
Artificial Intelligence: A Modern Approach
3rd Edition
ISBN: 9780136042594
Author: Stuart Russell, Peter Norvig
Publisher: Prentice Hall
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 3, Problem 26E
Program Plan Intro
State space problem:
- One general formulation of intelligent action is in terms of state space.
- A state includes all the necessary information to predict the result of an action and to determine whether it is a target state.
- The state-space search assumes that,
- The agent knows the state space well and can observe the state in which it is.
- The agent has a set of actions proven to have deterministic effects.
- Several states are target/goal state, the agent wants to enter one of these target state and the agent may identify a target state.
- A solution is a series of acts that will turn the agent in to a target state from its current state.
Branching factor:
- The branching factor is the outdegree, the number of children at each node.
- If the branching factor is not uniform, it is possible to calculate an average branching factor.
- The average branching factor can be determined easily as the number of non-root nodes divided by the number of non-leaf nodes. Where the number of root node is determined by as the size of the tree, minus one.
Program Plan Intro
States:
- The set of states forms a graph that connects two states when there is an operation that can be performed to turn the first state into the second.
- A state includes all the necessary information to predict the result of an action and to determine whether it is a target state.
Program Plan Intro
c.
Breadth first search(BFS):
- The breadth first search
algorithm is the most commonly used algorithm to traverse on a graph. - In BFS, the traversing starts from a user selected node then traverse the graph layer wise for exploring the neighbour nodes. The neighbour nodes are the nodes that are directly connected to the source node. After this, move towards the next-level neighbour nodes.
- The breadth first search algorithm has a strategy that it expands the root node first, then it expands the successor nodes of root, and then expands their successors and so on.
- In BFS, the traversing done as follows,
- First, go horizontally to visit all the nodes of current layer.
- Move to the next layer.
Program Plan Intro
d.
Breadth first search(BFS):
- The breadth first search algorithm is the most commonly used algorithm to traverse on a tree or a graph.
- In BFS, the traversing starts from a user selected node then traverse the graph layer wise for exploring the neighbour nodes. The neighbour nodes are the nodes that are directly connected to the source node. After this, move towards the next-level neighbour nodes.
- The breadth first search algorithm has a strategy that it expands the root node first, then it expands the successor nodes of root, and then expands their successors and so on.
- In BFS, the traversing done as follows,
- First, go horizontally to visit all the nodes of current layer.
- Move to the next layer.
Explanation of Solution
e.
“Yes”, because “h = |u − x| + |v − y|” is Manhattan Distance Metric. The Manhattan Distance
is admissible heuristic for the state (u,v).
Manhattan Distance Metric:
- The Manhattan Distance is a metric in which the distance between two points is the sum of their Cartesian coordinates’ absolute differences...
Program Plan Intro
A* search algorithm:
- The A* search algorithm is a search algorithm used to search a particular node of a graph.
- A* algorithm is a variant of the best-first algorithm based on the use of heuristic methods to achieve optimality and completeness.
- The algorithm A* is an example of a best-first search algorithm.
- If a search algorithm has the property of optimality, it means that the best possible solution is guaranteed to be found. Here, the user wants the shortest path to the final state.
Program Plan Intro
Admissible heuristic:
- In path related algorithms, it is said that a heuristic function is admissible if it never overestimates the cost of achieving the goal.
- That is the cost of achieving the goal is not higher than the lowest possible cost from the current point of the route.
- The estimated cost must always be lower than or equal to the actual cost of reaching the goal state in order for a heuristic to be admissible to the search problem.
- The search algorithm uses the admissible heuristic to find the optimal path from the current node to the target node.
Program Plan Intro
Admissible heuristic:
- In path related algorithms, it is said that a heuristic function is admissible if it never overestimates the cost of achieving the goal.
- That is the cost of achieving the goal is not higher than the lowest possible cost from the current point of the route.
- The estimated cost must always be lower than or equal to the actual cost of reaching the goal state in order for a heuristic to be admissible to the search problem.
- The search algorithm uses the admissible heuristic to find the optimal path from the current node to the target node.
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
: The Multithreaded Cook
In this lab, we'll practice multithreading. Using Semaphores for synchronization, implement a
multithreaded cook that performs the following recipe, with each task being contained in a single Thread:
1. Task 1: Cut onions.
a.
Waits for none.
b. Signals Task 4
2. Task 2: Mince meat.
a. Waits for none
b. Signals Task 4
3. Task 3: Slice aubergines.
a. Waits for none
b. Signals Task 6
4. Task 4: Make sauce.
a. Waits for Task 1, and 2
b. Signals Task 6
5. Task 5: Finished Bechamel.
a. Waits for none
b. Signals Task 7
6. Task 6: Layout the layers.
a.
Waits for Task 3, and 4
b. Signals Task 7
7. Task 7: Put Bechamel and Cheese.
a.
Waits for Task 5, and 6
b. Signals Task 9
8. Task 8: Turn on oven.
a.
Waits for none
b. Signals Task 9
9. Task 9: Cook.
a. Waits for Task 7, and 8
b.
Signals none
At the start of each task (once all Semaphores have been acquired), print out a string of the task you are
starting, sleep for 2-11 seconds, then print out a string saying that you…
Programming Problems
9.28
Assume that a system has a 32-bit virtual address with a 4-KB page size.
Write a C program that is passed a virtual address (in decimal) on the
command line and have it output the page number and offset for the
given address. As an example, your program would run as follows:
./addresses 19986
Your program would output:
The address 19986 contains:
page number = 4
offset = 3602
Writing this program will require using the appropriate data type to
store 32 bits. We encourage you to use unsigned data types as well.
Programming Projects
Contiguous Memory Allocation
In Section 9.2, we presented different algorithms for contiguous memory allo-
cation. This project will involve managing a contiguous region of memory of
size MAX where addresses may range from 0 ... MAX - 1. Your program must
respond to four different requests:
1. Request for a contiguous block of memory
2. Release of a contiguous block of memory
3. Compact unused holes of memory into one single block
4.…
using r language
Chapter 3 Solutions
Artificial Intelligence: A Modern Approach
Ch. 3 - Explain why problem formulation must follow goal...Ch. 3 - Prob. 2ECh. 3 - Prob. 3ECh. 3 - Prob. 4ECh. 3 - Prob. 5ECh. 3 - Prob. 6ECh. 3 - Prob. 8ECh. 3 - Prob. 9ECh. 3 - Prob. 10ECh. 3 - Prob. 11E
Ch. 3 - Prob. 12ECh. 3 - Prob. 13ECh. 3 - Prob. 14ECh. 3 - Prob. 15ECh. 3 - Prob. 16ECh. 3 - Prob. 17ECh. 3 - Prob. 18ECh. 3 - Prob. 20ECh. 3 - Prob. 21ECh. 3 - Prob. 22ECh. 3 - Trace the operation of A search applied to the...Ch. 3 - Prob. 24ECh. 3 - Prob. 25ECh. 3 - Prob. 26ECh. 3 - Prob. 27ECh. 3 - Prob. 28ECh. 3 - Prob. 29ECh. 3 - Prob. 31ECh. 3 - Prob. 32E
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Programming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4.…arrow_forwardusing r languagearrow_forwardWrite a function to compute a Monte Carlo estimate of the Beta(3, 3) cdf, and use the function to estimate F(x) for x = 0.1,0.2,...,0.9. Compare the estimates with the values returned by the pbeta function in R.arrow_forward
- You are given a class that processes purchases for an online store. The class receives calls to: • Retrieve the prices for items from a database • Record the sold items • Update the database • Refresh the webpage a. What architectural pattern is suitable for this scenario? Illustrate your answer by drawing a model for the solution, showing the method calls/events. b. Comment on how applying this pattern will impact the modifiability of the system. c. Draw a sequence diagram for the update operation.arrow_forwardThe images I have uploaded are the part 1 to 4 and questions below are continue on the questions uploaded 5. C++ Class Template with Method Stubs #pragma once #include <iostream> #include <string> #include <stdexcept> #include <vector> template <typename T> class HashTable { private: struct Entry { std::string key; T value; bool isOccupied; bool isDeleted; Entry() : key(""), value(), isOccupied(false), isDeleted(false) {} }; Entry* table; size_t capacity; size_t size; double loadFactorThreshold; size_t customHash(const std::string& key) const { size_t hash = 5381; for (char c : key) { hash = ((hash << 5) + hash) + c; } return hash; } size_t probe(const std::string& key, bool forInsert = false) const; void resize(); public: // Constructor HashTable(size_t initialCapacity = 101); // Big…arrow_forwardthis project is NOT for graded(marks) purposes, please help me with the introduction. give me answers for the project. i will include an image explaining everything about the project.arrow_forward
- Java Graphics (Bonus In this lab, we'll be practicing what we learned about GUIs, and Mouse events. You will need to implement the following: A GUI with a drawing panel. We can click in this panel, and you will capture those clicks as a Point (see java.awt.Point) in a PointCollection class (you need to build this). The points need to be represented by circles. Below the drawing panel, you will need 5 buttons: O о о ○ An input button to register your mouse to the drawing panel. A show button to paint the points in your collection on the drawing panel. A button to shift all the points to the left by 50 pixels. The x position of the points is not allowed to go below zero. Another button to shift all the points to the right 50 pixels. " The x position of the points cannot go further than the You can implement this GUI in any way you choose. I suggest using the BorderLayout for a panel containing the buttons, and a GridLayout to hold the drawing panel and button panels. Regardless of how…arrow_forwardalso provide the number of moves(actions) made at state A and moves(actions) made state B. INCLUDE Java program required(this question is not graded)arrow_forwardYou are given a class that processes purchases for an online store. The class receives calls to: • Retrieve the prices for items from a database • Record the sold items • Update the database • Refresh the webpage a. What architectural pattern is suitable for this scenario? Illustrate your answer by drawing a model for the solution, showing the method calls/events. b. Comment on how applying this pattern will impact the modifiability of the system. c. Draw a sequence diagram for the update operation.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Operations Research : Applications and AlgorithmsComputer ScienceISBN:9780534380588Author:Wayne L. WinstonPublisher:Brooks ColeFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- C++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningNew Perspectives on HTML5, CSS3, and JavaScriptComputer ScienceISBN:9781305503922Author:Patrick M. CareyPublisher:Cengage Learning

Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning