Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)

(a) Assume that search tree has root A, which has children B, C, and D, that B has children E and F, that C has children G, H, I, and J, and that D has child K. Also, assume that nodes F and I are goal nodes.

i) Draw the search tree.

ii) What is the branching factor of node C?

iii) List the order in which the nodes are visited:

1) Breadth First Search

2) Depth First Search

3) Iterative Depth First Search

(b) Given the map of Romania in the given below and a list of admissible heuristic in the table below, apply the A* search algorithm to determine the path from Oradea to Bucharest.

1569_Heuristic diagram and list.jpg

problem 2)

(a) Differentiate between propositional logic and first-order logic.

(b) Use truth tables to verify the following equivalence:

(P v Q) v R ≡ P v (Q v R)

(c) Represent each of the following sentences in the first order logic

i. Aliens are red or green.

ii. At least one alien has spots.

(d) Given that the volume of a cylinder is given by . prepare a Prolog predicate which find outs the volume of the cylinder. The user should be able to input the value of the radius and height. The program must display the volume.

Sample run

Enter Radius: 4.
Enter Height: 5.
Volume of Cylinder: 251.32741228718345

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95798

Have any Question? 


Related Questions in Computer Engineering

Design and implement an algorithm that accepts as input an

Design and implement an algorithm that accepts as input an ordered list of search names. The task required is to establish and report the absence or presence of these search names in a second much longer ordered list.

1 although we discussed several sources of security threats

1. Although we discussed several sources of security threats, we did not exhaust all. There are many such sources. Name and discuss five. 2. We pointed out that the design philosophy of the Internet infrastructure was pa ...

First questionwhere would you like to be in 5 years 10

First Question Where would you like to be in 5 years, 10 years? What impact do you anticipate information assurance will play in your education and career? The self-reflection should be a minimum of 1 full page, Times Ne ...

Descriptionthis assignment will provide you with practice

Description This assignment will provide you with practice using arrays. Your job is to build a simple Recommender System, similar to the one that Netflix (an online movie-rental service) uses to recommend movies to cust ...

Data structures using java mid termq1 software engineers

Data structures using JAVA mid term Q1. Software engineers typically break the software development process into the following four phases: analysis, ____, implementation, testing and debugging. a. design b. requirements ...

The registration area has just opened at large convention

The registration area has just opened at large convention of building contractors in New York. There are 600 people arriving per hour (exponential interarrival times), and their cost of waiting in queue is valued at $40 ...

Write a c program that fills random squares of 3 by 3 with

Write a C++ program that fills random squares of 3 by 3, with unique numbers from 1 to 9, and tests if the generated matrix forms a Magic Squares. Your program should loop until  three magic squares  are generated and  p ...

What are the source and destination port numbers when an

What are the source and destination port numbers when an SNMP message carries one of the following PDUs? a. GetRequest b. Response c. Trap d. Report

A uniprocessor has an l1 and an l2 cache with no cache

A uniprocessor has an L1 and an L2 cache. With no cache misses, the processor achieves a CPI of 1. Suppose that in reality an L1 miss occurs every 50 cycles and that an L2 miss occurs every 500 cycles. The L1 miss penalt ...

1 design and implement a function to find all negative

1. Design and implement a function to find all negative values within a given list. Your function should return a new list containing the negative values. When does the worst case occur and what is the run time for that ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen