The term Artificial Intelligence ( AI ) was coined by John McCarthy in 1955, defined it as "the science and engineering of making intelligent machines". The various definitions have been proposed since then by scientist and researchers. It is the science and engineering of making intelligent machines, especially intelligent computer programs. It is related to the similar task of using computers to understand human intelligence, but AI does not have to confine itself to methods that are biologically observable. [ John McCarthy ] The goal of work in artificial intelligence is to build machines that perform tasks normally requiring human intelligence. [ Nilsson. Nils J. ]
Krishna Engineering College (ECS-801) B.Tech. Computer Science Semester - 8 Pre-Sem Exam May - 2014 ARTIFICIAL INTELLIGENCE Time : 3 hrs MM : 100 Q.1 Attempt any four of the following questions (5 * 4 = 20) Define and describe the difference between knowledge, belief hypothesis and data. Define Artificial Intelligence and write about application areas of Artificial Intelligence . Define Intelligent Agents and explain the various structures of intelligent agents. What is means-ends analysis? Explain it with examples. Explain the various steps of natural language processing. Briefly explain the parse tree & parse the sentence. "John broke the window with a hammer"
Ring Topology - A ring network is network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet. Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure of cable break might isolate every node attached to the ring. In response, some ring networks add a "counter-rotating ring" (C-Ring) to form a redundant topology: in the event of a break, data are wrapped back onto the complementary ring before reaching the end of the cable, maintaining a path to every node along the resulting C-Ring. Such "dual ring" network include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring. 802.5 network - also known as IBM token ring network - avoid the weakness of a ring t...
Comments
Post a Comment