2. We pointed out that the design philosophy of the Internet infrastructure was pa ...

Design the following functions and call them in main1 int

Design the following functions and call them in Main 1) int get_student_data(void): This function asks the user to enter the student ID, Quiz, Test, Recitation, Final scores etc and prints them in a file "Stu_score.txt". ...

Library research assignmentintroductionyou are to complete

Library Research Assignment Introduction You are to complete a research assignment during weeks 6-7, after a Librarian visits the class and shows various research strategies and tools during a one hour long class present ...

Assignment classication trees1 introductiona classification

Assignment: Classi?cation trees 1. Introduction A classification tree is used for classifying inputs into one of several categories. Each node in the classification tree consists of a criterion that is applied to the inp ...

1 write a program that allows the user to specify a circle

1. Write a program that allows the user to specify a circle by typing the radius in a JOptionPane and then clicking on the center. Note that you don't need a "Draw" button. 2. Write a program that allows the user to spec ...

Implement the bankers algorithm- needed before the end of

Implement the Banker's algorithm- needed before the end of today Implement the Banker's algorithm for deadlock avoidance, that works on a given set of N processes and M resource types (N The input data and result is then ...

1 how does a vlan save a company time and money2 how does a

1. How does a VLAN save a company time and money? 2. How does a VLAN provide extra security for a network? 3. How does a VLAN reduce network traffic? 4. What is the basis for membership in a VLAN?

Keeping the iv secret in ofb mode does not make an

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext  Descr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro