Eequivalences rules, Computer Engineering

Assignment Help:

Eequivalences rules:

This conveys a meaning that is actually much simpler so than you would think on first inspection. 

Hence we can justify this, by using the following chain of rewrite steps based on the equivalences we've stated above that the: 

1.      By using the double negation rewrite: P => ¬¬P 

(A ↔ B) ^ (¬A  ?¬¬B)

2.      By using De Morgan's Law: ¬P ^ ¬ Q => ¬(P?  Q) 

(A ↔ B)  ^¬ (A? ¬B) 

3.      By using the commutativity of  :? P?  Q => Q?  P 

(A ↔ B) ^ ¬ (¬ B?  A) 

4.      By using 'replace implication' from right to left: ¬ P?  Q => P→  Q 

(A↔  B)  ¬ (B→  A) 

5.      By using 'replace equivalence' from left to right: P ↔ Q => (P→  Q)^  (Q → P) 

((A → B)^  (B→  A)) ^ ¬ (B → A) 

6.      By using the associativity of  : ^(P^  Q)  R => P  (Q^  R) 

(A→  B) ^ ((B→  A) ^ ¬ (B → A)) 

7.      By using the consistency equivalence above: P  ^ ¬P => False

(A ↔ B) ^  False 

8.      By using the definition of  ^ : False

There  what does this mean? Like if it mean that our original sentence was always false: and there are no models that would make this sentence true. Such the another way to think about this is that the original sentence was too inconsistent with the rules of propositional logic there.


Related Discussions:- Eequivalences rules

What is a client in sap terminology, What is a client in SAP terminology? ...

What is a client in SAP terminology? A S/W component that uses the service (offered by a s/w component) is known as a Client.  At the similar time these clients may also be ser

Distributivity of connectives, Distributivity of Connectives : In our ...

Distributivity of Connectives : In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if w

Explain about data segment, DATA SEGMENT  NUM1            DB      15h;...

DATA SEGMENT  NUM1            DB      15h;     First number   NUM2            DB      20h;     Second number  RESULT DB?  ; Put sum here  CARRY DB? ; Put any carry he

Cryptography, 1. Consider the one-time pad encryption scheme to encrypt a 1...

1. Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "messa

Can a vector have a component equivalent to zero, Q. Can a vector have a co...

Q. Can a vector have a component equivalent to zero and still have a nonzero magnitude? Answer:- Yes For example the 2-dimensional vector (1, 0) has length sqrt (1+0) = 1

Why digital computers use complemented subtraction method, The chief reason...

The chief reason why digital computers use complemented subtraction is that it ? Ans. By using complemented subtraction method negative numbers can easily be subtracted.

Flynn’s classification, Flynn's Classification  This classification was...

Flynn's Classification  This classification was early proposed and studied by Michael Flynn in 1972. Flynn did not believe the machine architecture for organization of parallel

What are sequential algorithms, What are Sequential Algorithms? The cen...

What are Sequential Algorithms? The central assumption of the RAM model is that instructions are implemented one after   another, one operation at a time. Accordingly, algorith

Explain the term- software, Explain the term- Software Some of the key ...

Explain the term- Software Some of the key aspects of software are considered in this section. Familiarisation with software packages is generally best achieved by carrying out

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd