Logical representations, Computer Engineering

Assignment Help:

Logical Representations:

If all human beings spoke the same language, there would be a much more less misunderstanding in the world. The problem regarding with software engineering in general is that there are oftenly slips in communication that mean, what we think we've told an agent and what we've actually told it are two different things. One way is to reduce this, naturally, is to justify and agree upon some concrete rules for the language we need to represent information. To justify a language, we use to specify the syntax of the language and semantics of language. To identify the syntax of a language, we must say what symbols are allowed in the language and what are legal constructions (sentences) requireing those symbols. To identify the semantics of a language, we might say that how the legal sentences are to be read, i.e., what they mean.

If we choose a particular well defined language and stick to it, that we are need a logical representation. Certain logics are very popular for the representation of information, and so range in terms of their expressiveness. Much more expressive logics allow us to translate more sentences from our natural language (e.g., English) in the language defined by the logic.


Related Discussions:- Logical representations

What is computer to computer communication, Computer to computer communicat...

Computer to computer communication is: (A)  Simplex                                   (B)  Duplex (C)  Half Duplex                             (D)  Both Duplex and Half D

Develop inventory management system and time-tabling systems, Problem: ...

Problem: Develop three sub-systems namely Staff Profiling System, Inventory Management System and Time-tabling systems. (a) Show about any three design patterns you have us

Define the term- encryption, Define the term- encryption The user would ...

Define the term- encryption The user would then type in O P E and card purchase will be authorised. This extra protection is used as well as encryption. Some of the new syste

Simple assembly programs, Data Transfer Two most fundamental data trans...

Data Transfer Two most fundamental data transfer instructions in 8086 microprocessor are XCHG and MOV. Let's give illustrations of the use of these instructions. Program 1:

Why process scheduling algorithm favour i/o bound processes, Suppose that a...

Suppose that a process scheduling algorithm favors those processes that have used the least processor time in the recent past. Why will this algorithm favour I/O- bound processes,

What is the working set of a process, What is the working set of a process?...

What is the working set of a process? The set of pages that are referred by the method in the last "n", references, where "n" is called the window of the working set of the pro

What do you meant by extranets, Extranets can be also used to connect an in...

Extranets can be also used to connect an intranet to Internet so that remote offsite access can be made in a company's intranet by an authorized individual. This can facilitate thr

Functional requirements of a control unit, Q. Functional Requirements of a ...

Q. Functional Requirements of a Control Unit? Let's first try to define functions that a control unit should perform in order to get things to happen. However in order to defin

Decision tree learning, Decision Tree Learning: Furthermore there is s...

Decision Tree Learning: Furthermore there is specified in the last lecture such as the representation scheme we choose to represent our learned solutions and the way that we l

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd