SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Formal Logic




        Mathematical Structures
         for Computer Science
                Chapter 1	





Copyright © 2006 W.H. Freeman & Co.       MSCS Slides   Formal Logic
Predicate Logic
     ●        Similar to propositional logic for solving arguments, build from
              quantifiers, predicates and logical connectives.	

     ●        A valid argument for predicate logic need not be a tautology.	

     ●        The meaning and the structure of the quantifiers and predicates
              determines the interpretation and the validity of the arguments	

     ●        Basic approach to prove arguments:	

                ■    Strip of quantifiers	

                ■    Manipulate the unquantified wffs	

                ■    Reinsert the quantifiers	

          	

         	

      	

       	

	

                                       Four new inference rules	



                 Two rules to strip the qualifiers	

      Two rules to reinsert the qualifiers	



     ●        Note to remember: P(x) could be (∀y) (∀z) Q(x,y,z) 	

Section 1.4                                            Predicate Logic                             1
Inference Rules
          From	

           Can Derive	

           Name /                Restrictions on Use	

                                                  Abbreviation	

        (∀x)P(x)	

        P(t) where t is a        Universal           If t is a variable, it must
                         variable or constant    Instantiation- ui	

   not fall within the scope
                                symbol	

                                  of a quantifier for t	

        (∃x)P(x)	

        P(t) where t is a       Existential           Must be the first rule
                         variable or constant    Instantiation- ei	

    used that introduces t	

                        symbol not previously
                           used in a proof
                               sequence	

              P(x)	

         (∀x)P(x)	

          Universal                P(x) has not been
                                                Generalization- ug	

       deduced from any
                                                                        hypotheses in which x is
                                                                        a free variable nor has P
                                                                         (x) been deduced by ei
                                                                        from any wff in which x
                                                                             is a free variable	

      P(x) or P(a)	

         (∃x)P(x)	

          Existential        To go from P(a) to (∃x)P
                                                Generalization- eg	

 (x), x must not appear in
                                                                                P(a)	


Section 1.4                                       Predicate Logic                                     2
Examples: Proofs using Predicate Logic

     ●        Prove the following argument:	

              ■     All flowers are plants. Sunflower is a flower. Therefore, sunflower
                    is a plant.	

              ■     P(x) is “ x is a plant”	

              ■     a is a constant symbol (Sunflower)	

              ■     Q(x) is “x is a flower”	

     ●        The argument is (∀x)[Q(x) → P(x)] Λ Q(a) → P(a)	

     ●        The proof sequence is as follows:	


              1.    (∀x)[Q(x) → P(x)]        	

hyp	

              2.    Q(a)    	

     	

      	

hyp	

              3.    Q(a) → P(a)     	

      	

1, ui	

              4.    P(a)    	

     	

      	

2, 3, mp	




Section 1.4                                    Predicate Logic                        3
Examples: Proofs using Predicate Logic

     ●        Prove the argument (∀x)[P(x) → Q(x)] Λ [Q(y)]ʹ′ → [P(y)]ʹ′	

     ●        Proof sequence:	


              1.    (∀x)[P(x) → Q(x)]       	

hyp	

              2.    [Q(y)]ʹ′ 	

    	

     	

hyp	

              3.    P(y) → Q(y)     	

     	

1, ui	

              4.    [P(y)]ʹ′ 	

    	

     	

2, 3, mt	



     ●        Prove the argument (∀x)P(x) → (∃x)P(x) 	

     ●        Proof sequence:	


              1.    (∀x)P(x) 	

      	

   	

hyp	

              2.    P(x)     	

      	

   	

1, ui	

              3.    (∃x)P(x) 	

      	

   	

2, eg	


Section 1.4                                   Predicate Logic                 4
Examples: Proofs using Predicate Logic

     ●        Prove the argument (∀x)[P(x) → Q(x)] Λ (∀x)P(x) → (∀x)Q(x)	

     ●        Proof sequence:	


              1.    (∀x)[P(x) → Q(x)]            	

hyp	

              2.    (∀x)P(x) 	

    	

          	

hyp	

              3.    P(x) → Q(x)     	

          	

1, ui	

              4.    P(x)     	

    	

2, ui : no restriction on ui about reusing a name	

              5.    Q(x)     	

    	

          	

3, 4, mp	

              6.    (∀x)Q(x)	

     	

          	

5, ug	



     ●        Note: step 6 is legitimate since x is not a free variable in any
              hypothesis nor was ei used before	





Section 1.4                                       Predicate Logic                             5
Examples: Proofs using Predicate Logic

     ●           Prove the argument 	

              	

   	

(∀x)[P(x) Λ Q(x)] → (∀x)P(x) Λ (∀x)Q(x)	


     ●        Proof sequence:	


               1.    (∀x)[P(x) Λ Q(x)]      	

                	

hyp	

               2.    P(x) Λ Q(x)      	

   	

                	

1, ui	

               3.    P(x)     	

     	

   	

                	

2, sim	

               4.    Q(x)     	

     	

   	

                	

2, sim	

               5.    (∀x)P(x) 	

     	

   	

                	

3, ug	

               6.    (∀x)Q(x)	

      	

   	

                	

4, ug	

               7.    (∀x)P(x) Λ (∀x)Q(x)    	

                	

5, 6, con	





Section 1.4                                       Predicate Logic                6
Examples: Proofs using Predicate Logic

     ●           Prove the argument 	

              	

   	

(∀y)[P(x) → Q(x,y)] → [P(x) → (∀y)Q(x,y)] 	


     ●           Using the deduction method, we can derive	

              	

   	

(∀y)[P(x) → Q(x,y)] Λ P(x) → (∀y)Q(x,y)	


     ●        Proof sequence:	


               1.    (∀y)[P(x) → Q(x,y)]    	

                	

hyp	

               2.    P(x)    	

     	

    	

                	

hyp	

               3.    P(x) → Q(x,y)   	

    	

                	

1, ui	

               4.    Q(x,y) 	

      	

    	

                	

2, 3, mp	

               5.    (∀y)Q(x,y)      	

    	

                	

4, ug	



Section 1.4                                       Predicate Logic               7
Temporary hypotheses
     ●        A temporary hypothesis can be inserted into a proof sequence.
              If T is inserted as a temporary hypothesis and eventually W is
              deduced from T and other hypotheses, then the wff T → W has
              been deduced from other hypotheses and can be reinserted into
              the proof sequence	


     ●           Prove the argument 	

              	

   	

[P(x) → (∀y)Q(x,y)] → (∀y)[P(x) → Q(x,y)] 	


     ●        Proof sequence:	

               1.    P(x) → (∀y)Q(x,y)      	

         	

hyp	

               2.    P(x)    	

     	

    	

temporary hypothesis	

               3.    (∀y)Q(x,y)      	

    	

1, 2, mp	

               4.    Q(x,y) 	

      	

    	

3, ui	

               5.    P(x) → Q(x,y)   	

    	

temp. hyp discharged	

               6.    (∀y)[P(x) → Q(x,y)]    	

5, ug	


Section 1.4                                   Predicate Logic                  8
More Examples
     ●        Prove the sequence [(∃x)A(x)]ʹ′ ⇔ (∀x)[A(x)]ʹ′ 	

              ■     To prove equivalence, implication in each direction should be proved	

     ●        Proof sequence for [(∃x)A(x)]ʹ′ → (∀x)[A(x)]ʹ′ 	

              1.    [(∃x)A(x)]ʹ′        	

       	

hyp	

              2.    A(x)      	

       	

       	

temp. hyp	

              3.    (∃x)A(x) 	

        	

       	

2, eg	

              4.    A(x) → (∃x)A(x)     	

       	

temp. hyp discharged	

              5.    [A(x)]ʹ′ 	

        	

       	

1, 4, mt	

              6.    (∀x)[A(x)]ʹ′        	

       	

5, ug	

     ●        Proof sequence for (∀x)[A(x)]ʹ′ → [(∃x)A(x)]ʹ′ 	

              1.    (∀x)[A(x)]ʹ′         	

      	

hyp	

              2.    (∃x)A(x) 	

         	

      	

temp. hyp	

              3.    A(a)      	

        	

      	

2, ei	

              4.    [A(a)]ʹ′ 	

         	

      	

1, ui	

              5.    [(∀x)[A(x)]ʹ′]ʹ′     	

      	

3, 4, inc	

              6.    (∃x)A(x) → [(∀x)[A(x)]ʹ′]ʹ′      temp. discharged
              7.    [((∀x)[A(x)]ʹ′)ʹ′]ʹ′             1, dn
              8.    [(∃x)A(x)]ʹ′                     6, 7, mt
Section 1.4                                         Predicate Logic                           9
Proving Verbal arguments
   ●          Every crocodile is bigger than every alligator. Sam is a crocodile. But
              there is a snake, and Sam isn’t bigger than that snake. Therefore,
              something is not an alligator.	

              ■      Use C(x): x is a crocodile; A(x): x is an alligator, B(x,y): x is bigger than y,
                     s is a constant (Sam), S(x): x is a Snake	

   ●          Hence prove argument
              (∀x) (∀y)[C(x) Λ A(y) → B(x,y)] Λ C(s) Λ (∃x)(S(x) Λ [B(s,x)]ʹ′) → (∃x)[A(x)]	

              1.     (∀x) (∀y)[C(x) Λ A(x) → B(x,y)]                      hyp
              2.     C(s)                                                 hyp
              3.     (∃x)(S(x) Λ [B(s,x)]ʹ′)                              hyp
              4.     (∀y)[C(s) Λ A(y) → B(s,y)]                           1, ui
              5.     S(a) Λ [B(s,a)]ʹ′)                                   3, ei
              6.     C(s) Λ A(a) → B(s,a)                                 4, ui
              7.     [B(s,a)]ʹ′                                           5, sim
              8.     [C(s) Λ A(a)]ʹ′                                      6, 7, mt
              9.     [C(s)]ʹ′ V [A(a)]ʹ′                                  9, De Morgan
              10.    [[C(s)]ʹ′]ʹ′                                         2, dn
              11.    [A(a)]ʹ′                                             9, 10, ds
              12.    (∃x)[A(x)]ʹ′                                         11, eg

Section 1.4                                           Predicate Logic                               10
Class Exercise
     ●        Prove the argument 	

 	

          	

(∀x)[(B(x) V C(x)) → A(x)] → (∀x)[B(x) → A(x)] 	



              Proof sequence:

              1.    (∀x)[(B(x) V C(x)) → A(x)]                     hyp
              2.    (B(x) V C(x)) → A(x)                           1, ui
              3.    B(x)                                           temp. hyp
              4.    B(x) V C(x)                                    3, add
              5.    A(x)                                           2, 4, mp
              6.    B(x) → A(x)                                    temp. hyp discharged
              7.    (∀x)[B(x) → A(x)]                              6, ug




Section 1.4                                      Predicate Logic                          11
Class exercise
   ●     Every ambassador speaks only to diplomats, and some ambassadors speak
         to someone. Therefore, there is a diplomat.	

   ●     Use A(x): x is an ambassador; S(x,y): x speaks to y; D(x): x is a diplomat	


     Prove the argument
     (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] Λ (∃x)(∃y)(A(x) Λ S(x,y)) → (∃x)D(x)

        Proof Sequence:
        1.  (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)]                       hyp
        2.  (∃x)(∃y)(A(x) Λ S(x,y))                           hyp
        3.  (∀y)((A(a) Λ S(a,y)) → D(y))                            1, ui
        4.  (∃y)(A(a) Λ S(a,y))                                     2, ei
        5.  A(a) Λ S(a,b)                                           4, ei
        6.  (A(a) Λ S(a,b)) → D(b)                                  3, ui
        7.  D(b)                                                    5, 6, mp
        8.  (∃x)D(x)                                                7, eg

Section 1.4                                 Predicate Logic                         12

Weitere ähnliche Inhalte

Was ist angesagt?

EM3 mini project Laplace Transform
EM3 mini project Laplace TransformEM3 mini project Laplace Transform
EM3 mini project Laplace TransformAditi523129
 
Series solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointSeries solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointvaibhav tailor
 
Laplace transforms
Laplace transformsLaplace transforms
Laplace transformsKarnav Rana
 
Matrix of linear transformation
Matrix of linear transformationMatrix of linear transformation
Matrix of linear transformationbeenishbeenish
 
Stability of Differential Equations
Stability of Differential EquationsStability of Differential Equations
Stability of Differential EquationsAbdullahMdSaifee
 
Partial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examplesPartial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examplesEnrique Valderrama
 
Numerical solution of system of linear equations
Numerical solution of system of linear equationsNumerical solution of system of linear equations
Numerical solution of system of linear equationsreach2arkaELECTRICAL
 
Continuity Of Functions
Continuity Of FunctionsContinuity Of Functions
Continuity Of FunctionsYash Thakkar
 
Interpolation with Finite differences
Interpolation with Finite differencesInterpolation with Finite differences
Interpolation with Finite differencesDr. Nirav Vyas
 
Ppt materi kpb bab 4
Ppt materi kpb bab 4Ppt materi kpb bab 4
Ppt materi kpb bab 4HapizahFKIP
 
Gram-Schmidt process linear algbera
Gram-Schmidt process linear algberaGram-Schmidt process linear algbera
Gram-Schmidt process linear algberaPulakKundu1
 
Continutiy of Functions.ppt
Continutiy of Functions.pptContinutiy of Functions.ppt
Continutiy of Functions.pptLadallaRajKumar
 
linear transformation
linear transformationlinear transformation
linear transformationmansi acharya
 
MATLAB ODE
MATLAB ODEMATLAB ODE
MATLAB ODEKris014
 

Was ist angesagt? (20)

Laplace transform
Laplace transformLaplace transform
Laplace transform
 
Automata theory
Automata theoryAutomata theory
Automata theory
 
EM3 mini project Laplace Transform
EM3 mini project Laplace TransformEM3 mini project Laplace Transform
EM3 mini project Laplace Transform
 
Series solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointSeries solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular point
 
Generating function
Generating functionGenerating function
Generating function
 
Laplace transforms
Laplace transformsLaplace transforms
Laplace transforms
 
Matrix of linear transformation
Matrix of linear transformationMatrix of linear transformation
Matrix of linear transformation
 
Stability of Differential Equations
Stability of Differential EquationsStability of Differential Equations
Stability of Differential Equations
 
Partial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examplesPartial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examples
 
Numerical solution of system of linear equations
Numerical solution of system of linear equationsNumerical solution of system of linear equations
Numerical solution of system of linear equations
 
Ch4
Ch4Ch4
Ch4
 
Pda
PdaPda
Pda
 
Continuity Of Functions
Continuity Of FunctionsContinuity Of Functions
Continuity Of Functions
 
Interpolation with Finite differences
Interpolation with Finite differencesInterpolation with Finite differences
Interpolation with Finite differences
 
Jacobi method
Jacobi methodJacobi method
Jacobi method
 
Ppt materi kpb bab 4
Ppt materi kpb bab 4Ppt materi kpb bab 4
Ppt materi kpb bab 4
 
Gram-Schmidt process linear algbera
Gram-Schmidt process linear algberaGram-Schmidt process linear algbera
Gram-Schmidt process linear algbera
 
Continutiy of Functions.ppt
Continutiy of Functions.pptContinutiy of Functions.ppt
Continutiy of Functions.ppt
 
linear transformation
linear transformationlinear transformation
linear transformation
 
MATLAB ODE
MATLAB ODEMATLAB ODE
MATLAB ODE
 

Ähnlich wie CPSC 125 Ch 1 sec 4

Lecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceLecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceasimnawaz54
 
Quantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuQuantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuSEENET-MTP
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceasimnawaz54
 
Discrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfDiscrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfMuhammadUmerIhtisham
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docxedwin orege
 
Stochastic Differentiation
Stochastic DifferentiationStochastic Differentiation
Stochastic DifferentiationSSA KPI
 
1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the tofariyaPatel
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database TheoryJan Hidders
 
Polynomial functions modelllings
Polynomial functions modelllingsPolynomial functions modelllings
Polynomial functions modelllingsTarun Gehlot
 
Monte Carlo Methods
Monte Carlo MethodsMonte Carlo Methods
Monte Carlo MethodsJames Bell
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking componentsChristian Robert
 
PAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPierre Jacob
 
Introduction to Stochastic calculus
Introduction to Stochastic calculusIntroduction to Stochastic calculus
Introduction to Stochastic calculusAshwin Rao
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Valentin De Bortoli
 
Monte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPMonte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPSSA KPI
 
PAGOdA poster
PAGOdA posterPAGOdA poster
PAGOdA posterDBOnto
 

Ähnlich wie CPSC 125 Ch 1 sec 4 (20)

Lecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceLecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inference
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Quantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuQuantum modes - Ion Cotaescu
Quantum modes - Ion Cotaescu
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inference
 
Discrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfDiscrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdf
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docx
 
Stochastic Differentiation
Stochastic DifferentiationStochastic Differentiation
Stochastic Differentiation
 
1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to
 
02 RULES OF INFERENCES.pptx
02 RULES OF INFERENCES.pptx02 RULES OF INFERENCES.pptx
02 RULES OF INFERENCES.pptx
 
Course notes2summer2012
Course notes2summer2012Course notes2summer2012
Course notes2summer2012
 
Proba stats-r1-2017
Proba stats-r1-2017Proba stats-r1-2017
Proba stats-r1-2017
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database Theory
 
Polynomial functions modelllings
Polynomial functions modelllingsPolynomial functions modelllings
Polynomial functions modelllings
 
Monte Carlo Methods
Monte Carlo MethodsMonte Carlo Methods
Monte Carlo Methods
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking components
 
PAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ Warwick
 
Introduction to Stochastic calculus
Introduction to Stochastic calculusIntroduction to Stochastic calculus
Introduction to Stochastic calculus
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...
 
Monte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPMonte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLP
 
PAGOdA poster
PAGOdA posterPAGOdA poster
PAGOdA poster
 

Mehr von David Wood

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?David Wood
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...David Wood
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 KeynoteDavid Wood
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart CityDavid Wood
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software DevelopmentDavid Wood
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelDavid Wood
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301David Wood
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601David Wood
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors KillDavid Wood
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in AustraliaDavid Wood
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsDavid Wood
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social mediaDavid Wood
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's JourneyDavid Wood
 
Open by Default
Open by DefaultOpen by Default
Open by DefaultDavid Wood
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926David Wood
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426David Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 

Mehr von David Wood (20)

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 Keynote
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software Development
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data model
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors Kill
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in Australia
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social media
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's Journey
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

CPSC 125 Ch 1 sec 4

  • 1. Formal Logic Mathematical Structures for Computer Science Chapter 1 Copyright © 2006 W.H. Freeman & Co. MSCS Slides Formal Logic
  • 2. Predicate Logic ●  Similar to propositional logic for solving arguments, build from quantifiers, predicates and logical connectives. ●  A valid argument for predicate logic need not be a tautology. ●  The meaning and the structure of the quantifiers and predicates determines the interpretation and the validity of the arguments ●  Basic approach to prove arguments: ■  Strip of quantifiers ■  Manipulate the unquantified wffs ■  Reinsert the quantifiers Four new inference rules Two rules to strip the qualifiers Two rules to reinsert the qualifiers ●  Note to remember: P(x) could be (∀y) (∀z) Q(x,y,z) Section 1.4 Predicate Logic 1
  • 3. Inference Rules From Can Derive Name / Restrictions on Use Abbreviation (∀x)P(x) P(t) where t is a Universal If t is a variable, it must variable or constant Instantiation- ui not fall within the scope symbol of a quantifier for t (∃x)P(x) P(t) where t is a Existential Must be the first rule variable or constant Instantiation- ei used that introduces t symbol not previously used in a proof sequence P(x) (∀x)P(x) Universal P(x) has not been Generalization- ug deduced from any hypotheses in which x is a free variable nor has P (x) been deduced by ei from any wff in which x is a free variable P(x) or P(a) (∃x)P(x) Existential To go from P(a) to (∃x)P Generalization- eg (x), x must not appear in P(a) Section 1.4 Predicate Logic 2
  • 4. Examples: Proofs using Predicate Logic ●  Prove the following argument: ■  All flowers are plants. Sunflower is a flower. Therefore, sunflower is a plant. ■  P(x) is “ x is a plant” ■  a is a constant symbol (Sunflower) ■  Q(x) is “x is a flower” ●  The argument is (∀x)[Q(x) → P(x)] Λ Q(a) → P(a) ●  The proof sequence is as follows: 1.  (∀x)[Q(x) → P(x)] hyp 2.  Q(a) hyp 3.  Q(a) → P(a) 1, ui 4.  P(a) 2, 3, mp Section 1.4 Predicate Logic 3
  • 5. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) → Q(x)] Λ [Q(y)]ʹ′ → [P(y)]ʹ′ ●  Proof sequence: 1.  (∀x)[P(x) → Q(x)] hyp 2.  [Q(y)]ʹ′ hyp 3.  P(y) → Q(y) 1, ui 4.  [P(y)]ʹ′ 2, 3, mt ●  Prove the argument (∀x)P(x) → (∃x)P(x) ●  Proof sequence: 1.  (∀x)P(x) hyp 2.  P(x) 1, ui 3.  (∃x)P(x) 2, eg Section 1.4 Predicate Logic 4
  • 6. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) → Q(x)] Λ (∀x)P(x) → (∀x)Q(x) ●  Proof sequence: 1.  (∀x)[P(x) → Q(x)] hyp 2.  (∀x)P(x) hyp 3.  P(x) → Q(x) 1, ui 4.  P(x) 2, ui : no restriction on ui about reusing a name 5.  Q(x) 3, 4, mp 6.  (∀x)Q(x) 5, ug ●  Note: step 6 is legitimate since x is not a free variable in any hypothesis nor was ei used before Section 1.4 Predicate Logic 5
  • 7. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) Λ Q(x)] → (∀x)P(x) Λ (∀x)Q(x) ●  Proof sequence: 1.  (∀x)[P(x) Λ Q(x)] hyp 2.  P(x) Λ Q(x) 1, ui 3.  P(x) 2, sim 4.  Q(x) 2, sim 5.  (∀x)P(x) 3, ug 6.  (∀x)Q(x) 4, ug 7.  (∀x)P(x) Λ (∀x)Q(x) 5, 6, con Section 1.4 Predicate Logic 6
  • 8. Examples: Proofs using Predicate Logic ●  Prove the argument (∀y)[P(x) → Q(x,y)] → [P(x) → (∀y)Q(x,y)] ●  Using the deduction method, we can derive (∀y)[P(x) → Q(x,y)] Λ P(x) → (∀y)Q(x,y) ●  Proof sequence: 1.  (∀y)[P(x) → Q(x,y)] hyp 2.  P(x) hyp 3.  P(x) → Q(x,y) 1, ui 4.  Q(x,y) 2, 3, mp 5.  (∀y)Q(x,y) 4, ug Section 1.4 Predicate Logic 7
  • 9. Temporary hypotheses ●  A temporary hypothesis can be inserted into a proof sequence. If T is inserted as a temporary hypothesis and eventually W is deduced from T and other hypotheses, then the wff T → W has been deduced from other hypotheses and can be reinserted into the proof sequence ●  Prove the argument [P(x) → (∀y)Q(x,y)] → (∀y)[P(x) → Q(x,y)] ●  Proof sequence: 1.  P(x) → (∀y)Q(x,y) hyp 2.  P(x) temporary hypothesis 3.  (∀y)Q(x,y) 1, 2, mp 4.  Q(x,y) 3, ui 5.  P(x) → Q(x,y) temp. hyp discharged 6.  (∀y)[P(x) → Q(x,y)] 5, ug Section 1.4 Predicate Logic 8
  • 10. More Examples ●  Prove the sequence [(∃x)A(x)]ʹ′ ⇔ (∀x)[A(x)]ʹ′ ■  To prove equivalence, implication in each direction should be proved ●  Proof sequence for [(∃x)A(x)]ʹ′ → (∀x)[A(x)]ʹ′ 1.  [(∃x)A(x)]ʹ′ hyp 2.  A(x) temp. hyp 3.  (∃x)A(x) 2, eg 4.  A(x) → (∃x)A(x) temp. hyp discharged 5.  [A(x)]ʹ′ 1, 4, mt 6.  (∀x)[A(x)]ʹ′ 5, ug ●  Proof sequence for (∀x)[A(x)]ʹ′ → [(∃x)A(x)]ʹ′ 1.  (∀x)[A(x)]ʹ′ hyp 2.  (∃x)A(x) temp. hyp 3.  A(a) 2, ei 4.  [A(a)]ʹ′ 1, ui 5.  [(∀x)[A(x)]ʹ′]ʹ′ 3, 4, inc 6.  (∃x)A(x) → [(∀x)[A(x)]ʹ′]ʹ′ temp. discharged 7.  [((∀x)[A(x)]ʹ′)ʹ′]ʹ′ 1, dn 8.  [(∃x)A(x)]ʹ′ 6, 7, mt Section 1.4 Predicate Logic 9
  • 11. Proving Verbal arguments ●  Every crocodile is bigger than every alligator. Sam is a crocodile. But there is a snake, and Sam isn’t bigger than that snake. Therefore, something is not an alligator. ■  Use C(x): x is a crocodile; A(x): x is an alligator, B(x,y): x is bigger than y, s is a constant (Sam), S(x): x is a Snake ●  Hence prove argument (∀x) (∀y)[C(x) Λ A(y) → B(x,y)] Λ C(s) Λ (∃x)(S(x) Λ [B(s,x)]ʹ′) → (∃x)[A(x)] 1.  (∀x) (∀y)[C(x) Λ A(x) → B(x,y)] hyp 2.  C(s) hyp 3.  (∃x)(S(x) Λ [B(s,x)]ʹ′) hyp 4.  (∀y)[C(s) Λ A(y) → B(s,y)] 1, ui 5.  S(a) Λ [B(s,a)]ʹ′) 3, ei 6.  C(s) Λ A(a) → B(s,a) 4, ui 7.  [B(s,a)]ʹ′ 5, sim 8.  [C(s) Λ A(a)]ʹ′ 6, 7, mt 9.  [C(s)]ʹ′ V [A(a)]ʹ′ 9, De Morgan 10.  [[C(s)]ʹ′]ʹ′ 2, dn 11.  [A(a)]ʹ′ 9, 10, ds 12.  (∃x)[A(x)]ʹ′ 11, eg Section 1.4 Predicate Logic 10
  • 12. Class Exercise ●  Prove the argument (∀x)[(B(x) V C(x)) → A(x)] → (∀x)[B(x) → A(x)] Proof sequence: 1.  (∀x)[(B(x) V C(x)) → A(x)] hyp 2.  (B(x) V C(x)) → A(x) 1, ui 3.  B(x) temp. hyp 4.  B(x) V C(x) 3, add 5.  A(x) 2, 4, mp 6.  B(x) → A(x) temp. hyp discharged 7.  (∀x)[B(x) → A(x)] 6, ug Section 1.4 Predicate Logic 11
  • 13. Class exercise ●  Every ambassador speaks only to diplomats, and some ambassadors speak to someone. Therefore, there is a diplomat. ●  Use A(x): x is an ambassador; S(x,y): x speaks to y; D(x): x is a diplomat Prove the argument (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] Λ (∃x)(∃y)(A(x) Λ S(x,y)) → (∃x)D(x) Proof Sequence: 1.  (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] hyp 2.  (∃x)(∃y)(A(x) Λ S(x,y)) hyp 3.  (∀y)((A(a) Λ S(a,y)) → D(y)) 1, ui 4.  (∃y)(A(a) Λ S(a,y)) 2, ei 5.  A(a) Λ S(a,b) 4, ei 6.  (A(a) Λ S(a,b)) → D(b) 3, ui 7.  D(b) 5, 6, mp 8.  (∃x)D(x) 7, eg Section 1.4 Predicate Logic 12