First-order inference rules - artificial intelligence, Computer Engineering

Assignment Help:

First-Order Inference Rules -artificial intelligence:

Now we have a perfect definition of a first-order model is,in the same way, we may define soundness for first-order inference rules as we did for propositional inference rules: the rule is sound if given a model of the sentences above the line, this is always a model of the sentence below.

To be able to specify these new rules, we might use the notion of substitution. We've already seen substitutions which replace propositions with propositional expressions (7.2 above) and other substitutions which replace variables with terms that represent a given object (7.5 pt. above). In this section we use substitutions which replace variables with ground terms (terms without variables) so being clear we will call these ground substitutions. Another name for the ground substitution is an instantiation,

I.e. If we begin with the superbly optimistic sentence that everyone likes everyone else:X, Y (likes(X, Y)), then we can select specific values for X and Y. So, we may instantiate this sentence to say: likes(tony,George). Because we have selected a specific value, the quantification not makes sense longer, so we might drop it.

The activity of performing an instantiation is a function, as there is just one possible outcome, so we may write it as a function. The notation

Subst({X/george, Y/tony}, likes(X,Y)) = likes(george, tony)

Show that we have made a ground substitution.

We also need to recognize that we are working with sentences which form part of a knowledge base of various such like sentences. More to the point, there will be constants which seem throughout the knowledge base and some which are local to a specific sentence.


Related Discussions:- First-order inference rules - artificial intelligence

COMPUTER SYSTEM, Classify computer systems according to capacity. How they ...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

Execution error and compilation error, Execution error and compilation erro...

Execution error and compilation error: Errors like as mismatch of data types or array out of bound error are called as execution errors or runtime errors. These errors are us

De morgans laws, De Morgan's Laws : With continuing the relationship b...

De Morgan's Laws : With continuing the relationship between ^ and ? , we can also needs De Morgan's Law to rearrange sentences involving negation in conjunction with these con

Describe one graphics and image editing tool, Question : Multimedia inv...

Question : Multimedia involves multiple modalities of text, audio, images, drawings, animation, and video (a) Describe three popular file formats for images (b) Most imag

What do you understand by electronic funds transfer, What do you understand...

What do you understand by Electronic Funds Transfer?  Electronic Funds Transfer: It's an electronic payment method that transfers the money value from one bank account to

What do you mean by interrupts, Q. What do you mean by Interrupts? The ...

Q. What do you mean by Interrupts? The term interrupt is an exceptional event which causes CPU to temporarily transfer its control from presently executing program to a separat

Loadrunner would you use to record a script, What Component of LoadRunner w...

What Component of LoadRunner would you use to record a Script? Ans) The Virtual User Generator (VuGen) component is used to record a script. It enables you to make Vuser scripts

Why we need web browser, Q. why we need Web Browser? A Web browser is s...

Q. why we need Web Browser? A Web browser is software program which allows you to easily display Web pages and navigate the Web. The first graphical browser, Mosaic, was develo

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Carry save addition and generated and propagate function, Explain carry sav...

Explain carry save addition (CSA) process. Ans: Instead of allowing the carries ripple along the rows, they can be saved and then introduced into the next roe at the right wei

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd