Double negation, Computer Engineering

Double Negation :

All parents are forever correcting their children for the find of double negatives,  there we have to be very alert with them in natural language like: "He didn't tell me not to do it" doesn't essentially means the same as "He did tell me to do it". So there is same true with logical sentences: that we cannot, let see example, change ¬(P ^ Q) to (¬ P ^ ¬Q) without risking the meaning of the sentence changing. Moreover, when we can alter expressions with negation there are certain cases. But there is two possibilities are given by de Morgan's law below, so we can also justify statements by removing double negation. Thus there are some cases when a proposition has two negation signs in front of it, like : ¬¬P. 

Here you may be questioning that why on earth anyone would ever write down a sentence with just like a double negation in the first place. But really, you're right. As there humans, so we wouldn't write a sentence in logic such that. Wherever, remember that our agent will be doing search utilising rewrite rules. So there it may be that as part of the search, but they introduce a double negation, through following a particular rewrite rule to the letter.

Posted Date: 1/11/2013 5:40:01 AM | Location : United States







Related Discussions:- Double negation, Assignment Help, Ask Question on Double negation, Get Answer, Expert's Help, Double negation Discussions

Write discussion on Double negation
Your posts are moderated
Related Questions
Can we specify file transfer in a Web page? Explain with the help of suitable example. Yes, file transfer can be given in a web page. The first field within a URL gives a proto

Q. QWERTY - Keyboard Layout ? A keyboard layout is arrangement of keys across the keyboard. There is one keyboard layout which anybody who has worked on a standard keyboard or

Explain in detail about the Random Scan Display   This device using CRT directs the electron beam only to the parts of the screen where a picture is to be drawn. This kind of d

For what is defparam used? Though,  during  compilation  of  Verilog  modules,  parameter  values  can  be  altered  separately  for every module instance. This allows us to pa

what is transform mapping and transaction mapping?

Advantages & Disadvantages Enhanced security and convenience: private keys never require be transmitting or revealing to anyone.  They can givce a method for digital signatu

Define the term web service with example. A web service is an application that operate over a network-typically, over the Internet. Most typically, a web service is an API that

The main reason to encrypt a file is to ? Ans. The main purpose to encrypt a file is to secure that for transmission.

The statement of Gustafson's law can be described with the help of an illustration. Let us take a problem, say P, which has to be solved using a parallel computer. Let Ts be the ti

What is sensitivity list? A list of signals which trigger execution of the block when they change value. Sensitivity list  indicates that when a change occurs to any one of