Proof by contradiction, Computer Engineering

Assignment Help:

Proof by Contradiction:

Now for forward chaining and backward chaining both have drawbacks. But another approach is to think about proving theorems by contradiction. So we can say these are very common in mathematics: mathematicians simply some axioms, after do this make an assumption. In fact after some complicated mathematics there they have shown like an axiom is false or something derived from the axioms that did not involve the assumption is false. So as the axioms are irrefutably correct because the assumption they made must be false. However the assumption is inconsistent with the axioms of the theory. Just To need this for a particular theorem that they want to prove is true but they negate the theorem statement for use this as the assumption they are going to show is false. But as the negated theorem must be false, then their original theorem must be true. Bingo! 

Now we can program our reasoning agents to do just the same. Just to simplify this as a search problem, then therefore we have to say that as the axioms of our theory and the negation of the theorem that we want to prove are the initial search states. Thus if we can deduce the false statement from our axioms so the theorem we were trying to prove will the false statement from our axioms and the theorem we were trying to prove will indeed have been proven. Because not only can we use all our rules of inference also have a goal to aim for.


Related Discussions:- Proof by contradiction

Computer graphics, list out of merit and de-merit plasma display

list out of merit and de-merit plasma display

Explain bitwise left shift and right shift operators, Bitwise Left Shift an...

Bitwise Left Shift and Right Shift Operators: > shift-expression : additive-expression shift-expression > additive-expression The bitwise shift operators shift their

The concept of process-parallel computing, The Concept of Process Infor...

The Concept of Process Informally, a method is a program in execution, behind the program has been loaded in the main memory. However, a method is more than just a program code

Ai6301 - building blocks and techniques used in ai, The princess (or princ...

The princess (or prince if you're female) has been captured by the Evil Dragon and held prisoner in a tower. The tower is also surrounded by a maze to keep out the riff-raff. You

How do you decide which integer type to use, It depends on our requirement....

It depends on our requirement. When we are needed an integer to be stored in 1 byte (means less than or equal to 255) we use short int, for 2 bytes we use int, for 8 bytes we use l

Two ways in which one can retrieve data from tables, In general what are th...

In general what are the two ways in which one can retrieve data from tables? Using Select statements, Database Program.

IEEE802.4 Token Bus Network, en a five station token bus LAN with station a...

en a five station token bus LAN with station addresses of 3000, 500, 100, 70, and 50. Stations with addresses of 5000, 4000, 400, 90, and 60 are waiting to enter the ring. Assume a

Explian two limitations of dead-box analysis, (a) Explian two limitations o...

(a) Explian two limitations of dead-box analysis. (b) Describe why memory analysis is difficult. (c) With reference to the "Shadow Walker" rootkit, explain what is meant by

Translator for low level programming language, Translator for low level pro...

Translator for low level programming language were called as    Assembler

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd