Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)

(a) Assume that search tree has root A, which has children B, C, and D, that B has children E and F, that C has children G, H, I, and J, and that D has child K. Also, assume that nodes F and I are goal nodes.

i) Draw the search tree.

ii) What is the branching factor of node C?

iii) List the order in which the nodes are visited:

1) Breadth First Search

2) Depth First Search

3) Iterative Depth First Search

(b) Given the map of Romania in the given below and a list of admissible heuristic in the table below, apply the A* search algorithm to determine the path from Oradea to Bucharest.

1569_Heuristic diagram and list.jpg

problem 2)

(a) Differentiate between propositional logic and first-order logic.

(b) Use truth tables to verify the following equivalence:

(P v Q) v R ≡ P v (Q v R)

(c) Represent each of the following sentences in the first order logic

i. Aliens are red or green.

ii. At least one alien has spots.

(d) Given that the volume of a cylinder is given by . prepare a Prolog predicate which find outs the volume of the cylinder. The user should be able to input the value of the radius and height. The program must display the volume.

Sample run

Enter Radius: 4.
Enter Height: 5.
Volume of Cylinder: 251.32741228718345

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95798

Have any Question? 


Related Questions in Computer Engineering

1 some of the application programs can use the services of

1. Some of the application programs can use the services of two transport-layer protocols (UDP or TCP). When a packet arrives at the destination, how can the computer find which transport layer is involved? 2. A client r ...

A manchester signal has a data rate of 100 kbps using

A Manchester signal has a data rate of 100 Kbps. Using Figure 4.8, calculate the value of the normalized energy (P) for frequencies at 0 Hz, 50 KHz, 100 KHz.

Modify the hash table implementation so that it uses an

Modify the hash table implementation so that it uses an ArrayList to store the set members rather than a hash table. Compare the running times of the major operations of this implementation with those of the hash table i ...

1 what are the source and destination ip addresses in a

1. What are the source and destination IP addresses in a datagram that carries the ICMPv4 message reported by a router? 2. Explain why the registration request and reply are not directly encapsulated in an IP datagram. W ...

Assignmentpart 1 discussion points1 what are the steps for

Assignment Part 1: Discussion Points 1. What are the steps for designing a relational database from a domain class model? 2. What is the normalization process and the different normal forms? Why is normalization importan ...

1 which security protocols are used to protect e-mail2

1. Which security protocols are used to protect e-mail? 2. IPSec can be used in two modes. What are they? 3. Which kind of attack on cryptosystems involves using a collection of pre-identified terms? Which kind of attack ...

Search the web for security education and training programs

Search the Web for security education and training programs in your area. Keep a list and see which category has the most examples. See if you can determine the costs associated with each example. Which do you think woul ...

1 authentication using certi fi cates although considered

1. Authentication using certi fi cates, although considered safe, suffers from weaknesses. Discuss these weaknesses using speci fi c examples. 2. Kerberos and SSL are additional layers to enhance authentication. Detail h ...

1 the nrl classification scheme has three axes genesis time

1. The NRL classification scheme has three axes: genesis, time of introduction, and location. Name two other axes that would be of interest to an analyst. Justify your answer. 2. In the NRL classification scheme for the ...

For many years industries and financial institutions hired

For many years, industries and financial institutions hired people who broke into their systems once those people were released from prison. Now, such a conviction tends to prevent such people from being hired. Why you t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen