Conjunctive normal forms, Computer Engineering

Assignment Help:

Conjunctive Normal Forms:

However there for the resolution rule to resolve two sentences so they must both be in a normalised format called as conjunctive normal form, that is usually abbreviated to CNF.

Just because this is an unfortunate name thus the sentences themselves are made up of sets of disjunctions. Rather than it is implicitly assumed that the complete knowledge base is a big conjunction of the sentences, that is when conjunctive normal form gets its name. But, CNF is usually a conjunction of disjunctions. Most of the disjunctions are madeup of literals that can either be a predicate or the negation of a predicate like for the negation of a proposition or propositional read a proposition: 

Thus CNF sentences are of the form as: 

(p1 ? p2 ? ... ? pm) ^  (q1?  q2 ? ... ? qn) ^ etc. 

whether each pi and qj  is a literal means that we call the disjunction of that literals a clause. So as a concrete example like, 

likes(george, X)  ? likes(tony, george) ?  ¬ is_mad(maggie) 

that is in conjunctive normal form, so: 

likes(george, X)  ? likes(tony, george)  → ¬ is_mad(maggie) ^  is_mad(tony) 

this is not in CNF.


Related Discussions:- Conjunctive normal forms

Exit the loop on end-of-file, Continuing in main, write a loop that will re...

Continuing in main, write a loop that will read from the ifstream that reads enough information to  create a person object (i.e. first name, last name, and weight).  Exit the loop

Why we use modem, Q. Why we use Modem? A Modem is one device which most...

Q. Why we use Modem? A Modem is one device which most computer users who have surfed Internet are aware of.  A modem is neededsincehowever most of telecommunications have becom

Cemistry, Discuss scales and sludge

Discuss scales and sludge

Does weblogic jms support clustering, WebLogic JMS handles cluster-wide, tr...

WebLogic JMS handles cluster-wide, transparent access to destinations from any server in the cluster. A system administrator can set up cluster-wide, transparent access to destinat

Memory cache hierarchy and virtual memory system, 1. Detail for each of the...

1. Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps. Do not forget to mention how and during which steps each inst

Advanced microprocessor, Write a program to mask bits D3D2D1D0 and to set ...

Write a program to mask bits D3D2D1D0 and to set bits D5D4 and to invert bits D7D6 of the AX register.

Authentication verses firewall, How does an authentication system be differ...

How does an authentication system be different from a firewall into functioning? Authentication verses firewall User Authentication and Authorization A significan

What are the primary models of supply chain management, What are the primar...

What are the primary models of Supply Chain Management? Two Primary models of Supply Chain Management are illustrated below: a. Porter’s Value Chain Model and b. Supply

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd