Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Representations/Languages Used:

Many people are taught "AI" with the opening line: "The three most important things in "AI" are  representation, representation and representation". While choosing the way of representing knowledge in "AI" programs will always be a key concern, many methods now have well-chosen ways to represent data which have been shown to be useful for that technique. Many of the problems machines are expected to solve will require extensive knowledge about the world. Among the things that "AI" needs to represent are: objects, properties, number of items, categories and relations between objects situations, actions and time causes and effects. Along the way, much research has been undertaken into discovering the best ways to represent certain types of knowledge. The way in which knowledge can be represented is often taken as another way to  characterize Artificial Intelligence.

Some general representation schemes include: 

  • First order logic
  • Higher order logic
  • Logic programs
  • Frames
  • Production Rules
  • Semantic Networks
  • Fuzzy logic
  • Bayes nets
  • Hidden Markov models
  • Neural networks
  • Strips
  • Computer simulation

A representation of "what exists" is an ontology (borrowing a word from traditional philosophy), of which the most general are known as upper auto logics. Some standard "AI" programming languages have been developed in order to build intelligent programs efficiently and robustly. That  include: 

  • Prolog
  • Lisp
  • ML

Note that other languages are used extensively to build "AI" programs, including:  

  • Perl
  • C++
  • Java
  • C

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9517199

Have any Question?


Related Questions in Computer Engineering

Reading the biographybook where the body meets memory by

Reading the Biography Book : "Where the Body Meets Memory" by David Mura Questions: On page 62 to 66, David Mura talked about an incident when he was in fifth grade. A bully called Mike Wrangel was trying to beat up anot ...

The formulas a rarr b and c and a rarr b and a rarr c are

The formulas A → (B ∧ C) and (A → B) ∧ (A → C) are logically equivalent. For this problem, you are going to prove that they are equivalent in two different ways. Prove that A → (B ∧ C) ≡ (A → B) ∧ (A → C) by writing two ...

Question you are responsible for purchasing equipment for a

Question : You are responsible for purchasing equipment for a small business that requires at least 6TB of reliable storage. Research and choose a SAN solution from a major vendor (Dell, HP, EMC, AMAZON etc.). List and d ...

Mark harris just received a cash gift from his grandfather

Mark Harris just received a cash gift from his grandfather. He plans to invest in a five-year bond issued by Cullumber Corp. that pays an annual coupon rate of 4.5 percent. If the current market rate is 7.50 percent, wha ...

Whats the relationship between organizational performance

What's the relationship between organizational performance and financial management practices. These include capital structure decision, investment appraisal techniques, dividend policy, working capital management and fi ...

Assignmentshalene kolchek bought a great lakes spa from val

Assignment Shalene Kolchek bought a Great Lakes Spa from Val Porter, a dealer who was selling spas at the state fair. Kolchek signed an installment contract. Porter then handed her the manufacturer's paperwork and arrang ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

Using a telephone survey of 400 randomly selected

Using a telephone survey of 400 randomly selected registered voters, he solicits both their party identification and whether or not they had read the newspaper that day. The results are displayed in the following cross-t ...

How can businesses use technology and relationships to

How can businesses use technology and relationships to reduce their environmental impact?

Question a swimmer is an athlete any athlete who

Question : A swimmer is an athlete. Any athlete, who participatedin the 2016 Summer Olympics and won a gold medal, was joyful. Any athlete, who is the world top athlete or a selected well-trained athlete, participatedin ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As