Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer the following problems.

problem 1)

a) A useful analogy can be made between knowledge engineering and programming. Both activities can be seen as consisting of four steps. What are they?

b) Taking a grocery shopping domain as an ex, describe how you would break it down into smaller clusters of knowledge, work on each cluster separately and then examine how they fit together. One good way of decomposing the domain into clusters is to consider the tasks facing the agent. Give the name you would choose after dividing the domain into five clusters.

problem 2)

a) A famous problem in mathematics concerns colouring adjacent planar regions. Like cartographic maps, it is required that, whatever colours are actually used, no two adjacent regions may not have the same colour. Two regions are considered adjacent provided they share some boundary line segment. Consider the following map below.

i) Draw a graph to show how would you represent the said regions.

ii) prepare down a Prolog representation to represent your above information by unit clauses, or facts.

iii) How would you declare colourings for the regions in Prolog also using unit clauses.

iv) prepare Prolog definition of Conflictive colouring, meaning that two adjacent regions have the same colour.

v) prepare another version of “conflict? that has more logical parameters.

52_Cartographic maps.jpg

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95807

Have any Question? 


Related Questions in Computer Engineering

Compare and contrast routers switches and wireless access

Compare and contrast Routers, Switches and Wireless access points. Define each and explain how each would be interconnected in a network. Draw a network diagram illustrating how each device would be used to hook up a sma ...

This year our challenge will be based on the european

This year our challenge will be based on the European Soccer Database (https://www.kaggle.com/hugomathien/soccer). Judging criteria: Solutions will be judged by a panel of judges based on the responses to the two Challen ...

Explain the relationship between mps due forecast quantity

Explain the relationship between MPS, due, forecast quantity, and customer orders.

Assume you need to write and test a client-server

Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would choose for the client program? b. What is the range of port numbers you ...

Use the internet to research design flaws in cellular

Use the Internet to research design flaws in cellular networks that affect performance or security and find alternative designs that can improve capabilities. You can include anything in the cellular networks or smartpho ...

Dta interpretation research reportyour task write a

Data Interpretation Research Report Your task: Write a report on the statistical relationship that you find between the stock price of the company that you have been assigned and the following three variables: the FTSE, ...

Design and implement the bstbuild function which takes a

Design and implement the bstBuild() function, which takes a sequence of keys and builds a new search tree from those keys. For example, the function could be used to build the binary search tree in Figure 14.5.

The sieve of eratosthenes is an elegant algorithm for

The Sieve of Eratosthenes is an elegant algorithm for finding all of the prime numbers up to some limit n. The basic idea is to first create a list of numbers from 2 to n. The first number is removed from the list, and a ...

1 intrusion detection hybrids are getting better research

1. Intrusion detection hybrids are getting better. Research the products on the market and comment on them as far as their interfaces are concerned. 2. Discuss how exploits can be used to penetrate a network. Research an ...

How do screened host architectures for firewalls differ

How do screened host architectures for firewalls differ from screened subnet firewall architectures? Which of these offers more security for the information assets that remain on the trusted network? What a sacrificial h ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen