SlideShare a Scribd company logo
Artificial Intelligence
(AI Study Material)
by Jay Nagar
Email: nagarjay007@gmail.com
Website: https://jaynagarblog.wordpress.com/
Call: 9601957620
What is artificial intelligence?
 AI refers to only a computer that is able to "seem"
intelligent by analyzing data and producing a response.
 The science and engineering of making intelligent
machines.
 This concept was founded on the belief that human
intelligence "can be so precisely described that a
machine can be made to simulate it."
 The central goals of AI research include reasoning,
knowledge, planning, learning, natural language
processing (communication), perception and the ability
to move and manipulate objects.
 The AI field is interdisciplinary, including computer
science,
mathematics, psychology, linguistics, philosophy and
neuroscience, as well as other specialized fields such as
State Space Representation and
Search
 In this section we examine the concept of a state space and the different
searches that can be used to explore the search space in order to find a
solution. Before an AI problem can be solved it must be represented as a state
space. The state space is then searched to find a solution to the problem. A
state space essentially consists of a set of nodes representing each state of the
problem, arcs between nodes representing the legal moves from one state to
another, an initial state and a goal state. Each state space takes the form of a
tree or a graph. Factors that determine which search algorithm or technique will
be used include the type of the problem and the how the problem can be
represented. Search techniques that will be examined in the course include:
• Depth First Search
• Depth First Search with Iterative Deepening
• Breadth First Search
• Best First Search
• Hill Climbing
• Branch and Bound Techniques
• A* Algorithm
Depth First Search
 Depth First Search One of the searches
that are commonly used to search a state
space is the depth first search. The depth
first search searches to the lowest depth
or ply of the tree. Consider the tree in
Figure. In this case the tree has been
generated prior to the search Each node
is not visited more than once.
 A depth first search of the this tree
produces: A, B, E, K, S, L ,T, F, M, C, G,
N, H, O, P, U, D, I, Q, J, R. Although in
this example the tree was generated first
and then a search of the tree was
conducted. However, often there is not
enough space to generate the entire tree
representing state space and then search
it. The algorithm presented below
conducts a depth first search and
Depth First Search with Iterative Deepening Algorithm
 Depth First Search with Iterative Deepening Iterative deepening involves
performing the depth first search on a number of different iterations with
different depth bounds or cutoffs. On each iteration the cutoff is increased
by one. There iterative process terminates when a solution path is found.
Iterative deepening is more advantageous in cases where the state space
representation has an infinite depth rather than a constant depth. The
state space is searched at a deeper level on each iteration. DFID is
guaranteed to find the shortest path. The algorithm does retain information
between iterations and thus prior iterations are “wasted”.
 Depth First Iterative Deepening Algorithm
procedure DFID (intial_state, goal_states)
begin
search_depth=1 while (solution path is not found)
begin
dfs(initial_state, goals_states) with a depth bound of search_depth
increment search_depth by 1
endwhile
end
Breadth First Search
 Breadth First Search The breadth first search visits
nodes in a left to right manner at each level of the tree.
Each node is not visited more than once. A breadth first
search of the tree in Figure 5.1. produces A, B, C, D, E,
F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U. Although in
this example the tree was generated first and then a
search of the tree was conducted. However, often there
is not enough space to generate the entire tree
representing state space and then search it. The
Bayesian network
 Inferring unobserved variables.
Because a Bayesian network is a
complete model for the variables
and their relationships, it can be
used to answer probabilistic
queries about them. ... This
process of computing the posterior
distribution of variables given
evidence is called probabilistic
inference.
 Bayesian probability is an
interpretation of the concept
of probability, in which, instead of
frequency or propensity of some
phenomenon, probability is
interpreted as reasonable
expectation representing a state of
knowledge or as quantification of a
Graphs v/s Trees
 If states in the solution space can be
revisited more than once a directed graph is
used to represent the solution space. In a
graph more than one move sequence can
be used to get from one state to another.
Moves in a graph can be undone. In a
graph there is more than one path to a goal
whereas in a tree a path to a goal is more
clearly distinguishable. A goal state may
need to appear more than once in a tree.
Search algorithms for graphs have to cater
for possible loops and cycles in the graph.
Trees may be more “efficient” for
representing such problems as loops and
cycles do not have to be catered for. The
entire tree or graph will not be generated.
Figure illustrates the both a graph a
representation of the same the states.
Travelling Salesmen Problem:
These characteristics are often used to
classify problems in AI:
 Decomposable to smaller or easier problems
 Solution steps can be ignored or undone
 Predictable problem universe
 Good solutions are obvious
 Uses internally consistent knowledge base
 Requires lots of knowledge or uses knowledge to
constrain solutions
 Requires periodic interaction between human and
computer
This is a variety of depth-first (generate - and - test) search. A feedback is used here to decide on the direction of
motion in the search space. In the depth-first search, the test function will merely accept or reject a solution. But
in hill climbing the test function is provided with a heuristic function which provides an estimate of how close a
given state is to goal state. The hill climbing test procedure is as follows :
1. General he first proposed solution as done in depth-first procedure. See if it is a solution. If so quit , else continue.
2. From this solution generate new set of solutions use , some application rules
3. For each element of this set
(i) Apply test function. It is a solution quit.
(ii) Else see whether it is closer to the goal state than the solution already generated. If yes, remember it else discard it.
4. Take the best element so far generated and use it as the next proposed solution. This step corresponds to move through the problem
space in the direction Towards the goal state.
5. Go back to step 2.
Sometimes this procedure may lead to a position, which is not a solution, but from which there is no move that improves things. This will
happen if we have reached one of the following three states.
(a) A "local maximum " which is a state better than all its neighbors , but is not better than some other states farther away. Local
maxim sometimes occur with in sight of a solution. In such cases they are called " Foothills".
(b) A "plateau'' which is a flat area of the search space, in which neighboring states have the same value. On a plateau, it is not
possible to determine the best direction in which to move by making local comparisons.
(c) A "ridge" which is an area in the search that is higher than the surrounding areas, but can not be searched in a
simple move.
To overcome theses problems we can:
(a) Back track to some earlier nodes and try a different direction. This is a good way of dealing with local maxim.
(b) Make a big jump an some direction to a new area in the search. This can be done by applying two more rules of the same rule several
times, before testing. This is a good strategy is dealing with plate and ridges.
Hill climbing becomes inefficient in large problem spaces, and when combinatorial explosion occurs. But it is a useful when combined with
other methods.
Hill Climbing Procedure:
The AO* ALGORITHM
The problem reduction algorithm we just described is a simplification of an algorithm
described in Martelli and Montanari, Martelli and Montanari and Nilson. Nilsson calls it the
AO* algorithm , the name we assume.
1. Place the start node s on open.
2. Using the search tree constructed thus far, compute the most promising solution tree T
3. Select a node n that is both on open and a part of T. Remove n from open and place it on
closed.
4. If n is a terminal goal node, label n as solved. If the solution of n results in any of n’s
ancestors being solved, label all the ancestors as solved. If the start node s is solved, exit
with success where T is the solution tree. Remove from open all nodes with a solved
ancestor.
5. If n is not a solvable node (operators cannot be applied), label n as unsolvable. If the start
node is labeled as unsolvable, exit with failure. If any of n’s ancestors become unsolvable
because n is, label them unsolvable as well. Remove from open all nodes with unsolvable
ancestors.
6. Otherwise, expand node n generating all of its successors. For each such successor
node that contains more than one sub problem, generate their successors to give individual
sub problems. Attach to each newly generated node a back pointer to its predecessor.
Compute the cost estimate h* for each newly generated node and place all such nodes that
do not yet have descendents on open. Next, recomputed the values of h* at n and each
ancestor of n.
7. Return to step 2.
A* Algorithm2.
A* algorithm: The best first search algorithm that was just presented is a simplification an
algorithm called A* algorithm which was first presented by HART.
Algorithm:
Step 1: put the initial node on a list start
Step 2: if (start is empty) or (start = goal) terminate search.
Step 3: remove the first node from the start call this node a
Step 4: if (a= goal) terminate search with success.
Step 5: else if node has successors generate all of them estimate the fitness number of the
successors by totaling the evaluation function value and the cost function value and sort
the fitness number.
Step 6: name the new list as start 1.
Step 7: replace start with start 1.
Step 8: go to step 2.
 A Heuristic technique helps in solving problems, even though there
is no guarantee that it will never lead in the wrong direction. There
are heuristics of every general applicability as well as domain
specific. The strategies are general purpose heuristics. In order to
use them in a specific domain they are coupler with some domain
specific heuristics. There are two major ways in which domain -
specific, heuristic information can be incorporated into rule-based
search procedure.
 - In the rules themselves
 - As a heuristic function that evaluates individual problem states and
determines how desired they are.
 A heuristic function is a function that maps from problem state
description to measures desirability, usually represented as number
weights. The value of a heuristic function at a given node in the
search process gives a good estimate of that node being on the
desired path to solution. Well designed heuristic functions can
provides a fairly good estimate of whether a path is good or not. ( "
The sum of the distances traveled so far" is a simple heuristic
function in the traveling salesman problem) . the purpose of a
heuristic function is to guide the search process in the most
profitable directions, by suggesting which path to follow first when
more than one path is available. However in many problems, the cost
of computing the value of a heuristic function would be more than
the effort saved in the search process. Hence generally there is a
trade-off between the cost of evaluating a heuristic function and the
HEURISTIC FUNCTIONS:
Tower of Honai Problem.?
Generate and Test Procedure
This is the simplest search strategy. It consists of the following
steps;
 1. Generating a possible solution for some problems; this means
generating a particular point in the problem space. For others it
may be generating a path from a start state.
 2. Test to see if this is actually a solution by comparing the
chosen point at
 the end point of the chosen path to the set of acceptable goal
states.
 3. If a solution has been found, quit otherwise return to step 1.
 The generate - and - Test algorithm is a depth first search
procedure because complete possible solutions are generated
before test. This can be implemented states are likely to appear
often in a tree; it can be implemented on a search graph rather
than a tree.
What is the difference between forward and backward chaining in artificial
intelligence?
An AI cannot give proofs somehow thinking and assuming meanings of statements. So to get the proofs there
are set of rules that are fixed for inference logic and within that fixed set of rules we have forward and
backward chaining.
Forward chaining.
It is also known as data driven inference technique.
Forward chaining matches the set of conditions and infer results from these conditions. Basically, forward
chaining starts from a new data and aims for any conclusion.
It is bottom up reasoning.
It is a breadth first search.
It continues until no more rules can be applied or some cycle limit is met.
For example: If it is cold then I will wear a sweater. Here “it is cold is the data” and “I will wear a sweater”is a
decision. It was already known that it is cold that is why it was decided to wear a sweater, This process is
forward chaining.
It is mostly used in commercial applications i.e event driven systems are common example of forward
chaining.
It can create an infinite number of possible conclusions.
Backward chaining.
It is also called as goal driven inference technique.
It is a backward search from goal to the conditions used to get the goal. Basically it starts from possible
conclusion or goal and aims for necessary data.
It is top down reasoning.
It is a depth first search.
It process operations in a backward direction from end to start, it will stop when the matching initial condition is
met.
For example: If it is cold then I will wear a sweater. Here we have our possible conclusion “I will wear a
 A technique to find a good solution to an optimization problem by trying random variations of the current
solution. A worse variation is accepted as the new solution with a probability that decreases as the
computation proceeds. The slower the cooling schedule, or rate of decrease, the more likely the
algorithm is to find an optimal or near-optimal solution.
 Simulated annealing is a generalization of a Monte Carlo method for examining the equations of state
and frozen states of n-body systems [Metropolis et al. 1953]. The concept is based on the manner in
which liquids freeze or metals recrystalize in the process of annealing. In an annealing process a melt,
initially at high temperature and disordered, is slowly cooled so that the system at any time is
approximately in thermodynamic equilibrium. As cooling proceeds, the system becomes more ordered
and approaches a "frozen" ground state at T=0. Hence the process can be thought of as an adiabatic
approach to the lowest energy state. If the initial temperature of the system is too low or cooling is done
insufficiently slowly the system may become quenched forming defects or freezing out in metastable
states (ie. trapped in a local minimum energy state).
 The original Metropolis scheme was that an initial state of a thermodynamic system was chosen at
energy E and temperature T, holding T constant the initial configuration is perturbed and the change in
energy dE is computed. If the change in energy is negative the new configuration is accepted. If the
change in energy is positive it is accepted with a probability given by the Boltzmann factor exp -(dE/T).
This processes is then repeated sufficient times to give good sampling statistics for the current
temperature, and then the temperature is decremented and the entire process repeated until a frozen
state is achieved at T=0.
 By analogy the generalization of this Monte Carlo approach to combinatorial problems is straight
forward [Kirkpatrick et al. 1983, Cerny 1985]. The current state of the thermodynamic system is
analogous to the current solution to the combinatorial problem, the energy equation for the
thermodynamic system is analogous to at the objective function, and ground state is analogous to the
global minimum. The major difficulty (art) in implementation of the algorithm is that there is no obvious
analogy for the temperature T with respect to a free parameter in the combinatorial problem.
Furthermore, avoidance of entrainment in local minima (quenching) is dependent on the "annealing
schedule", the choice of initial temperature, how many iterations are performed at each temperature,
and how much the temperature is decremented at each step as cooling proceeds.
 Simulated annealing has been used in various combinatorial optimization problems and has been
particularly successful in circuit design problems
Define simulated annealing?

More Related Content

What's hot

Control Strategies in AI
Control Strategies in AIControl Strategies in AI
Control Strategies in AI
Amey Kerkar
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
karthikaparthasarath
 
Search problems in Artificial Intelligence
Search problems in Artificial IntelligenceSearch problems in Artificial Intelligence
Search problems in Artificial Intelligence
ananth
 
Informed search
Informed searchInformed search
Informed search
Amit Kumar Rathi
 
State Space Search in ai
State Space Search in aiState Space Search in ai
State Space Search in ai
vikas dhakane
 
Problem Solving
Problem Solving Problem Solving
Problem Solving
Amar Jukuntla
 
Informed and Uninformed search Strategies
Informed and Uninformed search StrategiesInformed and Uninformed search Strategies
Informed and Uninformed search Strategies
Amey Kerkar
 
Ch2 3-informed (heuristic) search
Ch2 3-informed (heuristic) searchCh2 3-informed (heuristic) search
Ch2 3-informed (heuristic) search
chandsek666
 
Unification and Lifting
Unification and LiftingUnification and Lifting
Unification and Lifting
Megha Sharma
 
Problems, Problem spaces and Search
Problems, Problem spaces and SearchProblems, Problem spaces and Search
Problems, Problem spaces and Search
BMS Institute of Technology and Management
 
I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...
I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...
I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...
vikas dhakane
 
Example of iterative deepening search & bidirectional search
Example of iterative deepening search & bidirectional searchExample of iterative deepening search & bidirectional search
Example of iterative deepening search & bidirectional search
Abhijeet Agarwal
 
Hill climbing
Hill climbingHill climbing
Hill climbing
Mohammad Faizan
 
Inference in First-Order Logic
Inference in First-Order Logic Inference in First-Order Logic
Inference in First-Order Logic
Junya Tanaka
 
Uninformed Search technique
Uninformed Search techniqueUninformed Search technique
Uninformed Search technique
Kapil Dahal
 
AI Lecture 4 (informed search and exploration)
AI Lecture 4 (informed search and exploration)AI Lecture 4 (informed search and exploration)
AI Lecture 4 (informed search and exploration)
Tajim Md. Niamat Ullah Akhund
 
Simulated annealing
Simulated annealingSimulated annealing
Simulated annealing
Saravanan Natarajan
 
A* Search Algorithm
A* Search AlgorithmA* Search Algorithm
A* Search Algorithm
vikas dhakane
 
Uncertain Knowledge and Reasoning in Artificial Intelligence
Uncertain Knowledge and Reasoning in Artificial IntelligenceUncertain Knowledge and Reasoning in Artificial Intelligence
Uncertain Knowledge and Reasoning in Artificial Intelligence
Experfy
 
5 csp
5 csp5 csp
5 csp
Mhd Sb
 

What's hot (20)

Control Strategies in AI
Control Strategies in AIControl Strategies in AI
Control Strategies in AI
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
Search problems in Artificial Intelligence
Search problems in Artificial IntelligenceSearch problems in Artificial Intelligence
Search problems in Artificial Intelligence
 
Informed search
Informed searchInformed search
Informed search
 
State Space Search in ai
State Space Search in aiState Space Search in ai
State Space Search in ai
 
Problem Solving
Problem Solving Problem Solving
Problem Solving
 
Informed and Uninformed search Strategies
Informed and Uninformed search StrategiesInformed and Uninformed search Strategies
Informed and Uninformed search Strategies
 
Ch2 3-informed (heuristic) search
Ch2 3-informed (heuristic) searchCh2 3-informed (heuristic) search
Ch2 3-informed (heuristic) search
 
Unification and Lifting
Unification and LiftingUnification and Lifting
Unification and Lifting
 
Problems, Problem spaces and Search
Problems, Problem spaces and SearchProblems, Problem spaces and Search
Problems, Problem spaces and Search
 
I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...
I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...
I.INFORMED SEARCH IN ARTIFICIAL INTELLIGENCE II. HEURISTIC FUNCTION IN AI III...
 
Example of iterative deepening search & bidirectional search
Example of iterative deepening search & bidirectional searchExample of iterative deepening search & bidirectional search
Example of iterative deepening search & bidirectional search
 
Hill climbing
Hill climbingHill climbing
Hill climbing
 
Inference in First-Order Logic
Inference in First-Order Logic Inference in First-Order Logic
Inference in First-Order Logic
 
Uninformed Search technique
Uninformed Search techniqueUninformed Search technique
Uninformed Search technique
 
AI Lecture 4 (informed search and exploration)
AI Lecture 4 (informed search and exploration)AI Lecture 4 (informed search and exploration)
AI Lecture 4 (informed search and exploration)
 
Simulated annealing
Simulated annealingSimulated annealing
Simulated annealing
 
A* Search Algorithm
A* Search AlgorithmA* Search Algorithm
A* Search Algorithm
 
Uncertain Knowledge and Reasoning in Artificial Intelligence
Uncertain Knowledge and Reasoning in Artificial IntelligenceUncertain Knowledge and Reasoning in Artificial Intelligence
Uncertain Knowledge and Reasoning in Artificial Intelligence
 
5 csp
5 csp5 csp
5 csp
 

Similar to Artificial Intelligence

AI_03_Solving Problems by Searching.pptx
AI_03_Solving Problems by Searching.pptxAI_03_Solving Problems by Searching.pptx
AI_03_Solving Problems by Searching.pptx
Yousef Aburawi
 
Searching techniques
Searching techniquesSearching techniques
Searching techniques
Prof.Dharmishtha R. Chaudhari
 
AI: AI & problem solving
AI: AI & problem solvingAI: AI & problem solving
AI: AI & problem solving
Datamining Tools
 
(Radhika) presentation on chapter 2 ai
(Radhika) presentation on chapter 2 ai(Radhika) presentation on chapter 2 ai
(Radhika) presentation on chapter 2 ai
Radhika Srinivasan
 
State Space Representation and Search
State Space Representation and SearchState Space Representation and Search
State Space Representation and Search
Hitesh Mohapatra
 
Artificial intelligent Lec 3-ai chapter3-search
Artificial intelligent Lec 3-ai chapter3-searchArtificial intelligent Lec 3-ai chapter3-search
Artificial intelligent Lec 3-ai chapter3-search
Taymoor Nazmy
 
Artificial Intelligence_Searching.pptx
Artificial Intelligence_Searching.pptxArtificial Intelligence_Searching.pptx
Artificial Intelligence_Searching.pptx
Ratnakar Mikkili
 
AI_Lecture2.pptx
AI_Lecture2.pptxAI_Lecture2.pptx
AI_Lecture2.pptx
saadurrehman35
 
AI unit-2 lecture notes.docx
AI unit-2 lecture notes.docxAI unit-2 lecture notes.docx
AI unit-2 lecture notes.docx
CS50Bootcamp
 
Amit ppt
Amit pptAmit ppt
Amit ppt
amitp26
 
unit-1-l3.ppt
unit-1-l3.pptunit-1-l3.ppt
unit-1-l3.ppt
ssuserec53e73
 
unit-1-l3AI..........................ppt
unit-1-l3AI..........................pptunit-1-l3AI..........................ppt
unit-1-l3AI..........................ppt
ShilpaBhatia32
 
AI Lesson 04
AI Lesson 04AI Lesson 04
AI Lesson 04
Assistant Professor
 
problem solve and resolving in ai domain , probloms
problem solve and resolving in ai domain , problomsproblem solve and resolving in ai domain , probloms
problem solve and resolving in ai domain , probloms
SlimAmiri
 
02 problem solving_search_control
02 problem solving_search_control02 problem solving_search_control
02 problem solving_search_control
Praveen Kumar
 
Ai planning with evolutionary computing
Ai planning with evolutionary computingAi planning with evolutionary computing
Ai planning with evolutionary computing
pinozz
 
CptS 440 / 540 Artificial Intelligence
CptS 440 / 540 Artificial IntelligenceCptS 440 / 540 Artificial Intelligence
CptS 440 / 540 Artificial Intelligence
butest
 
AI(Module1).pptx
AI(Module1).pptxAI(Module1).pptx
AI(Module1).pptx
AnkitaVerma776806
 
Jarrar.lecture notes.aai.2011s.ch3.uniformedsearch
Jarrar.lecture notes.aai.2011s.ch3.uniformedsearchJarrar.lecture notes.aai.2011s.ch3.uniformedsearch
Jarrar.lecture notes.aai.2011s.ch3.uniformedsearch
PalGov
 
Lecture 3 Problem Solving.pptx
Lecture 3 Problem Solving.pptxLecture 3 Problem Solving.pptx
Lecture 3 Problem Solving.pptx
AndrewKuziwakwasheMu
 

Similar to Artificial Intelligence (20)

AI_03_Solving Problems by Searching.pptx
AI_03_Solving Problems by Searching.pptxAI_03_Solving Problems by Searching.pptx
AI_03_Solving Problems by Searching.pptx
 
Searching techniques
Searching techniquesSearching techniques
Searching techniques
 
AI: AI & problem solving
AI: AI & problem solvingAI: AI & problem solving
AI: AI & problem solving
 
(Radhika) presentation on chapter 2 ai
(Radhika) presentation on chapter 2 ai(Radhika) presentation on chapter 2 ai
(Radhika) presentation on chapter 2 ai
 
State Space Representation and Search
State Space Representation and SearchState Space Representation and Search
State Space Representation and Search
 
Artificial intelligent Lec 3-ai chapter3-search
Artificial intelligent Lec 3-ai chapter3-searchArtificial intelligent Lec 3-ai chapter3-search
Artificial intelligent Lec 3-ai chapter3-search
 
Artificial Intelligence_Searching.pptx
Artificial Intelligence_Searching.pptxArtificial Intelligence_Searching.pptx
Artificial Intelligence_Searching.pptx
 
AI_Lecture2.pptx
AI_Lecture2.pptxAI_Lecture2.pptx
AI_Lecture2.pptx
 
AI unit-2 lecture notes.docx
AI unit-2 lecture notes.docxAI unit-2 lecture notes.docx
AI unit-2 lecture notes.docx
 
Amit ppt
Amit pptAmit ppt
Amit ppt
 
unit-1-l3.ppt
unit-1-l3.pptunit-1-l3.ppt
unit-1-l3.ppt
 
unit-1-l3AI..........................ppt
unit-1-l3AI..........................pptunit-1-l3AI..........................ppt
unit-1-l3AI..........................ppt
 
AI Lesson 04
AI Lesson 04AI Lesson 04
AI Lesson 04
 
problem solve and resolving in ai domain , probloms
problem solve and resolving in ai domain , problomsproblem solve and resolving in ai domain , probloms
problem solve and resolving in ai domain , probloms
 
02 problem solving_search_control
02 problem solving_search_control02 problem solving_search_control
02 problem solving_search_control
 
Ai planning with evolutionary computing
Ai planning with evolutionary computingAi planning with evolutionary computing
Ai planning with evolutionary computing
 
CptS 440 / 540 Artificial Intelligence
CptS 440 / 540 Artificial IntelligenceCptS 440 / 540 Artificial Intelligence
CptS 440 / 540 Artificial Intelligence
 
AI(Module1).pptx
AI(Module1).pptxAI(Module1).pptx
AI(Module1).pptx
 
Jarrar.lecture notes.aai.2011s.ch3.uniformedsearch
Jarrar.lecture notes.aai.2011s.ch3.uniformedsearchJarrar.lecture notes.aai.2011s.ch3.uniformedsearch
Jarrar.lecture notes.aai.2011s.ch3.uniformedsearch
 
Lecture 3 Problem Solving.pptx
Lecture 3 Problem Solving.pptxLecture 3 Problem Solving.pptx
Lecture 3 Problem Solving.pptx
 

More from Jay Nagar

11 best tips to grow your influence youtube
11 best tips to grow your influence youtube11 best tips to grow your influence youtube
11 best tips to grow your influence youtube
Jay Nagar
 
Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022
Jay Nagar
 
What is Signature marketing
What is Signature marketingWhat is Signature marketing
What is Signature marketing
Jay Nagar
 
100+ Guest blogging sites list
100+ Guest blogging sites list100+ Guest blogging sites list
100+ Guest blogging sites list
Jay Nagar
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
Jay Nagar
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
Jay Nagar
 
On-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech JayOn-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech Jay
Jay Nagar
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
Jay Nagar
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
Jay Nagar
 
GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)
Jay Nagar
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
Jay Nagar
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
Jay Nagar
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
Jay Nagar
 
Python for beginners
Python for beginnersPython for beginners
Python for beginners
Jay Nagar
 
Earn Money from bug bounty
Earn Money from bug bountyEarn Money from bug bounty
Earn Money from bug bounty
Jay Nagar
 
Code smell & refactoring
Code smell & refactoringCode smell & refactoring
Code smell & refactoring
Jay Nagar
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar
 
Confidentiality using Symmetric Encryption
Confidentiality using Symmetric EncryptionConfidentiality using Symmetric Encryption
Confidentiality using Symmetric Encryption
Jay Nagar
 

More from Jay Nagar (20)

11 best tips to grow your influence youtube
11 best tips to grow your influence youtube11 best tips to grow your influence youtube
11 best tips to grow your influence youtube
 
Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022
 
What is Signature marketing
What is Signature marketingWhat is Signature marketing
What is Signature marketing
 
100+ Guest blogging sites list
100+ Guest blogging sites list100+ Guest blogging sites list
100+ Guest blogging sites list
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
On-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech JayOn-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech Jay
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
Python for beginners
Python for beginnersPython for beginners
Python for beginners
 
Earn Money from bug bounty
Earn Money from bug bountyEarn Money from bug bounty
Earn Money from bug bounty
 
Code smell & refactoring
Code smell & refactoringCode smell & refactoring
Code smell & refactoring
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 
Confidentiality using Symmetric Encryption
Confidentiality using Symmetric EncryptionConfidentiality using Symmetric Encryption
Confidentiality using Symmetric Encryption
 

Recently uploaded

Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 

Recently uploaded (20)

Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 

Artificial Intelligence

  • 1. Artificial Intelligence (AI Study Material) by Jay Nagar Email: nagarjay007@gmail.com Website: https://jaynagarblog.wordpress.com/ Call: 9601957620
  • 2. What is artificial intelligence?  AI refers to only a computer that is able to "seem" intelligent by analyzing data and producing a response.  The science and engineering of making intelligent machines.  This concept was founded on the belief that human intelligence "can be so precisely described that a machine can be made to simulate it."  The central goals of AI research include reasoning, knowledge, planning, learning, natural language processing (communication), perception and the ability to move and manipulate objects.  The AI field is interdisciplinary, including computer science, mathematics, psychology, linguistics, philosophy and neuroscience, as well as other specialized fields such as
  • 3. State Space Representation and Search  In this section we examine the concept of a state space and the different searches that can be used to explore the search space in order to find a solution. Before an AI problem can be solved it must be represented as a state space. The state space is then searched to find a solution to the problem. A state space essentially consists of a set of nodes representing each state of the problem, arcs between nodes representing the legal moves from one state to another, an initial state and a goal state. Each state space takes the form of a tree or a graph. Factors that determine which search algorithm or technique will be used include the type of the problem and the how the problem can be represented. Search techniques that will be examined in the course include: • Depth First Search • Depth First Search with Iterative Deepening • Breadth First Search • Best First Search • Hill Climbing • Branch and Bound Techniques • A* Algorithm
  • 4. Depth First Search  Depth First Search One of the searches that are commonly used to search a state space is the depth first search. The depth first search searches to the lowest depth or ply of the tree. Consider the tree in Figure. In this case the tree has been generated prior to the search Each node is not visited more than once.  A depth first search of the this tree produces: A, B, E, K, S, L ,T, F, M, C, G, N, H, O, P, U, D, I, Q, J, R. Although in this example the tree was generated first and then a search of the tree was conducted. However, often there is not enough space to generate the entire tree representing state space and then search it. The algorithm presented below conducts a depth first search and
  • 5. Depth First Search with Iterative Deepening Algorithm  Depth First Search with Iterative Deepening Iterative deepening involves performing the depth first search on a number of different iterations with different depth bounds or cutoffs. On each iteration the cutoff is increased by one. There iterative process terminates when a solution path is found. Iterative deepening is more advantageous in cases where the state space representation has an infinite depth rather than a constant depth. The state space is searched at a deeper level on each iteration. DFID is guaranteed to find the shortest path. The algorithm does retain information between iterations and thus prior iterations are “wasted”.  Depth First Iterative Deepening Algorithm procedure DFID (intial_state, goal_states) begin search_depth=1 while (solution path is not found) begin dfs(initial_state, goals_states) with a depth bound of search_depth increment search_depth by 1 endwhile end
  • 6. Breadth First Search  Breadth First Search The breadth first search visits nodes in a left to right manner at each level of the tree. Each node is not visited more than once. A breadth first search of the tree in Figure 5.1. produces A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U. Although in this example the tree was generated first and then a search of the tree was conducted. However, often there is not enough space to generate the entire tree representing state space and then search it. The
  • 7. Bayesian network  Inferring unobserved variables. Because a Bayesian network is a complete model for the variables and their relationships, it can be used to answer probabilistic queries about them. ... This process of computing the posterior distribution of variables given evidence is called probabilistic inference.  Bayesian probability is an interpretation of the concept of probability, in which, instead of frequency or propensity of some phenomenon, probability is interpreted as reasonable expectation representing a state of knowledge or as quantification of a
  • 8. Graphs v/s Trees  If states in the solution space can be revisited more than once a directed graph is used to represent the solution space. In a graph more than one move sequence can be used to get from one state to another. Moves in a graph can be undone. In a graph there is more than one path to a goal whereas in a tree a path to a goal is more clearly distinguishable. A goal state may need to appear more than once in a tree. Search algorithms for graphs have to cater for possible loops and cycles in the graph. Trees may be more “efficient” for representing such problems as loops and cycles do not have to be catered for. The entire tree or graph will not be generated. Figure illustrates the both a graph a representation of the same the states.
  • 10. These characteristics are often used to classify problems in AI:  Decomposable to smaller or easier problems  Solution steps can be ignored or undone  Predictable problem universe  Good solutions are obvious  Uses internally consistent knowledge base  Requires lots of knowledge or uses knowledge to constrain solutions  Requires periodic interaction between human and computer
  • 11. This is a variety of depth-first (generate - and - test) search. A feedback is used here to decide on the direction of motion in the search space. In the depth-first search, the test function will merely accept or reject a solution. But in hill climbing the test function is provided with a heuristic function which provides an estimate of how close a given state is to goal state. The hill climbing test procedure is as follows : 1. General he first proposed solution as done in depth-first procedure. See if it is a solution. If so quit , else continue. 2. From this solution generate new set of solutions use , some application rules 3. For each element of this set (i) Apply test function. It is a solution quit. (ii) Else see whether it is closer to the goal state than the solution already generated. If yes, remember it else discard it. 4. Take the best element so far generated and use it as the next proposed solution. This step corresponds to move through the problem space in the direction Towards the goal state. 5. Go back to step 2. Sometimes this procedure may lead to a position, which is not a solution, but from which there is no move that improves things. This will happen if we have reached one of the following three states. (a) A "local maximum " which is a state better than all its neighbors , but is not better than some other states farther away. Local maxim sometimes occur with in sight of a solution. In such cases they are called " Foothills". (b) A "plateau'' which is a flat area of the search space, in which neighboring states have the same value. On a plateau, it is not possible to determine the best direction in which to move by making local comparisons. (c) A "ridge" which is an area in the search that is higher than the surrounding areas, but can not be searched in a simple move. To overcome theses problems we can: (a) Back track to some earlier nodes and try a different direction. This is a good way of dealing with local maxim. (b) Make a big jump an some direction to a new area in the search. This can be done by applying two more rules of the same rule several times, before testing. This is a good strategy is dealing with plate and ridges. Hill climbing becomes inefficient in large problem spaces, and when combinatorial explosion occurs. But it is a useful when combined with other methods. Hill Climbing Procedure:
  • 12. The AO* ALGORITHM The problem reduction algorithm we just described is a simplification of an algorithm described in Martelli and Montanari, Martelli and Montanari and Nilson. Nilsson calls it the AO* algorithm , the name we assume. 1. Place the start node s on open. 2. Using the search tree constructed thus far, compute the most promising solution tree T 3. Select a node n that is both on open and a part of T. Remove n from open and place it on closed. 4. If n is a terminal goal node, label n as solved. If the solution of n results in any of n’s ancestors being solved, label all the ancestors as solved. If the start node s is solved, exit with success where T is the solution tree. Remove from open all nodes with a solved ancestor. 5. If n is not a solvable node (operators cannot be applied), label n as unsolvable. If the start node is labeled as unsolvable, exit with failure. If any of n’s ancestors become unsolvable because n is, label them unsolvable as well. Remove from open all nodes with unsolvable ancestors. 6. Otherwise, expand node n generating all of its successors. For each such successor node that contains more than one sub problem, generate their successors to give individual sub problems. Attach to each newly generated node a back pointer to its predecessor. Compute the cost estimate h* for each newly generated node and place all such nodes that do not yet have descendents on open. Next, recomputed the values of h* at n and each ancestor of n. 7. Return to step 2.
  • 13. A* Algorithm2. A* algorithm: The best first search algorithm that was just presented is a simplification an algorithm called A* algorithm which was first presented by HART. Algorithm: Step 1: put the initial node on a list start Step 2: if (start is empty) or (start = goal) terminate search. Step 3: remove the first node from the start call this node a Step 4: if (a= goal) terminate search with success. Step 5: else if node has successors generate all of them estimate the fitness number of the successors by totaling the evaluation function value and the cost function value and sort the fitness number. Step 6: name the new list as start 1. Step 7: replace start with start 1. Step 8: go to step 2.
  • 14.  A Heuristic technique helps in solving problems, even though there is no guarantee that it will never lead in the wrong direction. There are heuristics of every general applicability as well as domain specific. The strategies are general purpose heuristics. In order to use them in a specific domain they are coupler with some domain specific heuristics. There are two major ways in which domain - specific, heuristic information can be incorporated into rule-based search procedure.  - In the rules themselves  - As a heuristic function that evaluates individual problem states and determines how desired they are.  A heuristic function is a function that maps from problem state description to measures desirability, usually represented as number weights. The value of a heuristic function at a given node in the search process gives a good estimate of that node being on the desired path to solution. Well designed heuristic functions can provides a fairly good estimate of whether a path is good or not. ( " The sum of the distances traveled so far" is a simple heuristic function in the traveling salesman problem) . the purpose of a heuristic function is to guide the search process in the most profitable directions, by suggesting which path to follow first when more than one path is available. However in many problems, the cost of computing the value of a heuristic function would be more than the effort saved in the search process. Hence generally there is a trade-off between the cost of evaluating a heuristic function and the HEURISTIC FUNCTIONS:
  • 15. Tower of Honai Problem.?
  • 16.
  • 17. Generate and Test Procedure This is the simplest search strategy. It consists of the following steps;  1. Generating a possible solution for some problems; this means generating a particular point in the problem space. For others it may be generating a path from a start state.  2. Test to see if this is actually a solution by comparing the chosen point at  the end point of the chosen path to the set of acceptable goal states.  3. If a solution has been found, quit otherwise return to step 1.  The generate - and - Test algorithm is a depth first search procedure because complete possible solutions are generated before test. This can be implemented states are likely to appear often in a tree; it can be implemented on a search graph rather than a tree.
  • 18. What is the difference between forward and backward chaining in artificial intelligence? An AI cannot give proofs somehow thinking and assuming meanings of statements. So to get the proofs there are set of rules that are fixed for inference logic and within that fixed set of rules we have forward and backward chaining. Forward chaining. It is also known as data driven inference technique. Forward chaining matches the set of conditions and infer results from these conditions. Basically, forward chaining starts from a new data and aims for any conclusion. It is bottom up reasoning. It is a breadth first search. It continues until no more rules can be applied or some cycle limit is met. For example: If it is cold then I will wear a sweater. Here “it is cold is the data” and “I will wear a sweater”is a decision. It was already known that it is cold that is why it was decided to wear a sweater, This process is forward chaining. It is mostly used in commercial applications i.e event driven systems are common example of forward chaining. It can create an infinite number of possible conclusions. Backward chaining. It is also called as goal driven inference technique. It is a backward search from goal to the conditions used to get the goal. Basically it starts from possible conclusion or goal and aims for necessary data. It is top down reasoning. It is a depth first search. It process operations in a backward direction from end to start, it will stop when the matching initial condition is met. For example: If it is cold then I will wear a sweater. Here we have our possible conclusion “I will wear a
  • 19.  A technique to find a good solution to an optimization problem by trying random variations of the current solution. A worse variation is accepted as the new solution with a probability that decreases as the computation proceeds. The slower the cooling schedule, or rate of decrease, the more likely the algorithm is to find an optimal or near-optimal solution.  Simulated annealing is a generalization of a Monte Carlo method for examining the equations of state and frozen states of n-body systems [Metropolis et al. 1953]. The concept is based on the manner in which liquids freeze or metals recrystalize in the process of annealing. In an annealing process a melt, initially at high temperature and disordered, is slowly cooled so that the system at any time is approximately in thermodynamic equilibrium. As cooling proceeds, the system becomes more ordered and approaches a "frozen" ground state at T=0. Hence the process can be thought of as an adiabatic approach to the lowest energy state. If the initial temperature of the system is too low or cooling is done insufficiently slowly the system may become quenched forming defects or freezing out in metastable states (ie. trapped in a local minimum energy state).  The original Metropolis scheme was that an initial state of a thermodynamic system was chosen at energy E and temperature T, holding T constant the initial configuration is perturbed and the change in energy dE is computed. If the change in energy is negative the new configuration is accepted. If the change in energy is positive it is accepted with a probability given by the Boltzmann factor exp -(dE/T). This processes is then repeated sufficient times to give good sampling statistics for the current temperature, and then the temperature is decremented and the entire process repeated until a frozen state is achieved at T=0.  By analogy the generalization of this Monte Carlo approach to combinatorial problems is straight forward [Kirkpatrick et al. 1983, Cerny 1985]. The current state of the thermodynamic system is analogous to the current solution to the combinatorial problem, the energy equation for the thermodynamic system is analogous to at the objective function, and ground state is analogous to the global minimum. The major difficulty (art) in implementation of the algorithm is that there is no obvious analogy for the temperature T with respect to a free parameter in the combinatorial problem. Furthermore, avoidance of entrainment in local minima (quenching) is dependent on the "annealing schedule", the choice of initial temperature, how many iterations are performed at each temperature, and how much the temperature is decremented at each step as cooling proceeds.  Simulated annealing has been used in various combinatorial optimization problems and has been particularly successful in circuit design problems Define simulated annealing?