Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
3rd Edition
ISBN: 9780136042594
Author: Stuart Russell, Peter Norvig
Publisher: Prentice Hall
bartleby

Concept explainers

Question
Book Icon
Chapter 3, Problem 26E
Program Plan Intro

State space problem:

  • One general formulation of intelligent action is in terms of state space.
  • A state includes all the necessary information to predict the result of an action and to determine whether it is a target state.
  • The state-space search assumes that,
    • The agent knows the state space well and can observe the state in which it is.
    • The agent has a set of actions proven to have deterministic effects.
    • Several states are target/goal state, the agent wants to enter one of these target state and the agent may identify a target state.
    • A solution is a series of acts that will turn the agent in to a target state from its current state.

Branching factor:

  • The branching factor is the outdegree, the number of children at each node.
  • If the branching factor is not uniform, it is possible to calculate an average branching factor.
  • The average branching factor can be determined easily as the number of non-root nodes divided by the number of non-leaf nodes. Where the number of root node is determined by as the size of the tree, minus one.

Program Plan Intro

States:

  • The set of states forms a graph that connects two states when there is an operation that can be performed to turn the first state into the second.
  • A state includes all the necessary information to predict the result of an action and to determine whether it is a target state.

Program Plan Intro

c.

Breadth first search(BFS):

  • The breadth first search algorithm is the most commonly used algorithm to traverse on a graph.
  • In BFS, the traversing starts from a user selected node then traverse the graph layer wise for exploring the neighbour nodes. The neighbour nodes are the nodes that are directly connected to the source node. After this, move towards the next-level neighbour nodes.
  • The breadth first search algorithm has a strategy that it expands the root node first, then it expands the successor nodes of root, and then expands their successors and so on.
  • In BFS, the traversing done as follows,
    • First, go horizontally to visit all the nodes of current layer.
    • Move to the next layer.

Program Plan Intro

d.

Breadth first search(BFS):

  • The breadth first search algorithm is the most commonly used algorithm to traverse on a tree or a graph.
  • In BFS, the traversing starts from a user selected node then traverse the graph layer wise for exploring the neighbour nodes. The neighbour nodes are the nodes that are directly connected to the source node. After this, move towards the next-level neighbour nodes.
  • The breadth first search algorithm has a strategy that it expands the root node first, then it expands the successor nodes of root, and then expands their successors and so on.
  • In BFS, the traversing done as follows,
    • First, go horizontally to visit all the nodes of current layer.
    • Move to the next layer.

Explanation of Solution

e.

“Yes”, because “h = |u − x| + |v − y|” is Manhattan Distance Metric. The Manhattan Distance

 is admissible heuristic for the state (u,v).

Manhattan Distance Metric:

  • The Manhattan Distance is a metric in which the distance between two points is the sum of their Cartesian coordinates’ absolute differences...

Program Plan Intro

A* search algorithm:

  • The A* search algorithm is a search algorithm used to search a particular node of a graph.
  • A* algorithm is a variant of the best-first algorithm based on the use of heuristic methods to achieve optimality and completeness.
  • The algorithm A* is an example of a best-first search algorithm.
  • If a search algorithm has the property of optimality, it means that the best possible solution is guaranteed to be found. Here, the user wants the shortest path to the final state.

Program Plan Intro

Admissible heuristic:

  • In path related algorithms, it is said that a heuristic function is admissible if it never overestimates the cost of achieving the goal.
  • That is the cost of achieving the goal is not higher than the lowest possible cost from the current point of the route.
  • The estimated cost must always be lower than or equal to the actual cost of reaching the goal state in order for a heuristic to be admissible to the search problem.
  • The search algorithm uses the admissible heuristic to find the optimal path from the current node to the target node.

Program Plan Intro

Admissible heuristic:

  • In path related algorithms, it is said that a heuristic function is admissible if it never overestimates the cost of achieving the goal.
  • That is the cost of achieving the goal is not higher than the lowest possible cost from the current point of the route.
  • The estimated cost must always be lower than or equal to the actual cost of reaching the goal state in order for a heuristic to be admissible to the search problem.
  • The search algorithm uses the admissible heuristic to find the optimal path from the current node to the target node.

Blurred answer
Students have asked these similar questions
: The Multithreaded Cook In this lab, we'll practice multithreading. Using Semaphores for synchronization, implement a multithreaded cook that performs the following recipe, with each task being contained in a single Thread: 1. Task 1: Cut onions. a. Waits for none. b. Signals Task 4 2. Task 2: Mince meat. a. Waits for none b. Signals Task 4 3. Task 3: Slice aubergines. a. Waits for none b. Signals Task 6 4. Task 4: Make sauce. a. Waits for Task 1, and 2 b. Signals Task 6 5. Task 5: Finished Bechamel. a. Waits for none b. Signals Task 7 6. Task 6: Layout the layers. a. Waits for Task 3, and 4 b. Signals Task 7 7. Task 7: Put Bechamel and Cheese. a. Waits for Task 5, and 6 b. Signals Task 9 8. Task 8: Turn on oven. a. Waits for none b. Signals Task 9 9. Task 9: Cook. a. Waits for Task 7, and 8 b. Signals none At the start of each task (once all Semaphores have been acquired), print out a string of the task you are starting, sleep for 2-11 seconds, then print out a string saying that you…
Programming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4.…
using r language
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning