exercises ii part forward chaining 12 jul 2012
play

Exercises, II part Forward Chaining: 12 Jul 2012 Exercises, II - PDF document

Exercises, II part Exercises, II part Forward Chaining: 12 Jul 2012 Exercises, II part Consider the following set of clauses in propositional logic: J = Q A I = J E F = I B = F A B = E A B 1 Show and execution


  1. Exercises, II part Exercises, II part Forward Chaining: 12 Jul 2012 Exercises, II part Consider the following set of clauses in propositional logic: J = ⇒ Q A ∧ I = ⇒ J E ∧ F = ⇒ I B = ⇒ F A ∧ B = ⇒ E A B 1 Show and execution of the forward chaining algorithm on this set of clauses for proving Q (show the and-or graph and the evolution of the count table). 2 What happens if we replace the first clause of the knowledge base J = ⇒ Q with J ∧ G = ⇒ Q (and nothing else changes in the knowledge base)?

  2. Forward Chaining: 27 Sep 2012 Exercises, II part Consider the following set of clauses in propositional logic: H ∧ S = ⇒ Q M ∧ S = ⇒ H H ∧ A = ⇒ M M ∧ B = ⇒ S A ∧ B = ⇒ M A B 1 Show an execution of the forward chaining algorithm on this set of clauses for proving Q (show the and-or graph and the evolution of the count table). 2 Briefly comment on the complexity and completeness of the forward chaining approach. Inference: 12 Jul 2012 Exercises, II Consider the following Joint Probability Table for the three binary ran- part dom variables A , B , C . P ( A , B , C ) A B C 0.108 T T T 0.012 T T F 0.072 T F T 0.008 T F F 0.016 F T T 0.064 F T F 0.144 F F T 0.576 F T F Compute the following queries: 1 P(C|A=T,B=T) 2 P(C|A=T)

  3. BN: 13 Feb. 2017 Exercises, II part Consider the Bayesian Network in the Figure. Answer the following questions: State whether 1 P(A|B,C) = P(A|B,C,D). Motivate your answer. State whether 2 P(A|C) = P(A|B,C,D). Motivate your answer. State how many numbers we 3 need to represent the joint distribution for this network assuming variables are all boolean. Motivate your answer. BN: 16 Giu. 2016 Exercises, II Consider the Bayesian Network in part Figure, where every variable is by- nary. Answer the following ques- tions: Is it true 1 that P(B|A) = P(B|A,C) ? Motivate your answer. Write down 2 the equation to compute the query P(D|A=true,C=true) using the CPT associated with the network. How many independent 3 numbers must be stored to answer all the possible queries for this Bayesian Network ?

  4. BN: 21 Sep. 2016 Exercises, II part Consider the Bayesian Network in Figure, where every variable is by- nary. Answer the following ques- tions: State how many 1 parameters must be provided to compute the joint probability table of this BN. Assume the CPT 2 that defines P(E|B,C,D) is specified with a noisy-or, state how many parameters must be provided to compute the joint probability table of this BN. State whether P(D|C,E) = 3 P(D|A,B,C,E). Motivate your answer. Minimax: 16 Giu. 2016 Exercises, II part Consider the min-max tree in Figure. Is it possible to provide a set of values to replace the question marks so that an Aplha-Beta pruning algorithm would perform the specified cuts ? If so provide such values otherwise motivate your answer.

  5. Minimax: 26 Sep 2013 Exercises, II part Consider the min-max tree in the Figure. Show a trace of the execution of an Aplha-Beta pruning algorithm, indicating what will be the first move selected by the max player and which cuts are performed by the algorithm. DPOP: 22 Jun. 2015 Exercises, II part Consider the following cost network: Variables, binary X = { x 1 , x 2 , x 3 , x 4 , x 5 } . Constraints C h = { } and C s = { F 12 ( x 1 , x 2 ) , F 13 ( x 1 , x 3 ) , F 15 ( x 1 , x 5 ) , F 23 ( x 2 , x 3 ) , F 34 ( x 3 , x 4 ) , F 45 ( x 4 , x 5 ) } . Consider the DPOP algorithm: show the pseudo-tree obtained by using a DFS visit with the MCN heuristic. Start from node x 1 ; give the dimension of the biggest message exchanged by the algorithm (in terms of values stored in the table); compute the total number of messages that DPOP would use to solve this problem. In general, is this number dependent on the pseudo-tree used ?

  6. DPOP: 30 Apr. 2014 (partial test) Exercises, II Consider the following binary cost network: Variables, part = { x 1 , x 2 , x 3 , x 4 , x 5 } , Domains, D 1 = { G , B } , D 2 = D 3 = X = = { R , B } , Constraints = { } and = D 4 D 5 C h C s { F 12 ( x 1 , x 2 ) , F 13 ( x 1 , x 3 ) , F 14 ( x 1 , x 4 ) , F 15 ( x 1 , x 5 ) , F 23 ( x 2 , x 2 ) , F 35 ( x 3 , x 5 ) } . Where each F ij has the following form � − 1 if values are the same F ij ( x i , x j ) = 0 otherwise Consider the PseudoTrees that correspond to the following DFS visit orders o 1 = { x 5 , x 1 , x 4 , x 2 , x 3 } and o 2 = { x 1 , x 4 , x 3 , x 2 , x 5 } . Answer the following questions: state which order is better considering message size and computation, motivate your answer. solve the problem by using the DPOP algorithm with a PseudoTree of your choice.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend