Inference in first-order logic



Similar documents
Sound and Complete Inference Rules in FOL

Logic in general. Inference rules and theorem proving

Limitations of Propositional Logic => Predicate Calculus. Natural Language and Dialogue Systems Lab

Example: Backward Chaining. Inference Strategy: Backward Chaining. First-Order Logic. Knowledge Engineering. Example: Proof

Lecture 8: Resolution theorem-proving

Handout #1: Mathematical Reasoning

Lecture 13 of 41. More Propositional and Predicate Logic

ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS

Logical Agents. Explorations in Artificial Intelligence. Knowledge-based Agents. Knowledge-base Agents. Outline. Knowledge bases

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

15-780: Graduate AI Lecture 3. FOL proofs. Geoff Gordon (this lecture) Tuomas Sandholm TAs Erik Zawadzki, Abe Othman

2. The Language of First-order Logic

3. Mathematical Induction

Mathematical Induction

Resolution. Informatics 1 School of Informatics, University of Edinburgh

Answers G53KRR

CHAPTER 7 GENERAL PROOF SYSTEMS

Predicate Logic. For example, consider the following argument:

Rules of Inference Friday, January 18, 2013 Chittu Tripathy Lecture 05

Likewise, we have contradictions: formulas that can only be false, e.g. (p p).

(LMCS, p. 317) V.1. First Order Logic. This is the most powerful, most expressive logic that we will examine.

Introduction to Logic in Computer Science: Autumn 2006

Computability Theory

6.080/6.089 GITCS Feb 12, Lecture 3

The Classes P and NP

Logic and Reasoning Practice Final Exam Spring Section Number

First-Order Logics and Truth Degrees

Relations: their uses in programming and computational specifications

Mathematical Induction

CS 3719 (Theory of Computation and Algorithms) Lecture 4

DEDUCTIVE & INDUCTIVE REASONING

CS510 Software Engineering

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2

def: An axiom is a statement that is assumed to be true, or in the case of a mathematical system, is used to specify the system.

Foundational Proof Certificates

This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.

Computational Methods for Database Repair by Signed Formulae

Predicate logic Proofs Artificial intelligence. Predicate logic. SET07106 Mathematics for Software Engineering

DISCRETE MATH: LECTURE 3

each college c i C has a capacity q i - the maximum number of students it will admit

1.2 Forms and Validity

First-order logic. Chapter 8. Chapter 8 1

University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees

Cassandra. References:

How To Understand The Theory Of Computer Science

Fixed-Point Logics and Computation

Automata and Formal Languages

Basic Proof Techniques

6.2 Permutations continued

Certamen 1 de Representación del Conocimiento

CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r.

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University

Invalidity in Predicate Logic

Remarks on Non-Fregean Logic

Introduction to Automata Theory. Reading: Chapter 1

Guessing Game: NP-Complete?

The History of Logic. Aristotle ( BC) invented logic.

Data Structures Fibonacci Heaps, Amortized Analysis

Bounded Treewidth in Knowledge Representation and Reasoning 1

Deterministic Finite Automata

NP-Completeness and Cook s Theorem

MATH10040 Chapter 2: Prime and relatively prime numbers

Relational Databases

Solving Linear Systems, Continued and The Inverse of a Matrix

Schedule. Logic (master program) Literature & Online Material. gic. Time and Place. Literature. Exercises & Exam. Online Material

Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm

Computational Logic and Cognitive Science: An Overview

Sudoku as a SAT Problem

Cartesian Products and Relations

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.

Sudoku puzzles and how to solve them

Lecture 2. What is the Normative Role of Logic?

Regular Languages and Finite Automata

The last three chapters introduced three major proof techniques: direct,

Predicate Logic. Example: All men are mortal. Socrates is a man. Socrates is mortal.

Applied Logic in Engineering

Automated Theorem Proving - summary of lecture 1

Why Study NP- hardness. NP Hardness/Completeness Overview. P and NP. Scaling 9/3/13. Ron Parr CPS 570. NP hardness is not an AI topic

Course Outline Department of Computing Science Faculty of Science. COMP Applied Artificial Intelligence (3,1,0) Fall 2015

InvGen: An Efficient Invariant Generator

Math 3000 Section 003 Intro to Abstract Math Homework 2

Summary Last Lecture. Automated Reasoning. Outline of the Lecture. Definition sequent calculus. Theorem (Normalisation and Strong Normalisation)

THEORY of COMPUTATION

Pushdown Automata. place the input head on the leftmost input symbol. while symbol read = b and pile contains discs advance head remove disc from pile

How To Understand The Theory Of Hyperreals

Full and Complete Binary Trees

AUTOMATED REASONING SLIDES 3: RESOLUTION The resolution rule Unification Refutation by resolution Factoring Clausal Form and Skolemisation

Bounded-width QBF is PSPACE-complete

On strong fairness in UNITY

CSE 135: Introduction to Theory of Computation Decidability and Recognizability

Transcription:

Inference in first-order logic Chapter 9 Chapter 9 1

Outline Reducing first-order inference to propositional inference Unification Generalized Modus Ponens Forward and backward chaining Logic programming Resolution Chapter 9 2

A brief history of reasoning 450b.c. Stoics propositional logic, inference (maybe) 322b.c. Aristotle syllogisms (inference rules), quantifiers 1565 Cardano probability theory (propositional logic + uncertainty) 1847 Boole propositional logic (again) 1879 Frege first-order logic 1922 Wittgenstein proof by truth tables 1930 Gödel complete algorithm for FOL 1930 Herbrand complete algorithm for FOL (reduce to propositional) 1931 Gödel complete algorithm for arithmetic 1960 Davis/Putnam practical algorithm for propositional logic 1965 Robinson practical algorithm for FOL resolution Chapter 9 3

Universal instantiation (UI) Every instantiation of a universally quantified sentence is entailed by it: v α Subst({v/g}, α) for any variable v and ground term g E.g., x King(x) Greedy(x) Evil(x) yields King(John) Greedy(John) Evil(John) King(Richard) Greedy(Richard) Evil(Richard) King(F ather(john)) Greedy(F ather(john)) Evil(F ather(john)). Chapter 9 4

Existential instantiation (EI) For any sentence α, variable v, and constant symbol k that does not appear elsewhere in the knowledge base: v α Subst({v/k}, α) E.g., x Crown(x) OnHead(x, John) yields Crown(C 1 ) OnHead(C 1, John) provided C 1 is a new constant symbol, called a Skolem constant Another example: from x d(x y )/dy = x y we obtain d(e y )/dy = e y provided e is a new constant symbol Chapter 9 5

Existential instantiation contd. UI can be applied several times to add new sentences; the new KB is logically equivalent to the old EI can be applied once to replace the existential sentence; the new KB is not equivalent to the old, but is satisfiable iff the old KB was satisfiable Chapter 9 6

Reduction to propositional inference Suppose the KB contains just the following: x King(x) Greedy(x) Evil(x) King(John) Greedy(John) Brother(Richard, John) Instantiating the universal sentence in all possible ways, we have King(John) Greedy(John) Evil(John) King(Richard) Greedy(Richard) Evil(Richard) King(John) Greedy(John) Brother(Richard, John) The new KB is propositionalized: proposition symbols are King(John), Greedy(John), Evil(John), King(Richard) etc. Chapter 9 7

Reduction contd. Claim: a ground sentence is entailed by new KB iff entailed by original KB Claim: every FOL KB can be propositionalized so as to preserve entailment Idea: propositionalize KB and query, apply resolution, return result Problem: with function symbols, there are infinitely many ground terms, e.g., F ather(f ather(f ather(john))) Theorem: Herbrand (1930). If a sentence α is entailed by an FOL KB, it is entailed by a finite subset of the propositional KB Idea: For n = 0 to do create a propositional KB by instantiating with depth-n terms see if α is entailed by this KB Problem: works if α is entailed, loops if α is not entailed Theorem: Turing (1936), Church (1936), entailment in FOL is semidecidable Chapter 9 8

Problems with propositionalization Propositionalization seems to generate lots of irrelevant sentences. E.g., from x King(x) Greedy(x) Evil(x) King(John) y Greedy(y) Brother(Richard, John) it seems obvious that Evil(John), but propositionalization produces lots of facts such as Greedy(Richard) that are irrelevant With p k-ary predicates and n constants, there are p n k instantiations With function symbols, it gets nuch much worse! Chapter 9 9

Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) Knows(John, x) Knows(y, OJ) Knows(John, x) Knows(y, M other(y)) Knows(John, x) Knows(x, OJ) Chapter 9 10

Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) Knows(John, x) Knows(y, M other(y)) Knows(John, x) Knows(x, OJ) Chapter 9 11

Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) {x/oj, y/john} Knows(John, x) Knows(y, M other(y)) Knows(John, x) Knows(x, OJ) Chapter 9 12

Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) {x/oj, y/john} Knows(John, x) Knows(y, M other(y)) {y/john, x/m other(john)} Knows(John, x) Knows(x, OJ) Chapter 9 13

Unification We can get the inference immediately if we can find a substitution θ such that King(x) and Greedy(x) match King(John) and Greedy(y) θ = {x/john, y/john} works Unify(α, β) = θ if αθ = βθ p q θ Knows(John, x) Knows(John, Jane) {x/jane} Knows(John, x) Knows(y, OJ) {x/oj, y/john} Knows(John, x) Knows(y, M other(y)) {y/john, x/m other(john)} Knows(John, x) Knows(x, OJ) f ail Standardizing apart eliminates overlap of variables, e.g., Knows(z 17, OJ) Chapter 9 14

Generalized Modus Ponens (GMP) p 1, p 2,..., p n, (p 1 p 2... p n q) qθ where p i θ = p i θ for all i p 1 is King(John) p 1 is King(x) p 2 is Greedy(y) p 2 is Greedy(x) θ is {x/john, y/john} q is Evil(x) qθ is Evil(John) GMP used with KB of definite clauses (exactly one positive literal) All variables assumed universally quantified Chapter 9 15

Soundness of GMP Need to show that p 1,..., p n, (p 1... p n q) = qθ provided that p i θ = p i θ for all i Lemma: For any definite clause p, we have p = pθ by UI 1. (p 1... p n q) = (p 1... p n q)θ = (p 1 θ... p n θ qθ) 2. p 1,..., p n = p 1... p n = p 1 θ... p n θ 3. From 1 and 2, qθ follows by ordinary Modus Ponens Chapter 9 16

Example knowledge base The law says that it is a crime for an American to sell weapons to hostile nations. The country Nono, an enemy of America, has some missiles, and all of its missiles were sold to it by Colonel West, who is American. Prove that Col. West is a criminal Chapter 9 17

Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: Chapter 9 18

Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles Chapter 9 19

Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West Chapter 9 20

Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West x Missile(x) Owns(Nono, x) Sells(W est, x, Nono) Missiles are weapons: Chapter 9 21

Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West x Missile(x) Owns(Nono, x) Sells(W est, x, Nono) Missiles are weapons: Missile(x) W eapon(x) An enemy of America counts as hostile : Chapter 9 22

Example knowledge base contd.... it is a crime for an American to sell weapons to hostile nations: American(x) W eapon(y) Sells(x, y, z) Hostile(z) Criminal(x) Nono... has some missiles, i.e., x Owns(Nono, x) Missile(x): Owns(Nono, M 1 ) and Missile(M 1 )... all of its missiles were sold to it by Colonel West x Missile(x) Owns(Nono, x) Sells(W est, x, Nono) Missiles are weapons: Missile(x) W eapon(x) An enemy of America counts as hostile : Enemy(x, America) Hostile(x) West, who is American... American(W est) The country Nono, an enemy of America... Enemy(N ono, America) Chapter 9 23

Forward chaining algorithm function FOL-FC-Ask(KB, α) returns a substitution or false repeat until new is empty new { } for each sentence r in KB do ( p 1... p n q) Standardize-Apart(r) for each θ such that (p 1... p n )θ = (p 1... p n )θ for some p 1,..., p n in KB q Subst(θ, q) if q is not a renaming of a sentence already in KB or new then do add q to new φ Unify(q, α) if φ is not fail then return φ add new to KB return false Chapter 9 24

Forward chaining proof American(West) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Chapter 9 25

Forward chaining proof Weapon(M1) Sells(West,M1,Nono) Hostile(Nono) American(West) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Chapter 9 26

Forward chaining proof Criminal(West) Weapon(M1) Sells(West,M1,Nono) Hostile(Nono) American(West) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Chapter 9 27

Properties of forward chaining Sound and complete for first-order definite clauses (proof similar to propositional proof) Datalog = first-order definite clauses + no functions (e.g., crime KB) FC terminates for Datalog in poly iterations: at most p n k literals May not terminate in general if α is not entailed This is unavoidable: entailment with definite clauses is semidecidable Chapter 9 28

Efficiency of forward chaining Simple observation: no need to match a rule on iteration k if a premise wasn t added on iteration k 1 match each rule whose premise contains a newly added literal Matching itself can be expensive Database indexing allows O(1) retrieval of known facts e.g., query Missile(x) retrieves Missile(M 1 ) Matching conjunctive premises against known facts is NP-hard Forward chaining is widely used in deductive databases Chapter 9 29

Hard matching example WA NT SA V Q Victoria T NSW Diff(wa, nt) Diff(wa, sa) Diff(nt, q)diff(nt, sa) Diff(q, nsw) Diff(q, sa) Diff(nsw, v) Diff(nsw, sa) Diff(v, sa) Colorable() Diff(Red, Blue) Diff(Green, Red) Diff(Blue, Red) Diff(Red, Green) Diff(Green, Blue) Diff(Blue, Green) Colorable() is inferred iff the CSP has a solution CSPs include 3SAT as a special case, hence matching is NP-hard Chapter 9 30

Backward chaining algorithm function FOL-BC-Ask(KB, goals, θ) returns a set of substitutions inputs: KB, a knowledge base goals, a list of conjuncts forming a query (θ already applied) θ, the current substitution, initially the empty substitution { } local variables: answers, a set of substitutions, initially empty if goals is empty then return {θ} q Subst(θ, First(goals)) for each sentence r in KB where Standardize-Apart(r) = ( p 1... p n q) and θ Unify(q, q ) succeeds new goals [ p 1,..., p n Rest(goals)] answers FOL-BC-Ask(KB, new goals, Compose(θ, θ)) answers return answers Chapter 9 31

Backward chaining example Criminal(West) Chapter 9 32

Backward chaining example Criminal(West) {x/west} Weapon(y) American(x) Sells(x,y,z) Hostile(z) Chapter 9 33

Backward chaining example Criminal(West) {x/west} American(West) { } Weapon(y) Sells(x,y,z) Hostile(z) Chapter 9 34

Backward chaining example Criminal(West) {x/west} American(West) Weapon(y) Sells(West,M1,z) Sells(x,y,z) Hostile(Nono) Hostile(z) { } Missile(y) Chapter 9 35

Backward chaining example Criminal(West) {x/west, y/m1} American(West) Weapon(y) Sells(West,M1,z) Sells(x,y,z) Hostile(Nono) Hostile(z) { } Missile(y) { y/m1} Chapter 9 36

Backward chaining example Criminal(West) {x/west, y/m1, z/nono} American(West) Weapon(y) Sells(West,M1,z) Hostile(z) { } { z/nono } Missile(y) { y/m1} Missile(M1) Owns(Nono,M1) Chapter 9 37

Backward chaining example Criminal(West) {x/west, y/m1, z/nono} American(West) { } Weapon(y) Sells(West,M1,z) { z/nono } Hostile(Nono) Missile(y) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) { y/m1} { } { } { } Chapter 9 38

Properties of backward chaining Depth-first recursive proof search: space is linear in size of proof Incomplete due to infinite loops fix by checking current goal against every goal on stack Inefficient due to repeated subgoals (both success and failure) fix using caching of previous results (extra space!) Widely used (without improvements!) for logic programming Chapter 9 39

Logic programming Sound bite: computation as inference on logical KBs Logic programming Ordinary programming 1. Identify problem Identify problem 2. Assemble information Assemble information 3. Tea break Figure out solution 4. Encode information in KB Program solution 5. Encode problem instance as facts Encode problem instance as data 6. Ask queries Apply program to data 7. Find false facts Debug procedural errors Should be easier to debug Capital(NewY ork, US) than x := x + 2! Chapter 9 40

Prolog systems Basis: backward chaining with Horn clauses + bells & whistles Widely used in Europe, Japan (basis of 5th Generation project) Compilation techniques approaching a billion LIPS Program = set of clauses = head :- literal 1,... literal n. criminal(x) :- american(x), weapon(y), sells(x,y,z), hostile(z). Efficient unification by open coding Efficient retrieval of matching clauses by direct linking Depth-first, left-to-right backward chaining Built-in predicates for arithmetic etc., e.g., X is Y*Z+3 Closed-world assumption ( negation as failure ) e.g., given alive(x) :- not dead(x). alive(joe) succeeds if dead(joe) fails Chapter 9 41

Prolog examples Depth-first search from a start state X: dfs(x) :- goal(x). dfs(x) :- successor(x,s),dfs(s). No need to loop over S: successor succeeds for each Appending two lists to produce a third: append([],y,y). append([x L],Y,[X Z]) :- append(l,y,z). query: append(a,b,[1,2])? answers: A=[] B=[1,2] A=[1] B=[2] A=[1,2] B=[] Chapter 9 42

Full first-order version: Resolution: brief summary l 1 l k, m 1 m n (l 1 l i 1 l i+1 l k m 1 m j 1 m j+1 m n )θ where Unify(l i, m j ) = θ. For example, Rich(x) U nhappy(x) Rich(Ken) U nhappy(ken) with θ = {x/ken} Apply resolution steps to CNF (KB α); complete for FOL Chapter 9 43

Conversion to CNF Everyone who loves all animals is loved by someone: x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] 1. Eliminate biconditionals and implications x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] 2. Move inwards: x, p x p, x, p x p: x [ y ( Animal(y) Loves(x, y))] [ y Loves(y, x)] x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] x [ y Animal(y) Loves(x, y)] [ y Loves(y, x)] Chapter 9 44

Conversion to CNF contd. 3. Standardize variables: each quantifier should use a different one x [ y Animal(y) Loves(x, y)] [ z Loves(z, x)] 4. Skolemize: a more general form of existential instantiation. Each existential variable is replaced by a Skolem function of the enclosing universally quantified variables: x [Animal(F (x)) Loves(x, F (x))] Loves(G(x), x) 5. Drop universal quantifiers: [Animal(F (x)) Loves(x, F (x))] Loves(G(x), x) 6. Distribute over : [Animal(F (x)) Loves(G(x), x)] [ Loves(x, F (x)) Loves(G(x), x)] Chapter 9 45

Resolution proof: definite clauses American(West) Missile(M1) Missile(M1) Owns(Nono,M1) Enemy(Nono,America) Enemy(Nono,America) Criminal(x) LHostile(z) LSells(x,y,z) LWeapon(y) LAmerican(x) > > > > Weapon(x) LMissile(x) > Sells(West,x,Nono) LMissile(x) LOwns(Nono,x) > > Hostile(x) LEnemy(x,America) > LSells(West,y,z) LWeapon(y) LAmerican(West) > > LHostile(z) > LSells(West,y,z) LWeapon(y) > LHostile(z) > LSells(West,y,z) > LHostile(z) > LMissile(y) LHostile(z) > LSells(West,M1,z) > > LHostile(Nono) LOwns(Nono,M1) LMissile(M1) > LHostile(Nono) LOwns(Nono,M1) LHostile(Nono) LCriminal(West) Chapter 9 46