Modus ponens rule, Computer Engineering

Modus ponens rule:

In fact the general format for the modus ponens rule is as follows: like if we have a true sentence that states the proposition A implies proposition B and we see that proposition A is true, where we can infer that proposition B is true. So the notation we use for this is as follows: 

(A→B, A)÷B

Hence it is an example of an inference rule. There is the comma above the line indicates both these things in our knowledge base so we see there the line stands for the deductive step. However, if we know there both the propositions above the line are true so we can deduce in which the proposition below the line is also true. In fact generally, an inference rule as

A ÷B

is sound  if we can be sure there that like A  entails B, i.e. B is true where A is true. In formally, there A entails B means such as if M is a model of A then M is also a model of B. Than we write this as

737_Other Equivalences1.png

After that this gives us a way to check the soundness of propositional inference rules: (i) draw up a logic table for both A and B estimating them for all models, other is (ii) check that where A is true and then B is also true. So here we don't care that about the models for which A is false.

Posted Date: 1/11/2013 5:49:18 AM | Location : United States







Related Discussions:- Modus ponens rule, Assignment Help, Ask Question on Modus ponens rule, Get Answer, Expert's Help, Modus ponens rule Discussions

Write discussion on Modus ponens rule
Your posts are moderated
Related Questions
CGI is significant whenever you require to retain state information about a user, or run an application which communicates with the server. Things like guestbook's, Chat clients, d

What is a serial port?  A serial port transfers and receives data single bit at a time.

What are different EDI components and EDI services? Different EDI components and EDI services are illustrated as: Three main components including services in EDI System are

Q. Benefit of digital versatile disk read only memory? The main benefit of having CAV is that individual blocks of data can be accessed at semi-random mode. So head can be move

Five popular hashing functions are as follows:- Division Method Midsquare Method Folding Method Multiplicative method Digit Analysis

A) What does this file have? Where was the information in this file acquired from? What is the information in this file used for? B)  What is the range for popular ports? What i

1. LINQ to Objects - Implements a LINQ query against a collection of objects 2. LINQ to XML - Implements an XPATH query against XML documents 3. LINQ to SQL - Implements LINQ

CISC Approach - CISC architecture: The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardwa

Discuss the functioning of different network access equipments. The E1 multiplexers MX2000 and MX2411 and E1/T1 MX200 are giving multi interface user access to network PDH or S

Explain about the term false path? How it find out in circuit? What the effect of false path in circuit? By timing all the paths into the circuit the timing analyzer can find o