Function name or connective symbol, Computer Engineering

Assignment Help:

Function name or connective symbol:

Whether if we write op(x) to signify the symbol of the compound operator then predicate name and function name or connective symbol are there. 

  • However the function isa_list(x) checks where x is a list and if we write head(L) for the first term in a list L and tail(L) for the sublist comprising all the other terms except the head than the head of [2,3,5,7,11] is 2 and hence the tail is [3,5,7,11]. So it means there is terminology is common in Prolog.

Here if notice for instance it's easiest to explain the unification algorithm as a recursive method that is able to call itself. But as there is happening, so a set, mu, is passed around the various parts of the algorithm by collecting substitutions as it goes. Furthermore the method has two main parts as:

 unify_internal(x,y,mu) 

As above we see there that returns a substitution in that makes sentence x  look exactly like sentence y, in given an before now existing set of substitutions mu as although mu may be empty. Now we can say that this type function checks various properties of  x  and  y  and calls either the unify_variable  routine, as described below or itself again. Always remembering there the order of the if-statements is important but if a failure is reported at any stage then the entire function fails. So if none of the cases is true for the input such as the algorithm fails to find a unifying set of substitutions obviously.


Related Discussions:- Function name or connective symbol

Find farthest distance from exchange where subscriber locate, An exchange u...

An exchange uses a -40 V battery to drive subscriber lines. A resistance of 250 ohms is placed in series with the battery to protect it from short circuits. The subscribers are req

Ruby, Discuss anout variables and assignment statements in ruby

Discuss anout variables and assignment statements in ruby

Illustrate about system memory-management mode, Memory - management mode ...

Memory - management mode System memory-management mode (SMM) is on the same level as protected mode, real mode and virtual mode though it is provided to function as a manager

Determine why a new system is required, Q. Determine why a new system is re...

Q. Determine why a new system is required? Feasibility Study: - Feasibility study is the method of defining the current problem determining why a new system is essential and

Multiple instances of sql server 2000, How do I connect to an SQL Server in...

How do I connect to an SQL Server instance that is running on a machine with multiple instances of SQL Server 2000? Ans) Every instance of MS SQL Server must be listening on a d

Instruction level-levels of parallel processing, Instruction Level It r...

Instruction Level It refers to the condition where different instructions of a program are implemented by different processing elements. Most processors have numerous execution

Explain about the network security, Explain about the network security. ...

Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati

Assignment, zero, one, two three address instructions

zero, one, two three address instructions

Show the classification of networks, There are various approaches to the cl...

There are various approaches to the classification of Computer Networks. One such classification is based on distance approach. Networks can be classified into LAN, WAN and MAN net

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd