Conjunctive normal forms, Computer Engineering

Assignment Help:

Conjunctive Normal Forms:

However there for the resolution rule to resolve two sentences so they must both be in a normalised format called as conjunctive normal form, that is usually abbreviated to CNF.

Just because this is an unfortunate name thus the sentences themselves are made up of sets of disjunctions. Rather than it is implicitly assumed that the complete knowledge base is a big conjunction of the sentences, that is when conjunctive normal form gets its name. But, CNF is usually a conjunction of disjunctions. Most of the disjunctions are madeup of literals that can either be a predicate or the negation of a predicate like for the negation of a proposition or propositional read a proposition: 

Thus CNF sentences are of the form as: 

(p1 ? p2 ? ... ? pm) ^  (q1?  q2 ? ... ? qn) ^ etc. 

whether each pi and qj  is a literal means that we call the disjunction of that literals a clause. So as a concrete example like, 

likes(george, X)  ? likes(tony, george) ?  ¬ is_mad(maggie) 

that is in conjunctive normal form, so: 

likes(george, X)  ? likes(tony, george)  → ¬ is_mad(maggie) ^  is_mad(tony) 

this is not in CNF.


Related Discussions:- Conjunctive normal forms

Name some register output control signals, Name some register output contro...

Name some register output control signals. Pc out , MDR out , Z out , Offset out , R1 out , R2 out , R3 out and TEMP out .

Performance and issues in pipelining-efficiency, Performance and Issues in ...

Performance and Issues in Pipelining Efficiency:  The efficiency of a pipeline can be calculated as the ratio of busy time span to the entire time span including the idle time

Does average velocity differ from its instantaneous velocity, Q. When an ob...

Q. When an object travels with constant velocity does its average velocity during any time interval differ from its instantaneous velocity at any instant? Answer:- No It i

Security features used in client-server types of network, Security features...

Security features used in Client-Server types of network are as follows :  i) Digital Signatures ii)  Encryption / Decryption iii) Secure Socket Layer (SSL) iv) Firewa

Can an rc circuit be used as clock source for 8085, Yes, it can be used, if...

Yes, it can be used, if an accurate clock frequency is not needed. Also, the component cost is low contrast to LC or Crystal.

Write a verilog code for synchronous and asynchronous reset, Write a Verilo...

Write a Verilog code for synchronous and asynchronous reset? Synchronous  reset, synchronous means clock dependent so reset must not be present in sensitivity disk eg: alway

Explain top-down parsing, Explain Top down parsing. Top down parsing...

Explain Top down parsing. Top down parsing: Specified an input string, top down parsing tries to derive a string identical to this by successive application of grammar rule

What does "wire_read: unexpected eof" mean in gimp, This error message shou...

This error message should say something like "the plug-in (or the major GIMP app) I was talking to has existed before returning any results, so I suppose that it has crashed."

Cell array variable , a)   Make a cell array variable that would kept for a...

a)   Make a cell array variable that would kept for a student his or her name, university id number, and GPA.  Print this information. b) Make a structure variable that would kept

Explain what is a transaction in sap terminology, Explain what is a transac...

Explain what is a transaction in SAP terminology. In SAP terminology, a transaction is series of logically linked dialog steps.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd