Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1)

(a) Assume that search tree has root A, which has children B, C, and D, that B has children E and F, that C has children G, H, I, and J, and that D has child K. Also, assume that nodes F and I are goal nodes.

i) Draw the search tree.

ii) What is the branching factor of node C?

iii) List the order in which the nodes are visited:

1) Breadth First Search

2) Depth First Search

3) Iterative Depth First Search

(b) Given the map of Romania in the given below and a list of admissible heuristic in the table below, apply the A* search algorithm to determine the path from Oradea to Bucharest.

1569_Heuristic diagram and list.jpg

problem 2)

(a) Differentiate between propositional logic and first-order logic.

(b) Use truth tables to verify the following equivalence:

(P v Q) v R ≡ P v (Q v R)

(c) Represent each of the following sentences in the first order logic

i. Aliens are red or green.

ii. At least one alien has spots.

(d) Given that the volume of a cylinder is given by . prepare a Prolog predicate which find outs the volume of the cylinder. The user should be able to input the value of the radius and height. The program must display the volume.

Sample run

Enter Radius: 4.
Enter Height: 5.
Volume of Cylinder: 251.32741228718345

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95798

Have any Question? 

Related Questions in Computer Engineering

Assignment 1system security certification and

Assignment 1 System Security Certification and Accreditation Becoming better acquainted with the history of accreditation and authorization has made you aware that you need to start planning tasks in order to complete a ...

1 write a deletion method for the redblack class that

1. Write a deletion method for the RedBlack class that adheres to the red-black rules. 2. Design and implement a program that compares AVL trees and red-black trees to skip lists. Which data structure performs the best?

1 design and implement a function that reverses the order

1. Design and implement a function that reverses the order of the items in a queue. Your solution may only use the operations defined by the Queue ADT, but you are free to use other data structures if necessary 2. Implem ...

An inverted page table can be used to further optimize

An inverted page table can be used to further optimize space and time. How many PTEs are needed to store the page table? Assuming a hash table implementation, what are the common case and worst case numbers of memory ref ...

1 distinguish between a getrequest pdu and a setrequest

1. Distinguish between a GetRequest PDU and a SetRequest PDU. 2. In SNMP, which of the following PDUs are sent from a client SNMP to a server SNMP? a. GetRequest b. Response c. Trap

Consider the following problem descriptionemployees receive

Consider the following problem description: Employees receive their biweekly paychecks. They are paid their hourly rates for each hour worked; however, if they worked more than 40 hours per week, they are paid at 150 per ...

1 consider the statement an individual threat agent like a

1. Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card n ...

A system allows the user to choose a password with a length

A system allows the user to choose a password with a length of one to eight characters, inclusive. Assume that 10,000 passwords can be tested per second. The system administrators want to expire passwords once they have ...

1 in what ways is network design an iterative process why

1. In what ways is network design an iterative process? Why does the need for network documentation arise in many phases of a network design project? 2. When responding to an RFP, why is it important to pay attention to ...

Apa fortmat - 300 words-nbspreferences pleasethe family

APA fortmat - 300 words-  references please. The Family Education Rights and Privacy Act (FERPA) was passed in 1974 to protect the privacy rights of students in higher education institutions. It is appropriate to mention ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro