First-order inference rules - artificial intelligence, Computer Engineering

Assignment Help:

First-Order Inference Rules -artificial intelligence:

Now we have a perfect definition of a first-order model is,in the same way, we may define soundness for first-order inference rules as we did for propositional inference rules: the rule is sound if given a model of the sentences above the line, this is always a model of the sentence below.

To be able to specify these new rules, we might use the notion of substitution. We've already seen substitutions which replace propositions with propositional expressions (7.2 above) and other substitutions which replace variables with terms that represent a given object (7.5 pt. above). In this section we use substitutions which replace variables with ground terms (terms without variables) so being clear we will call these ground substitutions. Another name for the ground substitution is an instantiation,

I.e. If we begin with the superbly optimistic sentence that everyone likes everyone else:X, Y (likes(X, Y)), then we can select specific values for X and Y. So, we may instantiate this sentence to say: likes(tony,George). Because we have selected a specific value, the quantification not makes sense longer, so we might drop it.

The activity of performing an instantiation is a function, as there is just one possible outcome, so we may write it as a function. The notation

Subst({X/george, Y/tony}, likes(X,Y)) = likes(george, tony)

Show that we have made a ground substitution.

We also need to recognize that we are working with sentences which form part of a knowledge base of various such like sentences. More to the point, there will be constants which seem throughout the knowledge base and some which are local to a specific sentence.


Related Discussions:- First-order inference rules - artificial intelligence

How physical addressing is performed in wan, How physical addressing is per...

How physical addressing is performed in WAN?  WAN networks operate as similar to a LAN. All WAN technology describes the specific frame format a computer uses while sending an

What is perl, Perl is an interpreted language (not compiled, like Java) whi...

Perl is an interpreted language (not compiled, like Java) which is ideally suited for CGI programming. It has its roots in UNIX system administration and offers various features li

Work in standard view, Layout view is helpful for laying out Web pages. How...

Layout view is helpful for laying out Web pages. However you can adjust most of your design elements in Layout view, certain changes should be completed in Standard view. When you

Functions of header files ctype.h and string.h, What are the functions of ...

What are the functions of the following header files:  (i)  ctype.h (ii)  string.h   (i)   ctype.h: It is a header file that having character tes

Why spc is used, SPC is used for (A)  Carrying Exchange Control Functi...

SPC is used for (A)  Carrying Exchange Control Functions (B)  Carrying Subscriber Control Functions (C)  Exchange Hardware (D)  Signalling Purpose Ans:

Diffrence between cd-r vs cd rw, Q. Diffrence between CD-R vs CD RW? A ...

Q. Diffrence between CD-R vs CD RW? A CD-R disc looks same as a CD. Though all pressed CDs are silver, CD-R discs are gold or silver on their label side and a deep cyan or gree

What are delay systems in telecommunication networks, What are delay system...

What are delay systems in telecommunication networks? Delay System: A class of telecommunication networks like data a network that places the call or message arrivals in a qu

Write a program to perform multiplication of two numbers, Q. Write a progr...

Q. Write a program to perform multiplication of two numbers in specified radix. Check that entered numbers are in specified radix or not else error message should be displayed.

Stack operation and interrupts in microprocessor, Let us review the operati...

Let us review the operation of the stack within the 68HC11, the stack is a defined area of RAM which is last in first out register (LIFO) . Access to the stack is made via a stack

Explain token ring, Explain Token Ring. Token Ring: A token ring is ...

Explain Token Ring. Token Ring: A token ring is a collection of single point -to-point links, which arise from a circle. In a token ring a special bi t pattern, termed as th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd