Description
Your state has a forthcoming referendum concerning no smoking in public places including bars and restaurants.
Hi,
I need this word document in APA format in 400 to 500 words with 3 peer reviewed references with no plagiarism.
Thanks,
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
hello, p...
Completion Status:
100%
Review
Review
Anonymous
Awesome! Perfect study aid.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
UC Contingency Plan Discussion
Threat Categories
Topic: Assume that you have been hired by a small veterinary practice to help them prepare a contingenc ...
UC Contingency Plan Discussion
Threat Categories
Topic: Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan.
Best Practices in Collecting Digital Evidence
Best Practices in Collecting Digital EvidenceIn this assignment, you assume the role of an employee of the DigiFirm Invest ...
Best Practices in Collecting Digital Evidence
Best Practices in Collecting Digital EvidenceIn this assignment, you assume the role of an employee of the DigiFirm Investigation Company. You must research best practices in collecting digital evidence and create an electronic presentation which highlights your findings to the CEO of DigiFirm, in which you recommend those best practices for adoption by your organization.Deliverable:For this assignment, you are to: Select a recent reputable source for Best Practices in Collecting Digital Evidence (NIST, FBI, SANS, NCJRS, etc. - cited on the reference page), analyze the source recommendations, and create PowerPoint presentation to share your findings.Your presentation should be at least 10-12 slides in length, not including title and reference slides. Be sure your presentation adheres to the academic writing standards and APA style guidelines, citing references as appropriate.Reference:Chapter 4 in System Forensics, Investigation, and Responsehttps://books.google.com.sa/books?id=lWtuAAAAQBAJ&...
e04 grader h2 Entertainment
Project Description: The Painted Paradise Resort & Spa is a favorite spot for many locals to visit on a Friday night ...
e04 grader h2 Entertainment
Project Description: The Painted Paradise Resort & Spa is a favorite spot for many locals to visit on a Friday night because of the live entertainment in the Silver Moon Lounge. The lounge has quarterly contracts with 13 popular local bands; each band will play in the lounge once a quarter. Lounge manager Will Diaz would like to keep track of quarterly and yearly expenses for the entertainment. He has started a workbook but has asked you to complete it. You will begin by summarizing the quarterly worksheets and consolidating the data. You will also share a copy with the assistant manager to update any necessary items.The WORD FILE IS AN INSTRUCTION ONLY. SO YOU DON'T HAVE TO DO ANYTHING ON IT.
6 pages
Challenges To Attribution
Estonia, a nation of more than one million individuals, with the inclusion of a great percentage of Russian minority, is c ...
Challenges To Attribution
Estonia, a nation of more than one million individuals, with the inclusion of a great percentage of Russian minority, is considered to be among those ...
7 pages
Emails In Network Security Assessments
1. After Identifying Mike's email, one can use various tools to check the system's vulnerability by trying to crack the em ...
Emails In Network Security Assessments
1. After Identifying Mike's email, one can use various tools to check the system's vulnerability by trying to crack the email's password. Firstly, the ...
Treasure Hunt Game Project
Scenario
You are working as an AI developer for a gaming company. The company is developing a treasure hunt game where the ...
Treasure Hunt Game Project
Scenario
You are working as an AI developer for a gaming company. The company is developing a treasure hunt game where the player needs to find the treasure before the pirates find it. As an AI developer, you have been asked to design an intelligent agent of the game for an NPC (non-player character) to represent the pirate. The pirate will need to navigate the game world, which consists of different pathways and obstacles, in order to find the treasure. The pirate agent’s goal is to find the treasure before the human player. This is commonly called a pathfinding problem, as the agent you create will need to find a path towards its goal.
You have been provided with some starter code and a sample environment where your pirate agent will be placed. You will need to create a deep Q-learning algorithm to train your pirate agent. Finally, you have also been asked to write a design defense that demonstrates your understanding of the fundamental AI concepts involved in creating and training your intelligent agent.
Directions
Pirate Intelligent Agent
As part of your project, you will create a pirate intelligent agent to meet the specifications that you have been given. Be sure to review any feedback that you received on your Project Two Milestone before submitting the final version of your intelligent agent. Follow these steps to complete your intelligent agent:
Before creating your pirate intelligent agent, be sure to review the Pirate Intelligent Agent Specifications document, located in the Supporting Materials section. This document provides details about the code that you have been given, and what aspects you will need to create.
Download the zipped folder containing your starter code and Jupyter Notebook files by using the link in the Supporting Materials section. Access the Virtual Lab (Apporto) by using the link in the Virtual Lab Access module. Upload the zipped folder into the Virtual Lab, unzip the folder, and upload the files into the Jupyter Notebook application. Use the tutorials in the Supporting Materials to help you with these tasks.
Be sure to review the starter code that you have been given. Watch the Project Two Walkthrough video, located in the Supporting Materials section, to help you understand this code in more detail.
IMPORTANT: Do not modify any of the PY files that you have been given.
Complete the code for the Q-Training Algorithm section in your Jupyter Notebook. In order to successfully complete the code, you must do the following:
Develop code that meets the given specifications:
Complete the program for the intelligent agent so that it achieves its goal: The pirate should get the treasure.
Apply a deep Q-learning algorithm to solve a pathfinding problem.
Create functional code that runs without error.
Use industry standard best practices such as in-line comments to enhance readability and maintainability.
After you have finished creating the code for your notebook, save your work. Make sure that your notebook contains your name in the filename (such as, “Doe_Jane_ProjectTwo.ipynb”). This will help your instructor access and grade your work easily. Be sure to download a copy of your notebook (IPYNB file) for your submission.
Design Defense
As a part of your project, you will also submit a design defense. This design defense will demonstrate the approach you took in solving this problem, explain how the intelligent agent works, and evaluate the algorithm you chose to use. In order to adequately defend your designs, you will need to support your ideas with research from your readings. You must include citations for sources that you used.
Analyze the differences between human and machine approaches to solving problems.
Describe the steps a human being would take to solve this maze.
Describe the steps your intelligent agent is taking to solve this pathfinding problem.
What are the similarities and differences between these two approaches?
Assess the purpose of the intelligent agent in pathfinding.
What is the difference between exploitation and exploration? What is the ideal proportion of exploitation and exploration for this pathfinding problem? Explain your reasoning.
How can reinforcement learning help to determine the path to the goal (the treasure) by the agent (the pirate)?
Evaluate the use of algorithms to solve complex problems.
How did you implement deep Q-learning using neural networks for this game?
What to Submit
To complete this project, you must submit the following:
Pirate Intelligent Agent (TreasureHuntGame.ipynb)
Your submission should be your completed Jupyter Notebook (IPYNB) file containing the code for your pirate intelligent agent.
Design Defense
Your submission should be a 2– to 3–page Word document with 12-point Times New Roman font, double spacing, and one-inch margins. Sources should be cited according to APA style.
Supporting Materials
The following resource(s) may help support your work on the project:
Reading: CS 370 Pirate Intelligent Agent Specifications
This specifications document provides important details about the code that has already been created for the pirate intelligent agent and what you will need to create.
Starter Code: TreasureHuntGame.zip
This zipped folder contains all of the starter code for your assignment. Included are two Python files: TreasureMaze.py, which represents the environment and includes a maze object defined as a matrix; and GameExperience.py, which stores the episodes. You have also been given starter code in your Jupyter Notebook, TreasureHuntGame.ipynb. You will need to complete two code blocks in the Jupyter Notebook to complete your pirate intelligent agent.
Video: Project Two Walkthrough
This video will help you understand the starter code that you have been given for Project Two, as well as showing you what areas of the code will need to be completed. A video transcript is available: Transcript for Project Two Walkthrough.
Reading: TreasureHuntGame Sample Output
This document displays sample output for the TreasureHuntGame.ipynb file after the algorithm has been completed and the notebook has been run. Your actual output may vary in some places, but should follow the same basic pattern of outputs.
Reading: Jupyter Notebook in Apporto (Virtual Lab) Tutorial
This tutorial will help you navigate the technology you will be using in this course. You will learn how to get into the Jupyter Notebook via the Virtual Lab (Apporto), as well as how to complete, save, and download your work.
Reading: Virtual Lab Student Guide
Review this tutorial to understand how the Virtual Lab (Apporto) for this course works. This reading contains instructions on how to access the virtual lab, launch the course app, and upload files to and download files from Apporto.
Similar Content
CIS 110 SDCC Eller Software Services Information System Principles Excel Project
Excel Project. Please use the excel file I sent not a different one or else I wont be able to sumbit my assignment. ...
Information Technology
I have an assignment it is due after 8 hours Thanks...
Basic IT task
Kindly review the attachment and answer all 4 questions on tasks. ...
Mobile Devices in the Workplace
Assignment 1: Mobile Devices in the WorkplaceWrite a two to four (2-4) page paper in which you:Explain what you believe ar...
Schiller International University Business Intelligence and Data Mining Paper
What are the privacy issues with data mining? Do you think they are substantiated?...
MIS 5030 South University Mobile and Wireless Technology Questions
1
Ronya Holmes
Dr. Steve Reynolds
MIS5030-Emerging Technologies
Week 3-Project
South University
April 11, 2022
2
Cours...
Marketing Yourself To Future Employers Pr
I would tell my potential future employer that my experiences as a management intern have been educative and have increase...
Hcd402
A project is regarded successful if it accomplishes all of its stated objectives, including those relating to time, money,...
Cpu
(5 pt) A CPU has a clock of 2.3 GHz. Half of each clock cycle is for fetching and the other half for...
Related Tags
Book Guides
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
The 7 Habits of Highly Effective People
by Stephen R. Covey
Crippled America
by Donald J Trump
Divergent
by Veronica Roth
To the Lighthouse
by Virginia Woolf
Twilight
by Stephenie Meyer
Girl in Translation
by Jean Kwok
Of Mice and Men
by John Steinbeck
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
UC Contingency Plan Discussion
Threat Categories
Topic: Assume that you have been hired by a small veterinary practice to help them prepare a contingenc ...
UC Contingency Plan Discussion
Threat Categories
Topic: Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan.
Best Practices in Collecting Digital Evidence
Best Practices in Collecting Digital EvidenceIn this assignment, you assume the role of an employee of the DigiFirm Invest ...
Best Practices in Collecting Digital Evidence
Best Practices in Collecting Digital EvidenceIn this assignment, you assume the role of an employee of the DigiFirm Investigation Company. You must research best practices in collecting digital evidence and create an electronic presentation which highlights your findings to the CEO of DigiFirm, in which you recommend those best practices for adoption by your organization.Deliverable:For this assignment, you are to: Select a recent reputable source for Best Practices in Collecting Digital Evidence (NIST, FBI, SANS, NCJRS, etc. - cited on the reference page), analyze the source recommendations, and create PowerPoint presentation to share your findings.Your presentation should be at least 10-12 slides in length, not including title and reference slides. Be sure your presentation adheres to the academic writing standards and APA style guidelines, citing references as appropriate.Reference:Chapter 4 in System Forensics, Investigation, and Responsehttps://books.google.com.sa/books?id=lWtuAAAAQBAJ&...
e04 grader h2 Entertainment
Project Description: The Painted Paradise Resort & Spa is a favorite spot for many locals to visit on a Friday night ...
e04 grader h2 Entertainment
Project Description: The Painted Paradise Resort & Spa is a favorite spot for many locals to visit on a Friday night because of the live entertainment in the Silver Moon Lounge. The lounge has quarterly contracts with 13 popular local bands; each band will play in the lounge once a quarter. Lounge manager Will Diaz would like to keep track of quarterly and yearly expenses for the entertainment. He has started a workbook but has asked you to complete it. You will begin by summarizing the quarterly worksheets and consolidating the data. You will also share a copy with the assistant manager to update any necessary items.The WORD FILE IS AN INSTRUCTION ONLY. SO YOU DON'T HAVE TO DO ANYTHING ON IT.
6 pages
Challenges To Attribution
Estonia, a nation of more than one million individuals, with the inclusion of a great percentage of Russian minority, is c ...
Challenges To Attribution
Estonia, a nation of more than one million individuals, with the inclusion of a great percentage of Russian minority, is considered to be among those ...
7 pages
Emails In Network Security Assessments
1. After Identifying Mike's email, one can use various tools to check the system's vulnerability by trying to crack the em ...
Emails In Network Security Assessments
1. After Identifying Mike's email, one can use various tools to check the system's vulnerability by trying to crack the email's password. Firstly, the ...
Treasure Hunt Game Project
Scenario
You are working as an AI developer for a gaming company. The company is developing a treasure hunt game where the ...
Treasure Hunt Game Project
Scenario
You are working as an AI developer for a gaming company. The company is developing a treasure hunt game where the player needs to find the treasure before the pirates find it. As an AI developer, you have been asked to design an intelligent agent of the game for an NPC (non-player character) to represent the pirate. The pirate will need to navigate the game world, which consists of different pathways and obstacles, in order to find the treasure. The pirate agent’s goal is to find the treasure before the human player. This is commonly called a pathfinding problem, as the agent you create will need to find a path towards its goal.
You have been provided with some starter code and a sample environment where your pirate agent will be placed. You will need to create a deep Q-learning algorithm to train your pirate agent. Finally, you have also been asked to write a design defense that demonstrates your understanding of the fundamental AI concepts involved in creating and training your intelligent agent.
