Predicates in first-order logic sentences , Computer Engineering

Predicates in first-order logic sentences - artificial intelligence

There are predicates first and foremost in first-order logic sentences. These are indications that some things are related in some way. We call the things that are related to predicate the arguments of the predicate, and the number of arguments which are related is called the arty of the predicate. The following are examples of predicates are given:

lectures_ai(simon)       ("simon lectures AI")         arity is 1 here

 

father(bob,bill)             ("bob is bill's father")         arity is 2 here

 

lives_at                    (bryan, house_of(jack)) ("bryan lives at jack's house")        arity is 2 here

 

Posted Date: 10/2/2012 3:58:31 AM | Location : United States







Related Discussions:- Predicates in first-order logic sentences , Assignment Help, Ask Question on Predicates in first-order logic sentences , Get Answer, Expert's Help, Predicates in first-order logic sentences Discussions

Write discussion on Predicates in first-order logic sentences
Your posts are moderated
Related Questions
Q. Explain working of Jaz Drive? Jaz Drive: Jaz drive is a well-liked drive with 2GB and unleashes creativity of professionals in graphic design and software development, pub

What techniques are used to increase the clock rate R? Ans: The 2 techniques used to increase the clock rate R are: 1. We can reduce the amount of processing done in one basi

Question: 1. In Flash, what is the purpose of a motion guide layer? 2. Differentiate between Motion and Shape tween. 3. Give the steps to create a layer mask in flash.


Procedure Level Here, parallelism is obtainable in the form of parallel executable procedures. In that case, design of algorithm plays a key role. E.g. every thread in Java is

Write your text, format text, insert picture through Object window or INSERT -> IMAGE. Insert Menu provides you all features which are available under the Object window. Modify men

Explain the working of broad band ISDN. BISDN Configuration: Figure shows how access to the BISDN network is accomplished. All peripheral devices are interfaced to the acces

Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne

Explain CGI standard. The CGI Standard: Technology utilized for building dynamic web documents is termed as Common Gateway Interface (CGI). The CGI standard gives how a serv

, an HTML 4.0 element supported by Netscape6 and MSIE, defines a set of text which is associated with a specific form element. For illustration, code belo