Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)

(a) Assume that search tree has root A, which has children B, C, and D, that B has children E and F, that C has children G, H, I, and J, and that D has child K. Also, assume that nodes F and I are goal nodes.

i) Draw the search tree.

ii) What is the branching factor of node C?

iii) List the order in which the nodes are visited:

1) Breadth First Search

2) Depth First Search

3) Iterative Depth First Search

(b) Given the map of Romania in the given below and a list of admissible heuristic in the table below, apply the A* search algorithm to determine the path from Oradea to Bucharest.

1569_Heuristic diagram and list.jpg

problem 2)

(a) Differentiate between propositional logic and first-order logic.

(b) Use truth tables to verify the following equivalence:

(P v Q) v R ≡ P v (Q v R)

(c) Represent each of the following sentences in the first order logic

i. Aliens are red or green.

ii. At least one alien has spots.

(d) Given that the volume of a cylinder is given by . prepare a Prolog predicate which find outs the volume of the cylinder. The user should be able to input the value of the radius and height. The program must display the volume.

Sample run

Enter Radius: 4.
Enter Height: 5.
Volume of Cylinder: 251.32741228718345

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95798

Have any Question? 


Related Questions in Computer Engineering

Consider a complex signal composed of a dc term and two

Consider a complex signal composed of a dc term and two complex exponentials Plot each N-point DFT as a function of frequency fk = k/N. (a) Compute and plot the DFT of x[n] using 20 samples (0 ≤ n ≤ 19). From the plot, c ...

1 write down the bit pattern in the fraction assuming a

1. Write down the bit pattern in the fraction assuming a floating point format that uses Binary Coded Decimal (base 10) numbers in the fraction instead of base 2. Assume there are 24 bits, and you do not need to normaliz ...

Provide a concrete example selected from media reports or

Provide a concrete example, selected from media reports or your personal experiences, in which attackers compromised a system by exploiting something other than the weakest link. Describe the system, describe what you vi ...

Design an algorithm that reads lines of text reformats it

Design an algorithm that reads lines of text, reformats it and writes it out in pages of two columns (each forty characters wide) separated by a 10-space gap. The first column of the output should correspond to the first ...

Write a program to plot a horizontal bar chart of student

Write a program to plot a horizontal bar chart of student exam scores. Your program should get input from a file. The first line of the file contains the count of the number of students in the file, and each subsequent l ...

Assignmentpart ithis assignment requires you to write a

Assignment Part I This assignment requires you to write a paper to discuss your experience of human-computer interface. This paper should cover but not limited to topics such as what features you find are most user frien ...

1 for each of the major types of information security job

1. For each of the major types of information security job titles covered in the chapter, list and describe the criteria used for selection. 2. What are some of the factors that influence an organization's information se ...

Make a bar chart to plot the following data set label each

Make a bar chart to plot the following data set. Label each bar. Make the bars horizontal for easier labeling Provide a class BarChartViewer and a class BarChartComponent.

1 design and implement a function to find all negative

1. Design and implement a function to find all negative values within a given list. Your function should return a new list containing the negative values. When does the worst case occur and what is the run time for that ...

In practice the short exponents e 3 17 and 216 1 are

In practice the short exponents e = 3, 17 and 216 +1 are widely used. 1. Why can't we use these three short exponents as values for the exponent d in applications where we want to accelerate decryption? 2. Suggest a mini ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro