Replacement and substitution, Computer Engineering

Replacement and substitution:

However, equivalences allow us to change one sentence with another without affecting the meaning, it means we know already that replacing one side of an equivalence into the other will have no effect so whatever on the semantics: but it will still be true for the same models. Just assume there we have a sentence S with a sub expression A that we write like S[A]. But there if we know A≡B so we can be sure the semantics of S is unaffected because we replace A with B, i.e. S[A] ≡S[B]. 

However, there we can also use A ≡B to replace any sub expression of S that is an instance of A. But there point to be remember that an instance of a propositional expression A is a 'copy' of A when some of the propositions of have been consistently replaced by original  sub expressions, e.g. to every P has been replaced by ¬Q. So than we call this replacement a substitution, and a mapping from propositions to expressions. Through applying a substitution U to a sentence S,  we find a new sentence S.U that is an instance of S. There always Ii is easy to show that if there A ≡B so A.U ≡B.U just for any substitution U, that is. an instance of an equivalence is as well an equivalence. Thus, an equivalence A ≡B allows us to change a sentence S[A'] to a logically and fundamentally equivalent one S[B'] but if we have substitution U like that A' = A.U and B' = B.U.

Posted Date: 1/11/2013 5:32:22 AM | Location : United States







Related Discussions:- Replacement and substitution, Assignment Help, Ask Question on Replacement and substitution, Get Answer, Expert's Help, Replacement and substitution Discussions

Write discussion on Replacement and substitution
Your posts are moderated
Related Questions
reate a directory "Unix" under your home directory. Command(s): ………………………………………….

Multiple Layers of Intranet Security Security requirements vary from organisation to organisation. They also vary on the content that the organisations intend to place on their

BCD to gray converter using 2:1 multiplexer

Explain dissimilar security protocols used for e-commerce applications.   The e-commerce systems of today are composed of a number of components including: a commerce server, d

I NEED THE CODES IN MATLAB FOR RESOURCE ALLOCATION IN GRID COMPUTING

What are the two broad types under which Networks will be divided? Ans: All computer networks fit in one of the two dimensions specifically: a)  Transmission Technology, thi

n=(x*2)/(1=0) the value x=0 and is used to stop the algerithin.The calculation is repeated using values of x=0 is input. There is only a need to check for error positions. The va

Some of the advantages of B2B are: i) Enhanced customer satisfaction Code ii) Enhanced inventory system iii) Simple and cost effective marketing iv) Coordination among

State the drawbacks of laptop compared to PC The main disadvantages of laptops compared to desk top PCs are: -  They tend to be more expensive to purchase -  It's easie

How can you manipulate the presentation and attributes of interactive lists? ---Scrolling by Interactive Lists. ---Setting the Cursor from within the Program. ---Changing