Ground substitution, Computer Engineering

Ground substitution:

Here the act of performing an instantiation is a function like there is only one possible outcome means we can write it as a function. And the notation Subst({X/george, Y/tony}, as (X,Y)) = likes(george, tony)  it indicates that we have made a ground substitution. 

So now we also have to recognise that we are working with sentences that form part of a knowledge base of many such sentences. Just to move on the point we see there will be constants that appear throughout the knowledge base so some that are local to a particular sentence.

Posted Date: 1/11/2013 6:01:11 AM | Location : United States







Related Discussions:- Ground substitution, Assignment Help, Ask Question on Ground substitution, Get Answer, Expert's Help, Ground substitution Discussions

Write discussion on Ground substitution
Your posts are moderated
Related Questions
A using declaration in C++ makes it likely to use a name from a namespace without the scope operator.

Make a spreadsheet that has on every line an integer student identification number followed by 3 quiz grades for that student.  Go though that information from the spreadsheet into

Data Mining is an analytic method designed to explore data and then to validate the findings by applying the detected patterns to latest subsets of data.  The ultimate goal of dat

Explain briefly any three of the commonly used code optimization techniques. 1. Common sub expression elimination: In given expression as "(a+b)-(a+b)/4", in such "common

1. Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "messa

Operations of the Web mainly depend on hypertext as its means of interacting with users. But what is hypertext? Hypertext as such is the same as regular text that is it can be read

Q. Explain Simple Interfacing? The following is a sample of the coding, used for procedure interfacing: PUBLIC CUROFF             _TEXT SEGMENT WORD PUBLIC 'CODE'

what is er diagram

Factor which helps in analysis of parallel algorithms is the total number of processors needed to deliver a solution to a provided problem. So for a given input of size let's say n

Two popular encryption techniques to ensute secured transactions on the net? 1. Translation table 2. Word/byte rotation and XOR bit masking.