Functions - first-order logic, Computer Engineering

Functions - first-order logic:

Functions can be thought of as exceptional predicates, wherever we think of all but one of the arguments as input and the output as final argument. Thus such each set of things such kind of classed are as the input to a function, there is exactly one output to just that they are related by the function. To compose it obvious that we are dealing with specify a function, we can need an equality sign. So, for example, if we wanted to say that the cost of an omelette at the Red Lion pub is five pounds, the normal way to express it in first-order logic would probably be:

cost_of(omelette, red_lion, five_pounds)

However, because we know this is a function, we can make this clearer:

390_Functions.png


Because we know that there is only one output for every set of inputs to a function, we tolerate ourselves to use an abbreviation when it would make things clearer. That is, we can talk about the output from a function without explicitly writing it down, so to rather replacing it with the left hand side of the equation. So, it can be easily understand by example, if we wanted to tell that the price of omelettes at the Red Lion is less than the price of pancakes at the House Of Pancakes, then we would normally write something like this:

2167_Functions1.png

Posted Date: 1/10/2013 5:23:06 AM | Location : United States







Related Discussions:- Functions - first-order logic, Assignment Help, Ask Question on Functions - first-order logic, Get Answer, Expert's Help, Functions - first-order logic Discussions

Write discussion on Functions - first-order logic
Your posts are moderated
Related Questions
CGI stands for Common Gateway Interface, and is a mechanism by which a browser is permitted to communicate with programs running on a server. If you look at every word in turn it m

What are the different types of layers in TCP/IP protocol stack? Layers into the TCP/IP protocol architecture are as given below: • Application Layer, • Host-to-Host Tra

Full form of is DHCP: Dynamic Host Control Protocol. It is mainly used to bound MAC Addresses of system. Especially for Wireless System.

What are transmission bridges? A usual transmission bridge is demonstrated in figure. The series capacitance and the shunt inductances of the two relays give a high-pass filte

Loop Level At this stage, following loop iterations are candidates for parallel execution. Though, data dependencies among subsequent iterations can restrict parallel execution

Determine about the Information centres Airports, supermarkets and any application where information needs to be relayed to customers, gain advantage from having automatic inf

Explain the working of a demultiplexer with the help of an example. Ans: 1:4 Demultiplexer: Fig.(a) demonstrates the logic circuit of a 1:4 demultiplexer. This has two NOT

The term byte stuffing refers to: The term byte stuffing consider as to data stuffing used along with character -oriented hardware.

Explain briefly any three of the commonly used code optimization techniques. 1. Common sub expression elimination: In given expression as "(a+b)-(a+b)/4", in such "common

Illustrate the term Extranet? Extranet: Extranet is Extension of an Intranet that makes thelatter accessible to outside companies or individuals with or without an intran