Eequivalences rules, Computer Engineering

Assignment Help:

Eequivalences rules:

This conveys a meaning that is actually much simpler so than you would think on first inspection. 

Hence we can justify this, by using the following chain of rewrite steps based on the equivalences we've stated above that the: 

1.      By using the double negation rewrite: P => ¬¬P 

(A ↔ B) ^ (¬A  ?¬¬B)

2.      By using De Morgan's Law: ¬P ^ ¬ Q => ¬(P?  Q) 

(A ↔ B)  ^¬ (A? ¬B) 

3.      By using the commutativity of  :? P?  Q => Q?  P 

(A ↔ B) ^ ¬ (¬ B?  A) 

4.      By using 'replace implication' from right to left: ¬ P?  Q => P→  Q 

(A↔  B)  ¬ (B→  A) 

5.      By using 'replace equivalence' from left to right: P ↔ Q => (P→  Q)^  (Q → P) 

((A → B)^  (B→  A)) ^ ¬ (B → A) 

6.      By using the associativity of  : ^(P^  Q)  R => P  (Q^  R) 

(A→  B) ^ ((B→  A) ^ ¬ (B → A)) 

7.      By using the consistency equivalence above: P  ^ ¬P => False

(A ↔ B) ^  False 

8.      By using the definition of  ^ : False

There  what does this mean? Like if it mean that our original sentence was always false: and there are no models that would make this sentence true. Such the another way to think about this is that the original sentence was too inconsistent with the rules of propositional logic there.


Related Discussions:- Eequivalences rules

What is input - output commands, Q. What is Input - Output commands? Th...

Q. What is Input - Output commands? There are four kinds of I/O commands which an I/O interface can receive when it's addressed by a processor: Control : This type of c

Difference between external and global variables, Global variables are acce...

Global variables are accessible only to the batch program while external variables can be referenced from any batch program residing in the similar system library.

How to select valid lines for secondary list, How to select valid lines for...

How to select valid lines for secondary list? To stop the user from selecting invalid lines, ABAP/4 offers various possibilities.  At the end of the processing block END-OF-SEL

Super class and subclass in programming, What is the difference among super...

What is the difference among super class and subclass in programming? Ans) A super class is a class that is inherited in programming while the sub class is a class that does th

ANS, Smugglers are becoming very smart day by day. Now they have developed ...

Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new technology, they are send

Define underflow and overflow, Define underflow and overflow. Underflow...

Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow

What are the primary models of supply chain management, What are the primar...

What are the primary models of Supply Chain Management? Two Primary models of Supply Chain Management are illustrated below: a. Porter’s Value Chain Model and b. Supply

Why are binary, Q. Why are binary, octal and hexadecimal used for computer ...

Q. Why are binary, octal and hexadecimal used for computer applications? Q. Perform the following: (189.3) 10 = (?) 2

Ready to help students, What is the process to register as expert in comput...

What is the process to register as expert in computer science

Describe the bespoke versus off-the-shelf software, Bespoke versus off-the-...

Bespoke versus off-the-shelf software Generally software packages are bought off-the-shelf. Though, certain applications (generally for industrial companies, commercial busines

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd