SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Formal Logic




        Mathematical Structures
         for Computer Science
                Chapter 1	





Copyright © 2006 W.H. Freeman & Co.       MSCS Slides   Formal Logic
Predicate Logic
     ●        Similar to propositional logic for solving arguments, build from
              quantifiers, predicates and logical connectives.	

     ●        A valid argument for predicate logic need not be a tautology.	

     ●        The meaning and the structure of the quantifiers and predicates
              determines the interpretation and the validity of the arguments	

     ●        Basic approach to prove arguments:	

                ■    Strip of quantifiers	

                ■    Manipulate the unquantified wffs	

                ■    Reinsert the quantifiers	

          	

         	

      	

       	

	

                                       Four new inference rules	



                 Two rules to strip the qualifiers	

      Two rules to reinsert the qualifiers	



     ●        Note to remember: P(x) could be (∀y) (∀z) Q(x,y,z) 	

Section 1.4                                            Predicate Logic                             1
Inference Rules
          From	

           Can Derive	

           Name /                Restrictions on Use	

                                                  Abbreviation	

        (∀x)P(x)	

        P(t) where t is a        Universal           If t is a variable, it must
                         variable or constant    Instantiation- ui	

   not fall within the scope
                                symbol	

                                  of a quantifier for t	

        (∃x)P(x)	

        P(t) where t is a       Existential           Must be the first rule
                         variable or constant    Instantiation- ei	

    used that introduces t	

                        symbol not previously
                           used in a proof
                               sequence	

              P(x)	

         (∀x)P(x)	

          Universal                P(x) has not been
                                                Generalization- ug	

       deduced from any
                                                                        hypotheses in which x is
                                                                        a free variable nor has P
                                                                         (x) been deduced by ei
                                                                        from any wff in which x
                                                                             is a free variable	

      P(x) or P(a)	

         (∃x)P(x)	

          Existential        To go from P(a) to (∃x)P
                                                Generalization- eg	

 (x), x must not appear in
                                                                                P(a)	


Section 1.4                                       Predicate Logic                                     2
Examples: Proofs using Predicate Logic

     ●        Prove the following argument:	

              ■     All flowers are plants. Sunflower is a flower. Therefore, sunflower
                    is a plant.	

              ■     P(x) is “ x is a plant”	

              ■     a is a constant symbol (Sunflower)	

              ■     Q(x) is “x is a flower”	

     ●        The argument is (∀x)[Q(x) → P(x)] Λ Q(a) → P(a)	

     ●        The proof sequence is as follows:	


              1.    (∀x)[Q(x) → P(x)]        	

hyp	

              2.    Q(a)    	

     	

      	

hyp	

              3.    Q(a) → P(a)     	

      	

1, ui	

              4.    P(a)    	

     	

      	

2, 3, mp	




Section 1.4                                    Predicate Logic                        3
Examples: Proofs using Predicate Logic

     ●        Prove the argument (∀x)[P(x) → Q(x)] Λ [Q(y)]ʹ′ → [P(y)]ʹ′	

     ●        Proof sequence:	


              1.    (∀x)[P(x) → Q(x)]       	

hyp	

              2.    [Q(y)]ʹ′ 	

    	

     	

hyp	

              3.    P(y) → Q(y)     	

     	

1, ui	

              4.    [P(y)]ʹ′ 	

    	

     	

2, 3, mt	



     ●        Prove the argument (∀x)P(x) → (∃x)P(x) 	

     ●        Proof sequence:	


              1.    (∀x)P(x) 	

      	

   	

hyp	

              2.    P(x)     	

      	

   	

1, ui	

              3.    (∃x)P(x) 	

      	

   	

2, eg	


Section 1.4                                   Predicate Logic                 4
Examples: Proofs using Predicate Logic

     ●        Prove the argument (∀x)[P(x) → Q(x)] Λ (∀x)P(x) → (∀x)Q(x)	

     ●        Proof sequence:	


              1.    (∀x)[P(x) → Q(x)]            	

hyp	

              2.    (∀x)P(x) 	

    	

          	

hyp	

              3.    P(x) → Q(x)     	

          	

1, ui	

              4.    P(x)     	

    	

2, ui : no restriction on ui about reusing a name	

              5.    Q(x)     	

    	

          	

3, 4, mp	

              6.    (∀x)Q(x)	

     	

          	

5, ug	



     ●        Note: step 6 is legitimate since x is not a free variable in any
              hypothesis nor was ei used before	





Section 1.4                                       Predicate Logic                             5
Examples: Proofs using Predicate Logic

     ●           Prove the argument 	

              	

   	

(∀x)[P(x) Λ Q(x)] → (∀x)P(x) Λ (∀x)Q(x)	


     ●        Proof sequence:	


               1.    (∀x)[P(x) Λ Q(x)]      	

                	

hyp	

               2.    P(x) Λ Q(x)      	

   	

                	

1, ui	

               3.    P(x)     	

     	

   	

                	

2, sim	

               4.    Q(x)     	

     	

   	

                	

2, sim	

               5.    (∀x)P(x) 	

     	

   	

                	

3, ug	

               6.    (∀x)Q(x)	

      	

   	

                	

4, ug	

               7.    (∀x)P(x) Λ (∀x)Q(x)    	

                	

5, 6, con	





Section 1.4                                       Predicate Logic                6
Examples: Proofs using Predicate Logic

     ●           Prove the argument 	

              	

   	

(∀y)[P(x) → Q(x,y)] → [P(x) → (∀y)Q(x,y)] 	


     ●           Using the deduction method, we can derive	

              	

   	

(∀y)[P(x) → Q(x,y)] Λ P(x) → (∀y)Q(x,y)	


     ●        Proof sequence:	


               1.    (∀y)[P(x) → Q(x,y)]    	

                	

hyp	

               2.    P(x)    	

     	

    	

                	

hyp	

               3.    P(x) → Q(x,y)   	

    	

                	

1, ui	

               4.    Q(x,y) 	

      	

    	

                	

2, 3, mp	

               5.    (∀y)Q(x,y)      	

    	

                	

4, ug	



Section 1.4                                       Predicate Logic               7
Temporary hypotheses
     ●        A temporary hypothesis can be inserted into a proof sequence.
              If T is inserted as a temporary hypothesis and eventually W is
              deduced from T and other hypotheses, then the wff T → W has
              been deduced from other hypotheses and can be reinserted into
              the proof sequence	


     ●           Prove the argument 	

              	

   	

[P(x) → (∀y)Q(x,y)] → (∀y)[P(x) → Q(x,y)] 	


     ●        Proof sequence:	

               1.    P(x) → (∀y)Q(x,y)      	

         	

hyp	

               2.    P(x)    	

     	

    	

temporary hypothesis	

               3.    (∀y)Q(x,y)      	

    	

1, 2, mp	

               4.    Q(x,y) 	

      	

    	

3, ui	

               5.    P(x) → Q(x,y)   	

    	

temp. hyp discharged	

               6.    (∀y)[P(x) → Q(x,y)]    	

5, ug	


Section 1.4                                   Predicate Logic                  8
More Examples
     ●        Prove the sequence [(∃x)A(x)]ʹ′ ⇔ (∀x)[A(x)]ʹ′ 	

              ■     To prove equivalence, implication in each direction should be proved	

     ●        Proof sequence for [(∃x)A(x)]ʹ′ → (∀x)[A(x)]ʹ′ 	

              1.    [(∃x)A(x)]ʹ′        	

       	

hyp	

              2.    A(x)      	

       	

       	

temp. hyp	

              3.    (∃x)A(x) 	

        	

       	

2, eg	

              4.    A(x) → (∃x)A(x)     	

       	

temp. hyp discharged	

              5.    [A(x)]ʹ′ 	

        	

       	

1, 4, mt	

              6.    (∀x)[A(x)]ʹ′        	

       	

5, ug	

     ●        Proof sequence for (∀x)[A(x)]ʹ′ → [(∃x)A(x)]ʹ′ 	

              1.    (∀x)[A(x)]ʹ′         	

      	

hyp	

              2.    (∃x)A(x) 	

         	

      	

temp. hyp	

              3.    A(a)      	

        	

      	

2, ei	

              4.    [A(a)]ʹ′ 	

         	

      	

1, ui	

              5.    [(∀x)[A(x)]ʹ′]ʹ′     	

      	

3, 4, inc	

              6.    (∃x)A(x) → [(∀x)[A(x)]ʹ′]ʹ′      temp. discharged
              7.    [((∀x)[A(x)]ʹ′)ʹ′]ʹ′             1, dn
              8.    [(∃x)A(x)]ʹ′                     6, 7, mt
Section 1.4                                         Predicate Logic                           9
Proving Verbal arguments
   ●          Every crocodile is bigger than every alligator. Sam is a crocodile. But
              there is a snake, and Sam isn’t bigger than that snake. Therefore,
              something is not an alligator.	

              ■      Use C(x): x is a crocodile; A(x): x is an alligator, B(x,y): x is bigger than y,
                     s is a constant (Sam), S(x): x is a Snake	

   ●          Hence prove argument
              (∀x) (∀y)[C(x) Λ A(y) → B(x,y)] Λ C(s) Λ (∃x)(S(x) Λ [B(s,x)]ʹ′) → (∃x)[A(x)]	

              1.     (∀x) (∀y)[C(x) Λ A(x) → B(x,y)]                      hyp
              2.     C(s)                                                 hyp
              3.     (∃x)(S(x) Λ [B(s,x)]ʹ′)                              hyp
              4.     (∀y)[C(s) Λ A(y) → B(s,y)]                           1, ui
              5.     S(a) Λ [B(s,a)]ʹ′)                                   3, ei
              6.     C(s) Λ A(a) → B(s,a)                                 4, ui
              7.     [B(s,a)]ʹ′                                           5, sim
              8.     [C(s) Λ A(a)]ʹ′                                      6, 7, mt
              9.     [C(s)]ʹ′ V [A(a)]ʹ′                                  9, De Morgan
              10.    [[C(s)]ʹ′]ʹ′                                         2, dn
              11.    [A(a)]ʹ′                                             9, 10, ds
              12.    (∃x)[A(x)]ʹ′                                         11, eg

Section 1.4                                           Predicate Logic                               10
Class Exercise
     ●        Prove the argument 	

 	

          	

(∀x)[(B(x) V C(x)) → A(x)] → (∀x)[B(x) → A(x)] 	



              Proof sequence:

              1.    (∀x)[(B(x) V C(x)) → A(x)]                     hyp
              2.    (B(x) V C(x)) → A(x)                           1, ui
              3.    B(x)                                           temp. hyp
              4.    B(x) V C(x)                                    3, add
              5.    A(x)                                           2, 4, mp
              6.    B(x) → A(x)                                    temp. hyp discharged
              7.    (∀x)[B(x) → A(x)]                              6, ug




Section 1.4                                      Predicate Logic                          11
Class exercise
   ●     Every ambassador speaks only to diplomats, and some ambassadors speak
         to someone. Therefore, there is a diplomat.	

   ●     Use A(x): x is an ambassador; S(x,y): x speaks to y; D(x): x is a diplomat	


     Prove the argument
     (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] Λ (∃x)(∃y)(A(x) Λ S(x,y)) → (∃x)D(x)

        Proof Sequence:
        1.  (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)]                       hyp
        2.  (∃x)(∃y)(A(x) Λ S(x,y))                           hyp
        3.  (∀y)((A(a) Λ S(a,y)) → D(y))                            1, ui
        4.  (∃y)(A(a) Λ S(a,y))                                     2, ei
        5.  A(a) Λ S(a,b)                                           4, ei
        6.  (A(a) Λ S(a,b)) → D(b)                                  3, ui
        7.  D(b)                                                    5, 6, mp
        8.  (∃x)D(x)                                                7, eg

Section 1.4                                 Predicate Logic                         12

Más contenido relacionado

La actualidad más candente

Predicates and quantifiers
Predicates and quantifiersPredicates and quantifiers
Predicates and quantifiersIstiak Ahmed
 
Rules of inference
Rules of inferenceRules of inference
Rules of inferenceharman kaur
 
Pseudo Random Number Generators
Pseudo Random Number GeneratorsPseudo Random Number Generators
Pseudo Random Number GeneratorsDarshini Parikh
 
5.2 primitive recursive functions
5.2 primitive recursive functions5.2 primitive recursive functions
5.2 primitive recursive functionsSampath Kumar S
 
Intro to Discrete Mathematics
Intro to Discrete MathematicsIntro to Discrete Mathematics
Intro to Discrete Mathematicsasad faraz
 
Chapter 4 part4- General Probability Rules
Chapter 4 part4- General Probability RulesChapter 4 part4- General Probability Rules
Chapter 4 part4- General Probability Rulesnszakir
 
Predicates and Quantifiers
Predicates and Quantifiers Predicates and Quantifiers
Predicates and Quantifiers Istiak Ahmed
 
Sequences and summations
Sequences and summationsSequences and summations
Sequences and summationsAli Saleem
 
Counting, mathematical induction and discrete probability
Counting, mathematical induction and discrete probabilityCounting, mathematical induction and discrete probability
Counting, mathematical induction and discrete probabilitySURBHI SAROHA
 
Type Theory and Practical Application
Type Theory and Practical ApplicationType Theory and Practical Application
Type Theory and Practical ApplicationJack Fox
 
Discrete mathematics counting and logic relation
Discrete mathematics counting and logic relationDiscrete mathematics counting and logic relation
Discrete mathematics counting and logic relationSelf-Employed
 
Logical Agents
Logical AgentsLogical Agents
Logical AgentsYasir Khan
 
Proposition Logic in Discrete Structure
Proposition Logic in Discrete StructureProposition Logic in Discrete Structure
Proposition Logic in Discrete StructureNANDINI SHARMA
 
ProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) IntroductionProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) Introductionwahab khan
 

La actualidad más candente (20)

First order logic
First order logicFirst order logic
First order logic
 
Predicates and quantifiers
Predicates and quantifiersPredicates and quantifiers
Predicates and quantifiers
 
Primality
PrimalityPrimality
Primality
 
Rules of inference
Rules of inferenceRules of inference
Rules of inference
 
Pseudo Random Number Generators
Pseudo Random Number GeneratorsPseudo Random Number Generators
Pseudo Random Number Generators
 
5.2 primitive recursive functions
5.2 primitive recursive functions5.2 primitive recursive functions
5.2 primitive recursive functions
 
Intro to Discrete Mathematics
Intro to Discrete MathematicsIntro to Discrete Mathematics
Intro to Discrete Mathematics
 
Chapter 4 part4- General Probability Rules
Chapter 4 part4- General Probability RulesChapter 4 part4- General Probability Rules
Chapter 4 part4- General Probability Rules
 
Predicates and Quantifiers
Predicates and Quantifiers Predicates and Quantifiers
Predicates and Quantifiers
 
Sequences and summations
Sequences and summationsSequences and summations
Sequences and summations
 
Counting, mathematical induction and discrete probability
Counting, mathematical induction and discrete probabilityCounting, mathematical induction and discrete probability
Counting, mathematical induction and discrete probability
 
Type Theory and Practical Application
Type Theory and Practical ApplicationType Theory and Practical Application
Type Theory and Practical Application
 
Discrete mathematics counting and logic relation
Discrete mathematics counting and logic relationDiscrete mathematics counting and logic relation
Discrete mathematics counting and logic relation
 
AI Lecture 5 (game playing)
AI Lecture 5 (game playing)AI Lecture 5 (game playing)
AI Lecture 5 (game playing)
 
Combinatorics
CombinatoricsCombinatorics
Combinatorics
 
Logical Agents
Logical AgentsLogical Agents
Logical Agents
 
Proposition Logic in Discrete Structure
Proposition Logic in Discrete StructureProposition Logic in Discrete Structure
Proposition Logic in Discrete Structure
 
ProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) IntroductionProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) Introduction
 
Tsp branch and-bound
Tsp branch and-boundTsp branch and-bound
Tsp branch and-bound
 
Repeated Trials Probability
Repeated Trials ProbabilityRepeated Trials Probability
Repeated Trials Probability
 

Similar a CPSC 125 Ch 1 sec 4

Lecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceLecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceasimnawaz54
 
Quantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuQuantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuSEENET-MTP
 
Discrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfDiscrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfMuhammadUmerIhtisham
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docxedwin orege
 
Stochastic Differentiation
Stochastic DifferentiationStochastic Differentiation
Stochastic DifferentiationSSA KPI
 
1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the tofariyaPatel
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database TheoryJan Hidders
 
Polynomial functions modelllings
Polynomial functions modelllingsPolynomial functions modelllings
Polynomial functions modelllingsTarun Gehlot
 
Monte Carlo Methods
Monte Carlo MethodsMonte Carlo Methods
Monte Carlo MethodsJames Bell
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking componentsChristian Robert
 
PAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPierre Jacob
 
Introduction to Stochastic calculus
Introduction to Stochastic calculusIntroduction to Stochastic calculus
Introduction to Stochastic calculusAshwin Rao
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Valentin De Bortoli
 
Monte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPMonte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPSSA KPI
 
PAGOdA poster
PAGOdA posterPAGOdA poster
PAGOdA posterDBOnto
 
Scientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve FittingScientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve FittingEnthought, Inc.
 

Similar a CPSC 125 Ch 1 sec 4 (20)

Lecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inferenceLecture 3 qualtifed rules of inference
Lecture 3 qualtifed rules of inference
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Quantum modes - Ion Cotaescu
Quantum modes - Ion CotaescuQuantum modes - Ion Cotaescu
Quantum modes - Ion Cotaescu
 
Discrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdfDiscrete Structure Lecture #5 & 6.pdf
Discrete Structure Lecture #5 & 6.pdf
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docx
 
Stochastic Differentiation
Stochastic DifferentiationStochastic Differentiation
Stochastic Differentiation
 
1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to1004_theorem_proving_2018.pptx on the to
1004_theorem_proving_2018.pptx on the to
 
02 RULES OF INFERENCES.pptx
02 RULES OF INFERENCES.pptx02 RULES OF INFERENCES.pptx
02 RULES OF INFERENCES.pptx
 
Course notes2summer2012
Course notes2summer2012Course notes2summer2012
Course notes2summer2012
 
Proba stats-r1-2017
Proba stats-r1-2017Proba stats-r1-2017
Proba stats-r1-2017
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database Theory
 
Polynomial functions modelllings
Polynomial functions modelllingsPolynomial functions modelllings
Polynomial functions modelllings
 
Monte Carlo Methods
Monte Carlo MethodsMonte Carlo Methods
Monte Carlo Methods
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking components
 
PAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ WarwickPAWL - GPU meeting @ Warwick
PAWL - GPU meeting @ Warwick
 
Introduction to Stochastic calculus
Introduction to Stochastic calculusIntroduction to Stochastic calculus
Introduction to Stochastic calculus
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...
 
Monte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLPMonte-Carlo method for Two-Stage SLP
Monte-Carlo method for Two-Stage SLP
 
PAGOdA poster
PAGOdA posterPAGOdA poster
PAGOdA poster
 
Scientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve FittingScientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve Fitting
 

Más de David Wood

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?David Wood
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...David Wood
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 KeynoteDavid Wood
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart CityDavid Wood
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software DevelopmentDavid Wood
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelDavid Wood
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301David Wood
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601David Wood
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors KillDavid Wood
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in AustraliaDavid Wood
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsDavid Wood
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social mediaDavid Wood
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's JourneyDavid Wood
 
Open by Default
Open by DefaultOpen by Default
Open by DefaultDavid Wood
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926David Wood
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426David Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 

Más de David Wood (20)

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 Keynote
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software Development
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data model
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors Kill
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in Australia
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social media
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's Journey
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

CPSC 125 Ch 1 sec 4

  • 1. Formal Logic Mathematical Structures for Computer Science Chapter 1 Copyright © 2006 W.H. Freeman & Co. MSCS Slides Formal Logic
  • 2. Predicate Logic ●  Similar to propositional logic for solving arguments, build from quantifiers, predicates and logical connectives. ●  A valid argument for predicate logic need not be a tautology. ●  The meaning and the structure of the quantifiers and predicates determines the interpretation and the validity of the arguments ●  Basic approach to prove arguments: ■  Strip of quantifiers ■  Manipulate the unquantified wffs ■  Reinsert the quantifiers Four new inference rules Two rules to strip the qualifiers Two rules to reinsert the qualifiers ●  Note to remember: P(x) could be (∀y) (∀z) Q(x,y,z) Section 1.4 Predicate Logic 1
  • 3. Inference Rules From Can Derive Name / Restrictions on Use Abbreviation (∀x)P(x) P(t) where t is a Universal If t is a variable, it must variable or constant Instantiation- ui not fall within the scope symbol of a quantifier for t (∃x)P(x) P(t) where t is a Existential Must be the first rule variable or constant Instantiation- ei used that introduces t symbol not previously used in a proof sequence P(x) (∀x)P(x) Universal P(x) has not been Generalization- ug deduced from any hypotheses in which x is a free variable nor has P (x) been deduced by ei from any wff in which x is a free variable P(x) or P(a) (∃x)P(x) Existential To go from P(a) to (∃x)P Generalization- eg (x), x must not appear in P(a) Section 1.4 Predicate Logic 2
  • 4. Examples: Proofs using Predicate Logic ●  Prove the following argument: ■  All flowers are plants. Sunflower is a flower. Therefore, sunflower is a plant. ■  P(x) is “ x is a plant” ■  a is a constant symbol (Sunflower) ■  Q(x) is “x is a flower” ●  The argument is (∀x)[Q(x) → P(x)] Λ Q(a) → P(a) ●  The proof sequence is as follows: 1.  (∀x)[Q(x) → P(x)] hyp 2.  Q(a) hyp 3.  Q(a) → P(a) 1, ui 4.  P(a) 2, 3, mp Section 1.4 Predicate Logic 3
  • 5. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) → Q(x)] Λ [Q(y)]ʹ′ → [P(y)]ʹ′ ●  Proof sequence: 1.  (∀x)[P(x) → Q(x)] hyp 2.  [Q(y)]ʹ′ hyp 3.  P(y) → Q(y) 1, ui 4.  [P(y)]ʹ′ 2, 3, mt ●  Prove the argument (∀x)P(x) → (∃x)P(x) ●  Proof sequence: 1.  (∀x)P(x) hyp 2.  P(x) 1, ui 3.  (∃x)P(x) 2, eg Section 1.4 Predicate Logic 4
  • 6. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) → Q(x)] Λ (∀x)P(x) → (∀x)Q(x) ●  Proof sequence: 1.  (∀x)[P(x) → Q(x)] hyp 2.  (∀x)P(x) hyp 3.  P(x) → Q(x) 1, ui 4.  P(x) 2, ui : no restriction on ui about reusing a name 5.  Q(x) 3, 4, mp 6.  (∀x)Q(x) 5, ug ●  Note: step 6 is legitimate since x is not a free variable in any hypothesis nor was ei used before Section 1.4 Predicate Logic 5
  • 7. Examples: Proofs using Predicate Logic ●  Prove the argument (∀x)[P(x) Λ Q(x)] → (∀x)P(x) Λ (∀x)Q(x) ●  Proof sequence: 1.  (∀x)[P(x) Λ Q(x)] hyp 2.  P(x) Λ Q(x) 1, ui 3.  P(x) 2, sim 4.  Q(x) 2, sim 5.  (∀x)P(x) 3, ug 6.  (∀x)Q(x) 4, ug 7.  (∀x)P(x) Λ (∀x)Q(x) 5, 6, con Section 1.4 Predicate Logic 6
  • 8. Examples: Proofs using Predicate Logic ●  Prove the argument (∀y)[P(x) → Q(x,y)] → [P(x) → (∀y)Q(x,y)] ●  Using the deduction method, we can derive (∀y)[P(x) → Q(x,y)] Λ P(x) → (∀y)Q(x,y) ●  Proof sequence: 1.  (∀y)[P(x) → Q(x,y)] hyp 2.  P(x) hyp 3.  P(x) → Q(x,y) 1, ui 4.  Q(x,y) 2, 3, mp 5.  (∀y)Q(x,y) 4, ug Section 1.4 Predicate Logic 7
  • 9. Temporary hypotheses ●  A temporary hypothesis can be inserted into a proof sequence. If T is inserted as a temporary hypothesis and eventually W is deduced from T and other hypotheses, then the wff T → W has been deduced from other hypotheses and can be reinserted into the proof sequence ●  Prove the argument [P(x) → (∀y)Q(x,y)] → (∀y)[P(x) → Q(x,y)] ●  Proof sequence: 1.  P(x) → (∀y)Q(x,y) hyp 2.  P(x) temporary hypothesis 3.  (∀y)Q(x,y) 1, 2, mp 4.  Q(x,y) 3, ui 5.  P(x) → Q(x,y) temp. hyp discharged 6.  (∀y)[P(x) → Q(x,y)] 5, ug Section 1.4 Predicate Logic 8
  • 10. More Examples ●  Prove the sequence [(∃x)A(x)]ʹ′ ⇔ (∀x)[A(x)]ʹ′ ■  To prove equivalence, implication in each direction should be proved ●  Proof sequence for [(∃x)A(x)]ʹ′ → (∀x)[A(x)]ʹ′ 1.  [(∃x)A(x)]ʹ′ hyp 2.  A(x) temp. hyp 3.  (∃x)A(x) 2, eg 4.  A(x) → (∃x)A(x) temp. hyp discharged 5.  [A(x)]ʹ′ 1, 4, mt 6.  (∀x)[A(x)]ʹ′ 5, ug ●  Proof sequence for (∀x)[A(x)]ʹ′ → [(∃x)A(x)]ʹ′ 1.  (∀x)[A(x)]ʹ′ hyp 2.  (∃x)A(x) temp. hyp 3.  A(a) 2, ei 4.  [A(a)]ʹ′ 1, ui 5.  [(∀x)[A(x)]ʹ′]ʹ′ 3, 4, inc 6.  (∃x)A(x) → [(∀x)[A(x)]ʹ′]ʹ′ temp. discharged 7.  [((∀x)[A(x)]ʹ′)ʹ′]ʹ′ 1, dn 8.  [(∃x)A(x)]ʹ′ 6, 7, mt Section 1.4 Predicate Logic 9
  • 11. Proving Verbal arguments ●  Every crocodile is bigger than every alligator. Sam is a crocodile. But there is a snake, and Sam isn’t bigger than that snake. Therefore, something is not an alligator. ■  Use C(x): x is a crocodile; A(x): x is an alligator, B(x,y): x is bigger than y, s is a constant (Sam), S(x): x is a Snake ●  Hence prove argument (∀x) (∀y)[C(x) Λ A(y) → B(x,y)] Λ C(s) Λ (∃x)(S(x) Λ [B(s,x)]ʹ′) → (∃x)[A(x)] 1.  (∀x) (∀y)[C(x) Λ A(x) → B(x,y)] hyp 2.  C(s) hyp 3.  (∃x)(S(x) Λ [B(s,x)]ʹ′) hyp 4.  (∀y)[C(s) Λ A(y) → B(s,y)] 1, ui 5.  S(a) Λ [B(s,a)]ʹ′) 3, ei 6.  C(s) Λ A(a) → B(s,a) 4, ui 7.  [B(s,a)]ʹ′ 5, sim 8.  [C(s) Λ A(a)]ʹ′ 6, 7, mt 9.  [C(s)]ʹ′ V [A(a)]ʹ′ 9, De Morgan 10.  [[C(s)]ʹ′]ʹ′ 2, dn 11.  [A(a)]ʹ′ 9, 10, ds 12.  (∃x)[A(x)]ʹ′ 11, eg Section 1.4 Predicate Logic 10
  • 12. Class Exercise ●  Prove the argument (∀x)[(B(x) V C(x)) → A(x)] → (∀x)[B(x) → A(x)] Proof sequence: 1.  (∀x)[(B(x) V C(x)) → A(x)] hyp 2.  (B(x) V C(x)) → A(x) 1, ui 3.  B(x) temp. hyp 4.  B(x) V C(x) 3, add 5.  A(x) 2, 4, mp 6.  B(x) → A(x) temp. hyp discharged 7.  (∀x)[B(x) → A(x)] 6, ug Section 1.4 Predicate Logic 11
  • 13. Class exercise ●  Every ambassador speaks only to diplomats, and some ambassadors speak to someone. Therefore, there is a diplomat. ●  Use A(x): x is an ambassador; S(x,y): x speaks to y; D(x): x is a diplomat Prove the argument (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] Λ (∃x)(∃y)(A(x) Λ S(x,y)) → (∃x)D(x) Proof Sequence: 1.  (∀x) (∀y)[(A(x) Λ S(x,y)) → D(y)] hyp 2.  (∃x)(∃y)(A(x) Λ S(x,y)) hyp 3.  (∀y)((A(a) Λ S(a,y)) → D(y)) 1, ui 4.  (∃y)(A(a) Λ S(a,y)) 2, ei 5.  A(a) Λ S(a,b) 4, ei 6.  (A(a) Λ S(a,b)) → D(b) 3, ui 7.  D(b) 5, 6, mp 8.  (∃x)D(x) 7, eg Section 1.4 Predicate Logic 12