Conjunctive normal forms, Computer Engineering

Assignment Help:

Conjunctive Normal Forms:

However there for the resolution rule to resolve two sentences so they must both be in a normalised format called as conjunctive normal form, that is usually abbreviated to CNF.

Just because this is an unfortunate name thus the sentences themselves are made up of sets of disjunctions. Rather than it is implicitly assumed that the complete knowledge base is a big conjunction of the sentences, that is when conjunctive normal form gets its name. But, CNF is usually a conjunction of disjunctions. Most of the disjunctions are madeup of literals that can either be a predicate or the negation of a predicate like for the negation of a proposition or propositional read a proposition: 

Thus CNF sentences are of the form as: 

(p1 ? p2 ? ... ? pm) ^  (q1?  q2 ? ... ? qn) ^ etc. 

whether each pi and qj  is a literal means that we call the disjunction of that literals a clause. So as a concrete example like, 

likes(george, X)  ? likes(tony, george) ?  ¬ is_mad(maggie) 

that is in conjunctive normal form, so: 

likes(george, X)  ? likes(tony, george)  → ¬ is_mad(maggie) ^  is_mad(tony) 

this is not in CNF.


Related Discussions:- Conjunctive normal forms

Data structures for parallel algorithms, To apply any algorithm selection o...

To apply any algorithm selection of a proper data structure is very significant. An explicit operation might be performed with a data structure in a smaller time however it might n

Explain excess-3 and gray code using four binary digitis, Give the details ...

Give the details of excess 3 codes and gray code using four binary digits. Ans: Table of excess 3 codes and gray code using four binary digits Binary

Define message passing, Q. Define Message Passing? The PVM communicatio...

Q. Define Message Passing? The PVM communication model offers asynchronous blocking receive and asynchronous blocking send and nonblocking receive functions. In our terminology

Linux, Discuss the risks of having a single root user and how more limited ...

Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems

Visibility, hidden edge/surface removal

hidden edge/surface removal

Determine the object oriented principles, Determine the Object oriented pri...

Determine the Object oriented principles Many latest applications are being developed based on object oriented principles such as methods, classes, and inheritance. To fulfil

Explain chomsky classification of languages, Explain chomsky classification...

Explain chomsky classification of languages with suitable examples Ans: Any language is appropriate for communication provided the syntax & semantic of the language is termed t

Explain floating point arithmetic pipelines, Floating point Arithmetic pipe...

Floating point Arithmetic pipelines Floating point calculations are the best candidates for pipelining. Take the illustration of addition of two floating point numbers. Subsequ

Describe critical directive in fortan, Q. Describe Critical Directive in FO...

Q. Describe Critical Directive in FORTAN? The critical directive permits one thread executes associated structured block. When one or more threads attain critical directive the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd