Eequivalences rules, Computer Engineering

Eequivalences rules:

This conveys a meaning that is actually much simpler so than you would think on first inspection. 

Hence we can justify this, by using the following chain of rewrite steps based on the equivalences we've stated above that the: 

1.      By using the double negation rewrite: P => ¬¬P 

(A ↔ B) ^ (¬A  ?¬¬B)

2.      By using De Morgan's Law: ¬P ^ ¬ Q => ¬(P?  Q) 

(A ↔ B)  ^¬ (A? ¬B) 

3.      By using the commutativity of  :? P?  Q => Q?  P 

(A ↔ B) ^ ¬ (¬ B?  A) 

4.      By using 'replace implication' from right to left: ¬ P?  Q => P→  Q 

(A↔  B)  ¬ (B→  A) 

5.      By using 'replace equivalence' from left to right: P ↔ Q => (P→  Q)^  (Q → P) 

((A → B)^  (B→  A)) ^ ¬ (B → A) 

6.      By using the associativity of  : ^(P^  Q)  R => P  (Q^  R) 

(A→  B) ^ ((B→  A) ^ ¬ (B → A)) 

7.      By using the consistency equivalence above: P  ^ ¬P => False

(A ↔ B) ^  False 

8.      By using the definition of  ^ : False

There  what does this mean? Like if it mean that our original sentence was always false: and there are no models that would make this sentence true. Such the another way to think about this is that the original sentence was too inconsistent with the rules of propositional logic there.

Posted Date: 1/11/2013 5:46:17 AM | Location : United States







Related Discussions:- Eequivalences rules, Assignment Help, Ask Question on Eequivalences rules, Get Answer, Expert's Help, Eequivalences rules Discussions

Write discussion on Eequivalences rules
Your posts are moderated
Related Questions
In computer science, garbage collection (GC) is a form of automatic memory management. The garbage collector, or just collector, attempts to reclaim garbage, or memory occupied by

Token packets in universal serial bus - computer architecture: Token packets consist of a PID byte followed by two payload bytes: a 5-bit CRC and 11 bits of address. Tokens

TYPEWRITERS : Typewriter is the most common machine used in almost all offices. Typewritten letters are attractive in appearance as compared to handwritten ones. The same matter c

State the data flow diagramming conpects The approach to data flow diagramming is as follows: Create a data flow diagram for each of major outputs of system Work ba

How does an authentication system be different from a firewall into functioning? Authentication verses firewall User Authentication and Authorization A significan

A sorting method which uses the binary tree concept such that label of any node is larger than all  the labels in the sub trees, is called A Sorting method which uses the binar

what are polygon rendering methods?

Q. Show Network Topology in digital system? This deals with the geometrical arrangement of nodes (endpoints consisting of physical devices such as terminals, printers, PCs, and

What is the Network Service Access Policy A high-level, issue-specific policy which defines those services that are allowed or denied from the restricted network. It also co

What are conditions under which a deadlock situation may arise? A deadlock situation can arise if the following four conditions hold concurrently in a system:  a. Mutual exc