First order predicate logic - artificial intelligence, Computer Engineering

Assignment Help:

First Order Predicate Logic :

This is a more expressive logic because it is mostly builds on propositional logic by allowing us to needs as constants, variables, predicates, functions and quantifiers in addition to the connectives we've already seen. For instance, in the sentence like: "Every Monday and Wednesday I go to John's house for dinner" can be written in first order predicate logic as:

∀X ((day_of_week(X, monday) ∨ day_of_week(X, wednesday))
→ (go_to(me, house_of(john)) ^ eat_meal(me, dinner))).

Hence there, the symbols monday, wednesday, me, dinner and john are all constants: base-level objects in the world about that we want to talk. There is the symbols of day_of_week, go_to and eat_meal are predicates that is represent relationships between the arguments that can be appear inside the brackets. For example we see that in eat_meal the relationship justify that a person's first argument eats a particular meal (second argument). Moreover, we have represented the fact in which me eats dinner. The symbol X is a variable, that can take on a range of values. This enables us to be much more expressive, and in particular, we can just quantify X with the 'for all' ∀ symbol, so that our sentence of predicate logic talks about all possible X's. And finally, the symbol of house_of is a function, and - if we can - we are just expected to swap house_of(john) with the output of the function (john's house) given the input to the function (john).

The syntax and semantics both are predicate of logic and they are covered in much more detail as part of the lectures on automated reasoning.

 


Related Discussions:- First order predicate logic - artificial intelligence

Describe data structures used during passes of assembler, Describe Data str...

Describe Data structures used during passes of assembler and their use. During passes of assembler, the Data structures define as: Pass 1 data base Input source pro

Explain in brief about the broadband, Explain in brief about the broadband ...

Explain in brief about the broadband It isn't just computers which can be linked without wires, different peripheral devices can be linked to a computer system without the need

Convergence mean with respect to e-commerce, What does the term convergence...

What does the term convergence mean with respect to E-commerce? Convergence with respect to e-commerce   The ability to leverage and integrate the several data sources and

Abap/4 dictionary structures without an underlying database, It is not poss...

It is not possible to use ABAP/4 Dictionary Structures without an underlying database using LDB. True.  You can use additionally related tables, along with the tables explaine

What are the different types of bios, The  most common types are the AWARD,...

The  most common types are the AWARD,AMI, AND phoenix

Determine the types of sensors, Determine the types of Sensors Differe...

Determine the types of Sensors Different types of sensors are used to give real time information to computers. Frequently, an analogue to digital converter (ADC) is required a

What is master slave kernel, Q. What is Master slave kernel? Master sl...

Q. What is Master slave kernel? Master slave kernel: In this model just one of processors is assigned as Master.  The master is in charge for subsequent activities:  i)

Explain about interrupt cycle, Q. Explain about Interrupt Cycle? On com...

Q. Explain about Interrupt Cycle? On completion of execute cycle the current instruction execution gets completed. At this point a test is made to conclude whether any enabled

What is gui status, What is GUI status? How to create /Edit GUI status? ...

What is GUI status? How to create /Edit GUI status? A GUI status is a subset of the interface elements used for a certain screen. The status comprises those elements that are c

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd