First order predicate logic - artificial intelligence, Computer Engineering

Assignment Help:

First Order Predicate Logic :

This is a more expressive logic because it is mostly builds on propositional logic by allowing us to needs as constants, variables, predicates, functions and quantifiers in addition to the connectives we've already seen. For instance, in the sentence like: "Every Monday and Wednesday I go to John's house for dinner" can be written in first order predicate logic as:

∀X ((day_of_week(X, monday) ∨ day_of_week(X, wednesday))
→ (go_to(me, house_of(john)) ^ eat_meal(me, dinner))).

Hence there, the symbols monday, wednesday, me, dinner and john are all constants: base-level objects in the world about that we want to talk. There is the symbols of day_of_week, go_to and eat_meal are predicates that is represent relationships between the arguments that can be appear inside the brackets. For example we see that in eat_meal the relationship justify that a person's first argument eats a particular meal (second argument). Moreover, we have represented the fact in which me eats dinner. The symbol X is a variable, that can take on a range of values. This enables us to be much more expressive, and in particular, we can just quantify X with the 'for all' ∀ symbol, so that our sentence of predicate logic talks about all possible X's. And finally, the symbol of house_of is a function, and - if we can - we are just expected to swap house_of(john) with the output of the function (john's house) given the input to the function (john).

The syntax and semantics both are predicate of logic and they are covered in much more detail as part of the lectures on automated reasoning.

 


Related Discussions:- First order predicate logic - artificial intelligence

Token packets - universal serial bus, Token packets in universal serial b...

Token packets in universal serial bus - computer architecture: Token packets consist of a PID byte followed by two payload bytes: a 5-bit CRC and 11 bits of address. Tokens

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Multisim simulation file, Build the circuit using the Asynchronous Counter ...

Build the circuit using the Asynchronous Counter Technique with JK FF and relevantgates capable of executing the counting sequence as {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}Simulate the cir

Typewriters information distribution, TYPEWRITERS : Typewriter is the most...

TYPEWRITERS : Typewriter is the most common machine used in almost all offices. Typewritten letters are attractive in appearance as compared to handwritten ones. The same matter c

Information technology or information system, Information Technology or Inf...

Information Technology or Information System Before going further we need to clarify what we mean by the term information system. It is easy to confuse terminology as many tex

Interrupt - driven input-output, Q. Interrupt - Driven Input-output? Pr...

Q. Interrupt - Driven Input-output? Problem with programmed I/O is that processor has to wait a long time for I/O interface to see whether a device is free or waits until compl

Push and pop, i want flowchart for push, pop in stack element and display s...

i want flowchart for push, pop in stack element and display stack and exit

Write shorts notes on remote procedure call, Write shorts notes on Remote P...

Write shorts notes on Remote Procedure Call (RPC) The facility whihc was created to help the programmers write client server software is termed as Remote Procedure Call. Within

Can we convert the column data into row data, We download data which arrive...

We download data which arrives to me in a column. I need to use it in a complex sheet that requires data in a row. How can we convert the column data into row data?   Ans) H

What are the various hazards encountered in pipelining, What is pipelining?...

What is pipelining? What are the various hazards encountered in pipelining?  Explain in detail. The major characteristics of a pipeline are: a) Pipelining cannot be exe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd