Eequivalences rules, Computer Engineering

Assignment Help:

Eequivalences rules:

This conveys a meaning that is actually much simpler so than you would think on first inspection. 

Hence we can justify this, by using the following chain of rewrite steps based on the equivalences we've stated above that the: 

1.      By using the double negation rewrite: P => ¬¬P 

(A ↔ B) ^ (¬A  ?¬¬B)

2.      By using De Morgan's Law: ¬P ^ ¬ Q => ¬(P?  Q) 

(A ↔ B)  ^¬ (A? ¬B) 

3.      By using the commutativity of  :? P?  Q => Q?  P 

(A ↔ B) ^ ¬ (¬ B?  A) 

4.      By using 'replace implication' from right to left: ¬ P?  Q => P→  Q 

(A↔  B)  ¬ (B→  A) 

5.      By using 'replace equivalence' from left to right: P ↔ Q => (P→  Q)^  (Q → P) 

((A → B)^  (B→  A)) ^ ¬ (B → A) 

6.      By using the associativity of  : ^(P^  Q)  R => P  (Q^  R) 

(A→  B) ^ ((B→  A) ^ ¬ (B → A)) 

7.      By using the consistency equivalence above: P  ^ ¬P => False

(A ↔ B) ^  False 

8.      By using the definition of  ^ : False

There  what does this mean? Like if it mean that our original sentence was always false: and there are no models that would make this sentence true. Such the another way to think about this is that the original sentence was too inconsistent with the rules of propositional logic there.


Related Discussions:- Eequivalences rules

Describe the functionality of software testing, What do you do if you have ...

What do you do if you have given functionality that wasn't listed in the requirements? - If the functionality isn't essential to the purpose of the application, it should be re

What is the difference among character and block devices, a. What is the di...

a. What is the difference among character and block devices? b. Discuss the method to make a Kernel Driver for the PC Speaker. c. Explain the socket structure with the help o

How does the xml serializer work, How does the Xml Serializer work?  What A...

How does the Xml Serializer work?  What ACL permissions does a process using it require?   Xml Serializer needs write permission to the system's TEMP directory.

C, "Super ASCII", if it contains the character frequency equal to their asc...

"Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''a''-''z'') and the ascii values will starts from

Which types of software programs are usually supported, Which types of soft...

Which types of software programs are usually supported? Our organization is unique in that we are very flexible and can meet most client requires relative to the integration of

Detemine the major building blocks of uml, Detemine the major building bloc...

Detemine the major building blocks of UML UML could be used in visualizing, specifying, constructing and documenting object oriented systems. The major building blocks of UML a

What are the rules of timescale directive, What are the Rules of Timescale ...

What are the Rules of Timescale directive Rules -  'Timescale directive, like all compiler directives, affects all modules compiled after directive,  whether  in  same  fi

De moiver theorem, application of de moiver theorem in software engineering...

application of de moiver theorem in software engineering

How to maintain lists, How to maintain lists? To return from a high li...

How to maintain lists? To return from a high list level to the next-lower level (SY-LSIND), the user chooses back on a secondary list.  The system then gives the currently dis

Machine centred versus human centred, Machine Centred versus human Centred ...

Machine Centred versus human Centred The discussion here is based on the difference in approach to the design of the work system when we prioritise either the needs of the mac

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd