SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Formal Logic




        Mathematical Structures
         for Computer Science
                Chapter 1	





Copyright © 2006 W.H. Freeman & Co.       MSCS Slides   Formal Logic
Predicate Logic
     ●        Similar to propositional logic for solving arguments, build from
              quantifiers, predicates and logical connectives.	

     ●        A valid argument for predicate logic need not be a tautology.	

     ●        The meaning and the structure of the quantifiers and predicates
              determines the interpretation and the validity of the arguments	

     ●        Basic approach to prove arguments:	

                ■    Strip of quantifiers	

                ■    Manipulate the unquantified wffs	

                ■    Reinsert the quantifiers	

          	

         	

      	

       	

	

                                       Four new inference rules	



                 Two rules to strip the qualifiers	

      Two rules to reinsert the qualifiers	



     ●        Note to remember: P(x) could be (∀y) (∀z) Q(x,y,z) 	

Section 1.4                                            Predicate Logic                             1
Inference Rules
          From	

           Can Derive	

           Name /                Restrictions on Use	

                                                  Abbreviation	

        (∀x)P(x)	

        P(t) where t is a        Universal           If t is a variable, it must
                         variable or constant    Instantiation- ui	

   not fall within the scope
                                symbol	

                                  of a quantifier for t	

        (∃x)P(x)	

        P(t) where t is a       Existential           Must be the first rule
                         variable or constant    Instantiation- ei	

    used that introduces t	

                        symbol not previously
                           used in a proof
                               sequence	

              P(x)	

         (∀x)P(x)	

          Universal                P(x) has not been
                                                Generalization- ug	

       deduced from any
                                                                        hypotheses in which x is
                                                                        a free variable nor has P
                                                                         (x) been deduced by ei
                                                                        from any wff in which x
                                                                             is a free variable	

      P(x) or P(a)	

         (∃x)P(x)	

          Existential        To go from P(a) to (∃x)P
                                                Generalization- eg	

 (x), x must not appear in
                                                                                P(a)	


Section 1.4                                       Predicate Logic                                     2
Examples: Proofs using Predicate Logic

     ●        Prove the following argument:	

              ■     All flowers are plants. Sunflower is a flower. Therefore, sunflower
                    is a plant.	

              ■     P(x) is “ x is a plant”	

              ■     a is a constant symbol (Sunflower)	

              ■     Q(x) is “x is a flower”	

     ●        The argument is (∀x)[Q(x) → P(x)] Λ Q(a) → P(a)	

     ●        The proof sequence is as follows:	


              1.    (∀x)[Q(x) → P(x)]        	

hyp	

              2.    Q(a)    	

     	

      	

hyp	

              3.    Q(a) → P(a)     	

      	

1, ui	

              4.    P(a)    	

     	

      	

2, 3, mp	




Section 1.4                                    Predicate Logic                        3
Examples: Proofs using Predicate Logic

     ●        Prove the argument (∀x)[P(x) → Q(x)] Λ [Q(y)]ʹ′ → [P(y)]ʹ′	

     ●        Proof sequence:	


              1.    (∀x)[P(x) → Q(x)]       	

hyp	

              2.    [Q(y)]ʹ′ 	

    	

     	

hyp	

              3.    P(y) → Q(y)     	

     	

1, ui	

              4.    [P(y)]ʹ′ 	

    	

     	

2, 3, mt	



     ●        Prove the argument (∀x)P(x) → (∃x)P(x) 	

     ●        Proof sequence:	


              1.    (∀x)P(x) 	

      	

   	

hyp	

              2.    P(x)     	

      	

   	

1, ui	

              3.    (∃x)P(x) 	

      	

   	

2, eg	


Section 1.4                                   Predicate Logic                 4
Examples: Proofs using Predicate Logic

     ●        Prove the argument (∀x)[P(x) → Q(x)] Λ (∀x)P(x) → (∀x)Q(x)	

     ●        Proof sequence:	


              1.    (∀x)[P(x) → Q(x)]            	

hyp	

              2.    (∀x)P(x) 	

    	

          	

hyp	

              3.    P(x) → Q(x)     	

          	

1, ui	

              4.    P(x)     	

    	

2, ui : no restriction on ui about reusing a name	

              5.    Q(x)     	

    	

          	

3, 4, mp	

              6.    (∀x)Q(x)	

     	

          	

5, ug	



     ●        Note: step 6 is legitimate since x is not a free variable in any
              hypothesis nor was ei used before	





Section 1.4                                       Predicate Logic                             5
Examples: Proofs using Predicate Logic

     ●           Prove the argument 	

              	

   	

(∀x)[P(x) Λ Q(x)] → (∀x)P(x) Λ (∀x)Q(x)	


     ●        Proof sequence:	


               1.    (∀x)[P(x) Λ Q(x)]      	

                	

hyp	

               2.    P(x) Λ Q(x)      	

   	

                	

1, ui	

               3.    P(x)     	

     	

   	

                	

2, sim	

               4.    Q(x)     	

     	

   	

                	

2, sim	

               5.    (∀x)P(x) 	

     	

   	

                	

3, ug	

               6.    (∀x)Q(x)	

      	

   	

                	

4, ug	

               7.    (∀x)P(x) Λ (∀x)Q(x)    	

                	

5, 6, con	





Section 1.4                                       Predicate Logic                6
Examples: Proofs using Predicate Logic

     ●           Prove the argument 	

              	

   	

(∀y)[P(x) → Q(x,y)] → [P(x) → (∀y)Q(x,y)] 	


     ●           Using the deduction method, we can derive	

              	

   	

(∀y)[P(x) → Q(x,y)] Λ P(x) → (∀y)Q(x,y)	


     ●        Proof sequence:	


               1.    (∀y)[P(x) → Q(x,y)]    	

                	

hyp	

               2.    P(x)    	

     	

    	

                	

hyp	

               3.    P(x) → Q(x,y)   	

    	

                	

1, ui	

               4.    Q(x,y) 	

      	

    	

                	

2, 3, mp	

               5.    (∀y)Q(x,y)      	

    	

                	

4, ug	



Section 1.4                                       Predicate Logic               7
Temporary hypotheses
     ●        A temporary hypothesis can be inserted into a proof sequence.
              If T is inserted as a temporary hypothesis and eventually W is
              deduced from T and other hypotheses, then the wff T → W has
              been deduced from other hypotheses and can be reinserted into
              the proof sequence	


     ●           Prove the argument 	

              	

   	

[P(x) → (∀y)Q(x,y)] → (∀y)[P(x) → Q(x,y)] 	


     ●        Proof sequence:	

               1.    P(x) → (∀y)Q(x,y)      	

         	

hyp	

               2.    P(x)    	

     	

    	

temporary hypothesis	

               3.    (∀y)Q(x,y)      	

    	

1, 2, mp	

               4.    Q(x,y) 	

      	

    	

3, ui	

               5.    P(x) → Q(x,y)   	

    	

temp. hyp discharged	

               6.    (∀y)[P(x) → Q(x,y)]    	

5, ug	


Section 1.4                                   Predicate Logic                  8
More Examples
     ●        Prove the sequence [(∃x)A(x)]ʹ′ ⇔ (∀x)[A(x)]ʹ′ 	

              ■     To prove equivalence, implication in each direction should be proved	

     ●        Proof sequence for [(∃x)A(x)]ʹ′ → (∀x)[A(x)]ʹ′ 	

              1.    [(∃x)A(x)]ʹ′        	

       	

hyp	

              2.    A(x)      	

       	

       	

temp. hyp	

              3.    (∃x)A(x) 	

        	

       	

2, eg	

              4.    A(x) → (∃x)A(x)     	

       	

temp. hyp discharged	

              5.    [A(x)]ʹ′ 	

        	

       	

1, 4, mt	

              6.    (∀x)[A(x)]ʹ′        	

       	

5, ug	

     ●        Proof sequence for (∀x)[A(x)]ʹ′ → [(∃x)A(x)]ʹ′ 	

              1.    (∀x)[A(x)]ʹ′         	

      	

hyp	

              2.    (∃x)A(x) 	

         	

      	

temp. hyp	

              3.    A(a)      	

        	

      	

2, ei	

              4.    [A(a)]ʹ′ 	

         	

      	

1, ui	

              5.    [(∀x)[A(x)]ʹ′]ʹ′     	

      	

3, 4, inc	

              6.    (∃x)A(x) → [(∀x)[A(x)]ʹ′]ʹ′      temp. discharged
              7.    [((∀x)[A(x)]ʹ′)ʹ′]ʹ′             1, dn
              8.    [(∃x)A(x)]ʹ′                     6, 7, mt
Section 1.4                                         Predicate Logic                           9
Proving Verbal arguments
   ●          Every crocodile is bigger than every alligator. Sam is a crocodile. But
              there is a snake, and Sam isn’t bigger than that snake. Therefore,
              something is not an alligator.	

              ■      Use C(x): x is a crocodile; A(x): x is an alligator, B(x,y): x is bigger than y,
                     s is a constant (Sam), S(x): x is a Snake	

   ●          Hence prove argument
              (∀x) (∀y)[C(x) Λ A(y) → B(x,y)] Λ C(s) Λ (∃x)(S(x) Λ [B(s,x)]ʹ′) → (∃x)[A(x)]	

              1.     (∀x) (∀y)[C(x) Λ A(x) → B(x,y)]                      hyp
              2.     C(s)                                                 hyp
              3.     (∃x)(S(x) Λ [B(s,x)]ʹ′)                              hyp
              4.     (∀y)[C(s) Λ A(y) → B(s,y)]                           1, ui
              5.     S(a) Λ [B(s,a)]ʹ′)                                   3, ei
              6.     C(s) Λ A(a) → B(s,a)                                 4, ui
              7.     [B(s,a)]ʹ′                                           5, sim
              8.     [C(s) Λ A(a)]ʹ′                                      6, 7, mt
              9.     [C(s)]ʹ′ V [A(a)]ʹ′                                  9, De Morgan
              10.    [[C(s)]ʹ′]ʹ′                                         2, dn
              11.    [A(a)]ʹ′                                             9, 10, ds
              12.    (∃x)[A(x)]ʹ′                                         11, eg

Section 1.4                                           Predicate Logic                               10
Class Exercise
     ●        Prove the argument 	

 	

          	

(∀x)[(B(x) V C(x)) → A(x)] → (∀x)[B(x) → A(x)] 	



              Proof sequence:

              1.    (∀x)[(B(x) V C(x)) → A(x)]                     hyp
              2.    (B(x) V C(x)) → A(x)                           1, ui
              3.    B(x)                                           temp. hyp
              4.    B(x) V C(x)                                    3, add
              5.    A(x)                                           2, 4, mp
              6.    B(x) → A(x)                                    temp. hyp discharged
              7.    (∀x)[B(x) → A(x)]                              6, ug




Section 1.4                                      Predicate Logic                          11
Class exercise
   ●     Every ambassador speaks only to diplomats, and some ambassadors speak
         to someone. Therefore, there is a diplomat.	

   ●     Use A(x): x is an ambassador; S(x,y): x speaks to y; D(x): x is a diplomat	


     Prove the argument
     (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] Λ (∃x)(∃y)(A(x) Λ S(x,y)) → (∃x)D(x)

        Proof Sequence:
        1.  (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)]                       hyp
        2.  (∃x)(∃y)(A(x) Λ S(x,y))                           hyp
        3.  (∀y)((A(a) Λ S(a,y)) → D(y))                            1, ui
        4.  (∃y)(A(a) Λ S(a,y))                                     2, ei
        5.  A(a) Λ S(a,b)                                           4, ei
        6.  (A(a) Λ S(a,b)) → D(b)                                  3, ui
        7.  D(b)                                                    5, 6, mp
        8.  (∃x)D(x)                                                7, eg

Section 1.4                                 Predicate Logic                         12

Weitere ähnliche Inhalte

Was ist angesagt?

Syntactic analysis in NLP
Syntactic analysis in NLPSyntactic analysis in NLP
Syntactic analysis in NLPkartikaVashisht
 
First Order Predicate Logic Examples| Different Examples
First Order Predicate Logic Examples| Different ExamplesFirst Order Predicate Logic Examples| Different Examples
First Order Predicate Logic Examples| Different ExamplesHabibaSaeed5
 
Computational logic First Order Logic
Computational logic First Order LogicComputational logic First Order Logic
Computational logic First Order Logicbanujahir1
 
Regular Expression (Regex) Fundamentals
Regular Expression (Regex) FundamentalsRegular Expression (Regex) Fundamentals
Regular Expression (Regex) FundamentalsMesut Günes
 
Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5Srimatre K
 
Context free grammars
Context free grammarsContext free grammars
Context free grammarsRonak Thakkar
 
Push down automata
Push down automataPush down automata
Push down automataSomya Bagai
 
Logiques de descriptions.pptx
Logiques de descriptions.pptxLogiques de descriptions.pptx
Logiques de descriptions.pptxmohmll
 
Predicates and Quantifiers
Predicates and QuantifiersPredicates and Quantifiers
Predicates and Quantifiersblaircomp2003
 
Deterministic Finite Automata (DFA)
Deterministic Finite Automata (DFA)Deterministic Finite Automata (DFA)
Deterministic Finite Automata (DFA)Animesh Chaturvedi
 
PYTHON -Chapter 2 - Functions, Exception, Modules and Files -MAULIK BOR...
PYTHON -Chapter 2 - Functions,   Exception, Modules  and    Files -MAULIK BOR...PYTHON -Chapter 2 - Functions,   Exception, Modules  and    Files -MAULIK BOR...
PYTHON -Chapter 2 - Functions, Exception, Modules and Files -MAULIK BOR...Maulik Borsaniya
 
Ch3 4 regular expression and grammar
Ch3 4 regular expression and grammarCh3 4 regular expression and grammar
Ch3 4 regular expression and grammarmeresie tesfay
 
Automata theory - Push Down Automata (PDA)
Automata theory - Push Down Automata (PDA)Automata theory - Push Down Automata (PDA)
Automata theory - Push Down Automata (PDA)Akila Krishnamoorthy
 
Speech and Language Processing
Speech and Language ProcessingSpeech and Language Processing
Speech and Language ProcessingVikalp Mahendra
 
1.10. pumping lemma for regular sets
1.10. pumping lemma for regular sets1.10. pumping lemma for regular sets
1.10. pumping lemma for regular setsSampath Kumar S
 
Greedy Algorithms WITH Activity Selection Problem.ppt
Greedy Algorithms WITH Activity Selection Problem.pptGreedy Algorithms WITH Activity Selection Problem.ppt
Greedy Algorithms WITH Activity Selection Problem.pptRuchika Sinha
 

Was ist angesagt? (20)

Syntactic analysis in NLP
Syntactic analysis in NLPSyntactic analysis in NLP
Syntactic analysis in NLP
 
First Order Predicate Logic Examples| Different Examples
First Order Predicate Logic Examples| Different ExamplesFirst Order Predicate Logic Examples| Different Examples
First Order Predicate Logic Examples| Different Examples
 
Computational logic First Order Logic
Computational logic First Order LogicComputational logic First Order Logic
Computational logic First Order Logic
 
Regular Expression (Regex) Fundamentals
Regular Expression (Regex) FundamentalsRegular Expression (Regex) Fundamentals
Regular Expression (Regex) Fundamentals
 
Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5
 
Context free grammars
Context free grammarsContext free grammars
Context free grammars
 
Push down automata
Push down automataPush down automata
Push down automata
 
Logiques de descriptions.pptx
Logiques de descriptions.pptxLogiques de descriptions.pptx
Logiques de descriptions.pptx
 
Predicates and Quantifiers
Predicates and QuantifiersPredicates and Quantifiers
Predicates and Quantifiers
 
Deterministic Finite Automata (DFA)
Deterministic Finite Automata (DFA)Deterministic Finite Automata (DFA)
Deterministic Finite Automata (DFA)
 
PYTHON -Chapter 2 - Functions, Exception, Modules and Files -MAULIK BOR...
PYTHON -Chapter 2 - Functions,   Exception, Modules  and    Files -MAULIK BOR...PYTHON -Chapter 2 - Functions,   Exception, Modules  and    Files -MAULIK BOR...
PYTHON -Chapter 2 - Functions, Exception, Modules and Files -MAULIK BOR...
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
 
Prpositional2
Prpositional2Prpositional2
Prpositional2
 
Ch3 4 regular expression and grammar
Ch3 4 regular expression and grammarCh3 4 regular expression and grammar
Ch3 4 regular expression and grammar
 
Automata theory - Push Down Automata (PDA)
Automata theory - Push Down Automata (PDA)Automata theory - Push Down Automata (PDA)
Automata theory - Push Down Automata (PDA)
 
3 fol examples v2
3 fol examples v23 fol examples v2
3 fol examples v2
 
Speech and Language Processing
Speech and Language ProcessingSpeech and Language Processing
Speech and Language Processing
 
1.10. pumping lemma for regular sets
1.10. pumping lemma for regular sets1.10. pumping lemma for regular sets
1.10. pumping lemma for regular sets
 
Big O Notation
Big O NotationBig O Notation
Big O Notation
 
Greedy Algorithms WITH Activity Selection Problem.ppt
Greedy Algorithms WITH Activity Selection Problem.pptGreedy Algorithms WITH Activity Selection Problem.ppt
Greedy Algorithms WITH Activity Selection Problem.ppt
 

Ähnlich wie CPSC 125 Ch 1 sec 4

Lecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceLecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceasimnawaz54
 
Quantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuQuantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuSEENET-MTP
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceasimnawaz54
 
Discrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfDiscrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfMuhammadUmerIhtisham
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docxedwin orege
 
Stochastic Differentiation
Stochastic DifferentiationStochastic Differentiation
Stochastic DifferentiationSSA KPI
 
1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the tofariyaPatel
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database TheoryJan Hidders
 
Polynomial functions modelllings
Polynomial functions modelllingsPolynomial functions modelllings
Polynomial functions modelllingsTarun Gehlot
 
Monte Carlo Methods
Monte Carlo MethodsMonte Carlo Methods
Monte Carlo MethodsJames Bell
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking componentsChristian Robert
 
PAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPierre Jacob
 
Introduction to Stochastic calculus
Introduction to Stochastic calculusIntroduction to Stochastic calculus
Introduction to Stochastic calculusAshwin Rao
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Valentin De Bortoli
 
Monte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPMonte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPSSA KPI
 
PAGOdA poster
PAGOdA posterPAGOdA poster
PAGOdA posterDBOnto
 

Ähnlich wie CPSC 125 Ch 1 sec 4 (20)

Lecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceLecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inference
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Quantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuQuantum modes - Ion Cotaescu
Quantum modes - Ion Cotaescu
 
Lecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inferenceLecture 2 predicates quantifiers and rules of inference
Lecture 2 predicates quantifiers and rules of inference
 
Discrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfDiscrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdf
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docx
 
Stochastic Differentiation
Stochastic DifferentiationStochastic Differentiation
Stochastic Differentiation
 
1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to
 
02 RULES OF INFERENCES.pptx
02 RULES OF INFERENCES.pptx02 RULES OF INFERENCES.pptx
02 RULES OF INFERENCES.pptx
 
Course notes2summer2012
Course notes2summer2012Course notes2summer2012
Course notes2summer2012
 
Proba stats-r1-2017
Proba stats-r1-2017Proba stats-r1-2017
Proba stats-r1-2017
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database Theory
 
Polynomial functions modelllings
Polynomial functions modelllingsPolynomial functions modelllings
Polynomial functions modelllings
 
Monte Carlo Methods
Monte Carlo MethodsMonte Carlo Methods
Monte Carlo Methods
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking components
 
PAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ Warwick
 
Introduction to Stochastic calculus
Introduction to Stochastic calculusIntroduction to Stochastic calculus
Introduction to Stochastic calculus
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...
 
Monte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPMonte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLP
 
PAGOdA poster
PAGOdA posterPAGOdA poster
PAGOdA poster
 

Mehr von David Wood

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?David Wood
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...David Wood
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 KeynoteDavid Wood
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart CityDavid Wood
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software DevelopmentDavid Wood
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelDavid Wood
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301David Wood
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601David Wood
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors KillDavid Wood
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in AustraliaDavid Wood
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsDavid Wood
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social mediaDavid Wood
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's JourneyDavid Wood
 
Open by Default
Open by DefaultOpen by Default
Open by DefaultDavid Wood
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926David Wood
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426David Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 

Mehr von David Wood (20)

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 Keynote
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software Development
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data model
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors Kill
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in Australia
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social media
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's Journey
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 

Kürzlich hochgeladen

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

CPSC 125 Ch 1 sec 4

  • 1. Formal Logic Mathematical Structures for Computer Science Chapter 1 Copyright © 2006 W.H. Freeman & Co. MSCS Slides Formal Logic
  • 2. Predicate Logic ●  Similar to propositional logic for solving arguments, build from quantifiers, predicates and logical connectives. ●  A valid argument for predicate logic need not be a tautology. ●  The meaning and the structure of the quantifiers and predicates determines the interpretation and the validity of the arguments ●  Basic approach to prove arguments: ■  Strip of quantifiers ■  Manipulate the unquantified wffs ■  Reinsert the quantifiers Four new inference rules Two rules to strip the qualifiers Two rules to reinsert the qualifiers ●  Note to remember: P(x) could be (∀y) (∀z) Q(x,y,z) Section 1.4 Predicate Logic 1
  • 3. Inference Rules From Can Derive Name / Restrictions on Use Abbreviation (∀x)P(x) P(t) where t is a Universal If t is a variable, it must variable or constant Instantiation- ui not fall within the scope symbol of a quantifier for t (∃x)P(x) P(t) where t is a Existential Must be the first rule variable or constant Instantiation- ei used that introduces t symbol not previously used in a proof sequence P(x) (∀x)P(x) Universal P(x) has not been Generalization- ug deduced from any hypotheses in which x is a free variable nor has P (x) been deduced by ei from any wff in which x is a free variable P(x) or P(a) (∃x)P(x) Existential To go from P(a) to (∃x)P Generalization- eg (x), x must not appear in P(a) Section 1.4 Predicate Logic 2
  • 4. Examples: Proofs using Predicate Logic ●  Prove the following argument: ■  All flowers are plants. Sunflower is a flower. Therefore, sunflower is a plant. ■  P(x) is “ x is a plant” ■  a is a constant symbol (Sunflower) ■  Q(x) is “x is a flower” ●  The argument is (∀x)[Q(x) → P(x)] Λ Q(a) → P(a) ●  The proof sequence is as follows: 1.  (∀x)[Q(x) → P(x)] hyp 2.  Q(a) hyp 3.  Q(a) → P(a) 1, ui 4.  P(a) 2, 3, mp Section 1.4 Predicate Logic 3
  • 5. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) → Q(x)] Λ [Q(y)]ʹ′ → [P(y)]ʹ′ ●  Proof sequence: 1.  (∀x)[P(x) → Q(x)] hyp 2.  [Q(y)]ʹ′ hyp 3.  P(y) → Q(y) 1, ui 4.  [P(y)]ʹ′ 2, 3, mt ●  Prove the argument (∀x)P(x) → (∃x)P(x) ●  Proof sequence: 1.  (∀x)P(x) hyp 2.  P(x) 1, ui 3.  (∃x)P(x) 2, eg Section 1.4 Predicate Logic 4
  • 6. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) → Q(x)] Λ (∀x)P(x) → (∀x)Q(x) ●  Proof sequence: 1.  (∀x)[P(x) → Q(x)] hyp 2.  (∀x)P(x) hyp 3.  P(x) → Q(x) 1, ui 4.  P(x) 2, ui : no restriction on ui about reusing a name 5.  Q(x) 3, 4, mp 6.  (∀x)Q(x) 5, ug ●  Note: step 6 is legitimate since x is not a free variable in any hypothesis nor was ei used before Section 1.4 Predicate Logic 5
  • 7. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) Λ Q(x)] → (∀x)P(x) Λ (∀x)Q(x) ●  Proof sequence: 1.  (∀x)[P(x) Λ Q(x)] hyp 2.  P(x) Λ Q(x) 1, ui 3.  P(x) 2, sim 4.  Q(x) 2, sim 5.  (∀x)P(x) 3, ug 6.  (∀x)Q(x) 4, ug 7.  (∀x)P(x) Λ (∀x)Q(x) 5, 6, con Section 1.4 Predicate Logic 6
  • 8. Examples: Proofs using Predicate Logic ●  Prove the argument (∀y)[P(x) → Q(x,y)] → [P(x) → (∀y)Q(x,y)] ●  Using the deduction method, we can derive (∀y)[P(x) → Q(x,y)] Λ P(x) → (∀y)Q(x,y) ●  Proof sequence: 1.  (∀y)[P(x) → Q(x,y)] hyp 2.  P(x) hyp 3.  P(x) → Q(x,y) 1, ui 4.  Q(x,y) 2, 3, mp 5.  (∀y)Q(x,y) 4, ug Section 1.4 Predicate Logic 7
  • 9. Temporary hypotheses ●  A temporary hypothesis can be inserted into a proof sequence. If T is inserted as a temporary hypothesis and eventually W is deduced from T and other hypotheses, then the wff T → W has been deduced from other hypotheses and can be reinserted into the proof sequence ●  Prove the argument [P(x) → (∀y)Q(x,y)] → (∀y)[P(x) → Q(x,y)] ●  Proof sequence: 1.  P(x) → (∀y)Q(x,y) hyp 2.  P(x) temporary hypothesis 3.  (∀y)Q(x,y) 1, 2, mp 4.  Q(x,y) 3, ui 5.  P(x) → Q(x,y) temp. hyp discharged 6.  (∀y)[P(x) → Q(x,y)] 5, ug Section 1.4 Predicate Logic 8
  • 10. More Examples ●  Prove the sequence [(∃x)A(x)]ʹ′ ⇔ (∀x)[A(x)]ʹ′ ■  To prove equivalence, implication in each direction should be proved ●  Proof sequence for [(∃x)A(x)]ʹ′ → (∀x)[A(x)]ʹ′ 1.  [(∃x)A(x)]ʹ′ hyp 2.  A(x) temp. hyp 3.  (∃x)A(x) 2, eg 4.  A(x) → (∃x)A(x) temp. hyp discharged 5.  [A(x)]ʹ′ 1, 4, mt 6.  (∀x)[A(x)]ʹ′ 5, ug ●  Proof sequence for (∀x)[A(x)]ʹ′ → [(∃x)A(x)]ʹ′ 1.  (∀x)[A(x)]ʹ′ hyp 2.  (∃x)A(x) temp. hyp 3.  A(a) 2, ei 4.  [A(a)]ʹ′ 1, ui 5.  [(∀x)[A(x)]ʹ′]ʹ′ 3, 4, inc 6.  (∃x)A(x) → [(∀x)[A(x)]ʹ′]ʹ′ temp. discharged 7.  [((∀x)[A(x)]ʹ′)ʹ′]ʹ′ 1, dn 8.  [(∃x)A(x)]ʹ′ 6, 7, mt Section 1.4 Predicate Logic 9
  • 11. Proving Verbal arguments ●  Every crocodile is bigger than every alligator. Sam is a crocodile. But there is a snake, and Sam isn’t bigger than that snake. Therefore, something is not an alligator. ■  Use C(x): x is a crocodile; A(x): x is an alligator, B(x,y): x is bigger than y, s is a constant (Sam), S(x): x is a Snake ●  Hence prove argument (∀x) (∀y)[C(x) Λ A(y) → B(x,y)] Λ C(s) Λ (∃x)(S(x) Λ [B(s,x)]ʹ′) → (∃x)[A(x)] 1.  (∀x) (∀y)[C(x) Λ A(x) → B(x,y)] hyp 2.  C(s) hyp 3.  (∃x)(S(x) Λ [B(s,x)]ʹ′) hyp 4.  (∀y)[C(s) Λ A(y) → B(s,y)] 1, ui 5.  S(a) Λ [B(s,a)]ʹ′) 3, ei 6.  C(s) Λ A(a) → B(s,a) 4, ui 7.  [B(s,a)]ʹ′ 5, sim 8.  [C(s) Λ A(a)]ʹ′ 6, 7, mt 9.  [C(s)]ʹ′ V [A(a)]ʹ′ 9, De Morgan 10.  [[C(s)]ʹ′]ʹ′ 2, dn 11.  [A(a)]ʹ′ 9, 10, ds 12.  (∃x)[A(x)]ʹ′ 11, eg Section 1.4 Predicate Logic 10
  • 12. Class Exercise ●  Prove the argument (∀x)[(B(x) V C(x)) → A(x)] → (∀x)[B(x) → A(x)] Proof sequence: 1.  (∀x)[(B(x) V C(x)) → A(x)] hyp 2.  (B(x) V C(x)) → A(x) 1, ui 3.  B(x) temp. hyp 4.  B(x) V C(x) 3, add 5.  A(x) 2, 4, mp 6.  B(x) → A(x) temp. hyp discharged 7.  (∀x)[B(x) → A(x)] 6, ug Section 1.4 Predicate Logic 11
  • 13. Class exercise ●  Every ambassador speaks only to diplomats, and some ambassadors speak to someone. Therefore, there is a diplomat. ●  Use A(x): x is an ambassador; S(x,y): x speaks to y; D(x): x is a diplomat Prove the argument (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] Λ (∃x)(∃y)(A(x) Λ S(x,y)) → (∃x)D(x) Proof Sequence: 1.  (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] hyp 2.  (∃x)(∃y)(A(x) Λ S(x,y)) hyp 3.  (∀y)((A(a) Λ S(a,y)) → D(y)) 1, ui 4.  (∃y)(A(a) Λ S(a,y)) 2, ei 5.  A(a) Λ S(a,b) 4, ei 6.  (A(a) Λ S(a,b)) → D(b) 3, ui 7.  D(b) 5, 6, mp 8.  (∃x)D(x) 7, eg Section 1.4 Predicate Logic 12