Directions
Pirate Intelligent Agent
As part of your project, you will create a pirate intelligent agent to meet the specifications that you have been given. Be sure to review any feedback that you received on your Project Two Milestone before submitting the final version of your intelligent agent. Follow these steps to complete your intelligent agent:
Before creating your pirate intelligent agent, be sure to review the Pirate Intelligent Agent Specifications document, located in the Supporting Materials section. This document provides details about the code that you have been given, and what aspects you will need to create.
Download the zipped folder containing your starter code and Jupyter Notebook files by using the link in the Supporting Materials section. Access the Virtual Lab (Apporto) by using the link in the Virtual Lab Access module. Upload the zipped folder into the Virtual Lab, unzip the folder, and upload the files into the Jupyter Notebook application. Use the tutorials in the Supporting Materials to help you with these tasks.
Be sure to review the starter code that you have been given. Watch the Project Two Walkthrough video, located in the Supporting Materials section, to help you understand this code in more detail.
IMPORTANT: Do not modify any of the PY files that you have been given.
Complete the code for the Q-Training Algorithm section in your Jupyter Notebook. In order to successfully complete the code, you must do the following:
Develop code that meets the given specifications:
Complete the program for the intelligent agent so that it achieves its goal: The pirate should get the treasure.
Apply a deep Q-learning algorithm to solve a pathfinding problem.
Create functional code that runs without error.
Use industry standard best practices such as in-line comments to enhance readability and maintainability.
After you have finished creating the code for your notebook, save your work. Make sure that your notebook contains your name in the filename (such as, “Doe_Jane_ProjectTwo.ipynb”). This will help your instructor access and grade your work easily. Be sure to download a copy of your notebook (IPYNB file) for your submission.
Design Defense
As a part of your project, you will also submit a design defense. This design defense will demonstrate the approach you took in solving this problem, explain how the intelligent agent works, and evaluate the algorithm you chose to use. In order to adequately defend your designs, you will need to support your ideas with research from your readings. You must include citations for sources that you used.
Analyze the differences between human and machine approaches to solving problems.
Describe the steps a human being would take to solve this maze.
Describe the steps your intelligent agent is taking to solve this pathfinding problem.
What are the similarities and differences between these two approaches?
Assess the purpose of the intelligent agent in pathfinding.
What is the difference between exploitation and exploration? What is the ideal proportion of exploitation and exploration for this pathfinding problem? Explain your reasoning.
How can reinforcement learning help to determine the path to the goal (the treasure) by the agent (the pirate)?
Evaluate the use of algorithms to solve complex problems.
How did you implement deep Q-learning using neural networks for this game?
What to Submit
To complete this project, you must submit the following:
Pirate Intelligent Agent (TreasureHuntGame.ipynb)
Your submission should be your completed Jupyter Notebook (IPYNB) file containing the code for your pirate intelligent agent.
Design Defense
Your submission should be a 2– to 3–page Word document with 12-point Times New Roman font, double spacing, and one-inch margins. Sources should be cited according to APA style.
Supporting Materials
The following resource(s) may help support your work on the project:
Reading: CS 370 Pirate Intelligent Agent Specifications
This specifications document provides important details about the code that has already been created for the pirate intelligent agent and what you will need to create.
Starter Code: TreasureHuntGame.zip
This zipped folder contains all of the starter code for your assignment. Included are two Python files: TreasureMaze.py, which represents the environment and includes a maze object defined as a matrix; and GameExperience.py, which stores the episodes. You have also been given starter code in your Jupyter Notebook, TreasureHuntGame.ipynb. You will need to complete two code blocks in the Jupyter Notebook to complete your pirate intelligent agent.
Video: Project Two Walkthrough
This video will help you understand the starter code that you have been given for Project Two, as well as showing you what areas of the code will need to be completed. A video transcript is available: Transcript for Project Two Walkthrough.
Reading: TreasureHuntGame Sample Output
This document displays sample output for the TreasureHuntGame.ipynb file after the algorithm has been completed and the notebook has been run. Your actual output may vary in some places, but should follow the same basic pattern of outputs.
Reading: Jupyter Notebook in Apporto (Virtual Lab) Tutorial
This tutorial will help you navigate the technology you will be using in this course. You will learn how to get into the Jupyter Notebook via the Virtual Lab (Apporto), as well as how to complete, save, and download your work.
Reading: Virtual Lab Student Guide
Review this tutorial to understand how the Virtual Lab (Apporto) for this course works. This reading contains instructions on how to access the virtual lab, launch the course app, and upload files to and download files from Apporto.
Earn money selling
your Study Documents