Convert statement into conjunctive normal form , Computer Engineering

Assignment Help:

Consider the following statements about the types of fruit people like.

If people like apples, then they do not like oranges. If people do not like apples, then they like oranges and grapes. If people do not like oranges or they like grapes, then they like pears. If people like pears, then they like bananas.

a. Express the above statements in propositional logic. Clearly define the meaning of your propositional symbols.

b. Convert your statements from (a) into conjunctive normal form (CNF). Number the clauses in your knowledge base (KB) starting with number 1.

c. Using proof by refutation and resolution, try to prove that people like bananas using your KB from (b). For each new clause in your proof, clearly indicate the previous clauses used. If "people like bananas" cannot be proven, then clearly explain or demonstrate why.

d. Using proof by refutation and resolution, try to prove that people like apples using your KB from (b). For each new clause in your proof, clearly indicate the previous clauses used. If "people like apples" cannot be proven, then clearly explain or demonstrate why.

 


Related Discussions:- Convert statement into conjunctive normal form

Select-options and parameters statement , The fields specified by select-op...

The fields specified by select-options and parameters statement cannot be grouped together in the selection screen. No, the fields specified by select-options and parameters s

Discrete mathmetics and structures, how to prove the partial order R is a t...

how to prove the partial order R is a total order in discrete mathmetics and structures by topological sorting method in c programming

Write the truth table for a clocked J-K flip-flop, Write the truth table fo...

Write the truth table for a clocked J-K flip-flop that is triggered by the positive-going edge of the clock signal. Ans. Logic diagram of JK flip flop Truth T

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Introduction to e-commerce, Have you heard about e-commerce? What place is ...

Have you heard about e-commerce? What place is e-commerce located at? What are e-commerce objectives? When did e-commerce starts? How e-commerce works? Who takes advantages of e-co

User compatibility & appropriateness of inputs and outputs, User Compatibil...

User Compatibility & Appropriateness of Inputs and Outputs User compatibility - this is the degree to which the machine works towards task completion in way that suits the u

What is index register, What is index register? In index mode the effec...

What is index register? In index mode the effective address of the operand is formed by adding a constant value to the contents of a register. The register used might be either

Simple assembly programs, Data Transfer Two most fundamental data trans...

Data Transfer Two most fundamental data transfer instructions in 8086 microprocessor are XCHG and MOV. Let's give illustrations of the use of these instructions. Program 1:

Convert the following from octal to binary, Q. Convert the following from o...

Q. Convert the following from octal to binary, decimal, hexadecimal and BCD. a) 7.7 b) 4037 c) 23.34

Explain about deadlock avoidance, Q. Explain about Deadlock Avoidance? ...

Q. Explain about Deadlock Avoidance? To prevent deadlocks two kinds of techniques are used: 1) Static prevention:  It employs P and V operators in addition to Semaphores to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd