Convert statement into conjunctive normal form , Computer Engineering

Assignment Help:

Consider the following statements about the types of fruit people like.

If people like apples, then they do not like oranges. If people do not like apples, then they like oranges and grapes. If people do not like oranges or they like grapes, then they like pears. If people like pears, then they like bananas.

a. Express the above statements in propositional logic. Clearly define the meaning of your propositional symbols.

b. Convert your statements from (a) into conjunctive normal form (CNF). Number the clauses in your knowledge base (KB) starting with number 1.

c. Using proof by refutation and resolution, try to prove that people like bananas using your KB from (b). For each new clause in your proof, clearly indicate the previous clauses used. If "people like bananas" cannot be proven, then clearly explain or demonstrate why.

d. Using proof by refutation and resolution, try to prove that people like apples using your KB from (b). For each new clause in your proof, clearly indicate the previous clauses used. If "people like apples" cannot be proven, then clearly explain or demonstrate why.

 


Related Discussions:- Convert statement into conjunctive normal form

Implementation of arithmetic circuits, Implementation of Arithmetic Circuit...

Implementation of Arithmetic Circuits for Arithmetic Micro-operation  An arithmetic circuit can be implemented by a number of full adder circuits or parallel adder circuits. F

Name some of synthesizable and non-synthesizable constructs, Can you list o...

Can you list out some of synthesizable and non-synthesizable constructs? not synthesizable->>>> initial ignored for synthesis. delays  ignored for synthesis. ev

Define edge triggered d flip flop, Define Edge Triggered D flip-flop? D...

Define Edge Triggered D flip-flop? D latch has only two inputs C(control) and D(data). The operation of a D flip-flop is a lot simpler and it has only one input addition to the

Explain working of jaz drive, Q. Explain working of Jaz Drive? Jaz Dri...

Q. Explain working of Jaz Drive? Jaz Drive: Jaz drive is a well-liked drive with 2GB and unleashes creativity of professionals in graphic design and software development, pub

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a

What are the steps include constructing a functional model, What are the St...

What are the Steps include constructing a Functional Model Recognize input and output values Build data flow diagrams which shows functional dependencies Explain

When is a memory unit called as ram, When is a memory unit called as RAM? ...

When is a memory unit called as RAM? A memory unit is called as RAM if any location can be accessed for a read or writes operation in some fixed quantity of time that is indepe

What is the chief advantage of using virtual packets, What is the chief adv...

What is the chief advantage of using virtual packets instead of frames? The router can't transfer a copy of a frame from one kind of network to another since the frame formats

How many address bits are required to represent 4K memory, How many address...

How many address bits are required to represent 4K memory ? Ans. 12 address bits are required for representing 4K memory, as 4K = 2 2 x 2 10   = 2 12 Therefore 1K = 1024

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd