Function name or connective symbol, Computer Engineering

Assignment Help:

Function name or connective symbol:

Whether if we write op(x) to signify the symbol of the compound operator then predicate name and function name or connective symbol are there. 

  • However the function isa_list(x) checks where x is a list and if we write head(L) for the first term in a list L and tail(L) for the sublist comprising all the other terms except the head than the head of [2,3,5,7,11] is 2 and hence the tail is [3,5,7,11]. So it means there is terminology is common in Prolog.

Here if notice for instance it's easiest to explain the unification algorithm as a recursive method that is able to call itself. But as there is happening, so a set, mu, is passed around the various parts of the algorithm by collecting substitutions as it goes. Furthermore the method has two main parts as:

 unify_internal(x,y,mu) 

As above we see there that returns a substitution in that makes sentence x  look exactly like sentence y, in given an before now existing set of substitutions mu as although mu may be empty. Now we can say that this type function checks various properties of  x  and  y  and calls either the unify_variable  routine, as described below or itself again. Always remembering there the order of the if-statements is important but if a failure is reported at any stage then the entire function fails. So if none of the cases is true for the input such as the algorithm fails to find a unifying set of substitutions obviously.


Related Discussions:- Function name or connective symbol

What are the external storage systems, External storage systems A numb...

External storage systems A number of different types of external memory devices are available now. Some of these are considered below (hard drives haven't been mentioned as th

What is a privileged instruction, What is a privileged instruction? To ...

What is a privileged instruction? To protect the operating system of a computer from being corrupted by user programs, particular instructions can be executed only whereas the

Explain difference between risc and cisc, RISC-Means Reduced Instruction Se...

RISC-Means Reduced Instruction Set Computer. A RISC system has decreased number of instructions and more significantly it is load store architecture were pipelining can be executed

Conversion of fractional number into its binary number, Conversion of fract...

Conversion of fractional number 0.6875 into its equivalent binary number ? Ans. Multiply the fractional number 0.6875 with 2 until the remainder becomes 0 that is, Ther

What are the advantages of using xml over html, What are the advantages of ...

What are the advantages of using XML over HTML? The root cause of the problem lies within HTML that is Hyper Text Markup Language, the defector standard for web publication. Th

Entrepreneurship, explain succession planning and strategies for harvesting...

explain succession planning and strategies for harvesting and ending the venture

Illustrate associative memory, Q. Illustrate Associative Memory? The ti...

Q. Illustrate Associative Memory? The time required to find an item which is stored in memory can be decreased significantly if stored data can be identified for access by cont

What is the need of modem in data communication, What is the need of MODEM ...

What is the need of MODEM in data communication? Need of Modem: Modems are utilized to interface computer networks, computers and other terminal equipment for radio channels

Does gimp have scanner support, Yes. It's available on Windows and uses TWA...

Yes. It's available on Windows and uses TWAIN, and on GNU/Linux you constant have a choice among XSane and gnome-scan - both can be used as GIMP plug-ins.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd