Give the initial state, goal test, successor function, and cost function for each of the following. Choose a formulation that is precise enough to be implemented. a. You have to color a planar map...
Give the name of the algorithm those results from each of the following special cases: a. Local beam search with k = 1. b. Local beam search with one initial state and no limit on the number of...
Explain why it is a good heuristic to choose the variable that is most constrained, but the value that is 1act constraining in a CSP search
What is the worst-case complexity of running AC-3 on a tree-structured CSP?
Consider a vocabulary with only four propositions, A, B, C, and D. How many models are there for the following sentences? a. (A AB) V (B C) b. A V B c. A B C
Decide whether each of the following sentences is valid, un-satisfiable, or neither. Verify your decisions using truth tables or the equivalence rules of Figure. a. Smoke Smoke b. Smoke Fire c....
Is the sentence x, y x = y valid? Explain.
Consider a symbol vocabulary that contains c constant symbols, predicate symbols of each arity k, and fk function symbols of each arity k, where 1 k A. Let the domain size be fixed at D. For any...
Write down logical representations for the following sentences, suitable for use with Generalized Modus Ponens: a. Horses, cows and pigs arc mammals. b. An offspring of a horse is a horse. c....
In this question we will use the sentences you wrote in Exercise 9.9 to answer a question using a backward-chaining algorithm. a. Draw the proof tree generated by an exhaustive backward-chaining...
In this exercise, we will look at sorting in Prolog. a. Write Prolog clauses that define the predicate sorted (L), which is true if and only if list L is sorted in ascending order. b. Write a Prolog...
Investigate ways to extend the event calculus to handle simultaneous events. Is it possible to avoid a combinatorial explosion of axioms?
Here are two sentences in the language of first-order logic: a. Assume that the variables range over all the natural numbers 0, 1, 2, . . , and that > predicate means is greater than or equal to....
Explain why dropping negative effects from every action schema in a STRIPS problem results in a relaxed problem.
A complete solution to the problem of inexact matches to the buyers description in shopping is very difficult and requires a full array of natural language processing and information retrieval...
Recall that inheritance information in semantic networks can be captured logically by suitable implication sentences. In this exercise, we will consider the efficiency of using such sentences for...
Conditional effects were illustrated for the Suck action in the vacuum worldwhich square becomes clean depends on which square the robot is in. Can you think of a new set of propositional variables...
The following quotes are from the backs of shampoo bottles. Identify each as an unconditional, conditional, or execution monitoring plan. (a) Lather, Rinse, Repeat, (b) Apply shampoo to scalp and let...
Consider the following problem: A patient arrives at the doctors office with symptoms that could have been caused either by dehydration or by disease D (but not both). There are two possible actions:...
It is quite often useful to consider the effect of some specific propositions in the context of some general background evidence that remains fixed, rather than in the complete absence of...
Consider the following argument: In a framework that allows uncertain initial stares, disjunctive effects are just a notational convenience, not a source of additional representational power. For any...
Calculate the most probable path through the HMM in Figure for the output sequence [C1, C2, C3, C4, C4, C6, and C 7]. Also give itsprohahi1ity Phone HMM for [m]: 0.3 0.9 0.4 (0.7 0.1 0.6 FINAL Onset...
Assess your own utility for different incremental amounts of money by running a series of preference tests between some definite amount M1 and a lottery [p, M2; (1p), 0]. Choose different values of...
Write a computer program to automate the process in Exercise 16.4. Try your program out on several people of different net worth and political outlook. Comment on the consistency of your results,...
Can any finite search problem be translated exactly into a Markov decision problem such that an optimal solution of the latter is also an optimal solution of the former? If so, explain precisely how...
Consider an undiscounted MDP having three states, (1, 2, 3), with rewards 1, 2, 0 respectively. State 3 is a terminal stale. In states I and 2 there are two possible actions: a and b. The transition...
Solve the game of three-finger Morra.
Prior to 1999, teams in the National Hockey League received 2 points for a win, 1 for a tie, and 0 for a loss. Is this a constant-sum game? In 1999, the rules were amended so that a team receives 1...
The following payoff matrix, from Blinder (1983) by way of Bernstein (1996), shows a game between politicians and the Federal Reserve. Politicians can expand or contract fiscal policy, while the Fed...
Suppose that an attribute splits the set of examples E into subsets E i and that each subset has p, positive examples and n negative examples. Show that the attribute has strictly positive...
Show, by translating into conjunctive normal form and applying resolution, that the conclusion drawn concerning Brazilians is sound.
Fill in the missing values for the clauses C1 or C2 (or both) in the following sets of clauses, given that C is the re solvent of C1 and C2: a. C = True P (A, B), C1 = P (x, y) Q(x, y), C2 =?? b. C...
Suppose one writes a logic program that carries out a resolution inference step. That is, let Resolve (c1, c2, c) succeed if c is the result of resolving cl and c2. Normally Resolve would be used as...
Suppose that FOIL is considering adding a literal to a clause using a binary predicate P and those previous literals (including the head of the clause) contain five different variables. a. How many...
This exercise investigates properties of the Beta distribution defined in Equation (20.6). a. Dy integrating over the range [0, 1], show that the normalization constant for the distribution beta [a,...
Implement a data structure for layered, feed-forward neural networks, remembering to provide the information needed for both forward evaluation and backward propagation. Using this data structure,...
Consider the application of EM to learn the parameters for the network in Figure (a), given the true parameters in Equation (20.7). a. Explain why the EM algorithm would not work if there were just...
Suppose that a training set contains only a single example, repeated 100 times. In 80 of the 100 cases, the single output value is I; in the other 20, it is 0. What will a back- propagation network...
How can the value determination algorithm be used to calculate the expected loss experienced by an agent using a given set of utility estimates U and an estimated model M, compared with an agent...
Write out the parameter update equations for TD learning with U (x, y) = 0 + 1x + 2y + 3 (x - xg) 2 + (y - y g) 2.
Extend the standard game-playing environment to incorporate a reward signal. Put two reinforcement learning agents into the environment (they may, of course, share the agent program) and have them...
Describe a technique you use to make sure you get assignments done on time. What are some tools you use with the technique?
The chapter identified six areas of project feasibility that need to be evaluated for any new project. However, as indicated, each of these areas of feasibility can also be considered an evaluation...
Develop an activity diagram based on the following narrative. Note any ambiguities or questions that you have as you develop the model. If you need to make assumptions, also note them. The purpose of...
What are the advantages of purchasing a packaged solution? What are the disadvantages or dangers?
Describe how structure charts for three-layer architecture are different from those for all-encompassing programs that execute on a single computer system.
What is the difference between doing design with CRC cards and designing with sequence diagrams?
Given the following narrative, do the following: a. Develop an activity diagram for each scenario, and b. Complete a fully developed use case description for each scenario. Quality Building Supply...
1. Refine and extend the domain model class diagram you developed in Chapter 5 as necessary. 2. Develop a use case diagram. Base it directly on the event table you created for Chapter 5. Be sure to...
Explain the three categories of user access privileges. Is three the right number or should there be more or fewer than three? Why or why not?
How can information technology support a company's business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer.
Why are there so many conceptual classifications of information systems? Why are they typically integrated in the information systems found in the real world?
Refer to the real world example about responsibility and accountability for project failures in the chapter. Are these IT projects or business projects with a significant IT component? Who should be...
Search the Internet to help you evaluate the business performance of Sew What? Inc. and its competitors at the present time. What conclusions can you draw from your research about Sew whats prospects...
Are networks of PCs and servers making mainframe computers obsolete? Explain.
What are several trends that are occurring in computer peripheral devices? How do these trends affect business uses of computers?
1. What are the main business benefits of the collaboration technologies described in the case? 2. Michelle Damrow of Polycom notes Cisco is betting on a proprietary standard for its TelePresence...
Which of the following strategies do you think IT executives should adopt to improve their current situation: reject new projects, attempt to increase staff and funding, prioritize often, or all of...
What is the difference between intangible value and tangible value? Give three examples of each.
Describe the major elements and issues with throwaway prototyping.
Discuss the considerations that should be made when determining who to include in interviews and/or JAD sessions.
System projects are notorious for being late and over budget. When should management stop a project that is late or costing more than the intended budget? Consider this case: Valley Enterprises opted...
Pretend that you are going to build a new system that automates or improves the interview process for the career services department of your school. Develop a requirements definition for the new...
What is the purpose of an event-response list in the process of developing use cases?
Explain the use of structured English in process descriptions.
Suppose that your goal is to create a set of DFDs. How would you begin an interview with a knowledgeable user? How would you begin a JAD session?
Is an intersection entity dependent or independent? Explain your answer.
Describe how the data model and process model should be balanced against each other.
What is involved with systems integration? When is it necessary?
Explain the difference between a symmetric encryption algorithm and an asymmetric encryption algorithm.
What do you think are three common mistakes that novice analysts make in developing the architecture design and hardware/software specification?
Think about the system that your university currently uses for career services and pretend that you are in charge of replacing the system with a new one. Describe how you would decide on the...
Consider a Web form that a student would use to input student information and rsum information into a career services application at your university. Sketch out how this form would look and identify...
Compare and contrast the four types of interface evaluation.
Compare and contrast on-screen list boxes and dropdown list boxes. When would you use one versus the other?
Describe five types of input validation methods.
Develop two use scenarios for the DFD in Exercise I in Chapter 5.
What is meant by change control? How is it helpful to the programming effort?
What is the difference between alpha testing and beta testing?
What do you think are three common mistakes made by novice systems analysts in preparing user documentation?
In our experience, documentation is left to the very end of most projects. Why do you think this happens? How could it be avoided?
The awful truth is that every operating system and application system is defective. System complexity, the competitive pressure to hurry applications to market, and simple incompetence contribute to...
How is a problem report different from a change request?
Suppose you are installing a new payroll system in a very large multinational corporation. What conversion strategy would you use? Develop a conversion plan (i.e., technical aspects only).
Describe the steps in creating a use case diagram.
Create a use case diagram that would illustrate the use cases for the following dentist office system: Whenever new patients are seen for the first time, they complete a patient information form that...
Create a sequence diagram for each of the following scenario descriptions for a video store system: A Video Store (AVS) runs a series of fairly standard video stores: Every customer must have a...
Use the Internet to find two examples of corporate mission statements.
Discuss the importance of data modeling.
How do you translate business rules into data model components?
Create the relational diagram for the database shown in Figure.
Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure. (The file is meant to be used as a teacher class assignment schedule. One of the many...
Suppose that you have the ERM shown in Figure Q3.14. During some time interval, a Driver can drive many Trucks and any Truck can be driven by many Drivers How would you convert this model into an ERM...
Identify and describe the components of the table shown in Figure Q3.17, using correct terminology. Use your knowledge of naming conventions to identify the tables probable foreignkey(s). EMP NUM |...
What would be the conceptual view of the INDEX table that is described in question 22? Depict the contents of the conceptual INDEX table.
A database user manual notes that, The file contains two hundred records, each record containing nine fields. Use appropriate relational database terminology to translate that statement.
Do the tables exhibit entity integrity? Answer yes or no and then explain your answer.
Do the tables exhibit referential integrity? Answer yes or no and then explain your answer. Write NA (Not Applicable) if the table does not have a foreign key.
Describe the type(s) of relationship(s) between EMPLOYEE and STORE.
Do the tables exhibit referential integrity? Answer yes or no and then explain your answer. Write NA (Not Applicable) if the table does not have a foreign key. Discuss.