程序代做CS代考 prolog algorithm Hive cps721: Assignment 2 (100 points). – cscodehelp代写

cps721: Assignment 2 (100 points).
Due date: Electronic file – Tuesday, October 12, 2021, 17:00 (sharp).
You have to work in groups of TWO, or THREE. You should not work alone.
YOU SHOULD NOT USE “;” (disjunction) “!” (cut) AND “−>” IN YOUR PROLOG PROGRAMS.
You can discuss this assignment only with your CPS721 group partners or with the CPS721 instructor. By sub- mitting this assignment you acknowledge that you read and understood the course Policy on Collaboration in homework assignments stated in the CPS721 course management form.
1 (24 points). For each of the following pairs of Prolog lists, state which pairs can be made identical, and which cannot. Write brief explanations (name your file lists.txt ): it is not acceptable to give an answer without explanations. For those pairs that mention variables, and that can be made identical, give the values of their variables that make the two lists the same. As a proof for your answer provide transformation from one representation to another (e.g., from “,”-based notation to “|”-based notation, or vice versa, when possible). Make sure that you apply only equivalent transformations to a list when you rewrite a list in a different representation. You lose marks if you give only short answers, but do not explain.
[mth110 | [mth210 | [cps305 | [cps721 | CPS822]] ] ] and [P,R,Q | AI] [List | [List, a,b,c]] and [[], Z | U]
[U,[W|U],a,b] and [Z | [ [a|[b] ] | W ] ]
[Var | U] and [http, www | [ryerson, ca]]
[k,p|U] and [k,W,m,n,[W|[c]]]
[U|W] and [W|[[]|U]]
[myself, Q | [P | U]] and [W | [[vars| [P]] | [myself | Q]]] [k, [Q | [l,m]], tree | [book | Z]] and [P, U | [R,Q,n]]
Handing in solutions: (a) An electronic copy of your file lists.txt must be included in your zip archive. Make sure you provide detailed explanations for each pair of lists.
2 (46 points). In this part of the assignment you are asked to implement in Prolog a few programs with recursion over lists. Keep all these programs in one file named recursion.pl If you wish, you may use (you do not have to) any of the programs we wrote in class, but if you do, be sure to include them in your program file. (If one of the predicates that you would like to use is a part of the ECLiPSe Prolog’s standard library of predicates, then rename it and provide rules for the renamed predicate. See the handout “How to use Eclipse Prolog in labs” for details). You cannot use programs that we did not discuss in class. In most cases, try to write recursive programs yourself without using predicates from class. This will help you to learn about writing recursive programs. Use the case-analysis technique explained in class. If you introduce any new “helping” predicates, you have to implement them as well. Test each of your programs on some examples of your choice (including queries with variables when possible): save a copy of all tests in your file recursion.txt
1. nth(N,List,Element): the N th element of List is Element. You can assume that in any query the first argument is a positive integer, the second argument is a possibly empty list (input to your program), and the third argument is either a variable representing the result that has to be computed, or a constant (the N th element of the input list) representing the result to be verified. Examples of queries:
The following all succeed ?- nth(1,[a],a).
?- nth(3,[a,b,c],c).
?- nth(2,[a,b,c,d,e,f],b).
The following all fail
?- nth(0,[],X).
?- nth(1,[a,b,c],b).
?- nth(4,[p,q,r],Z).
2. The predicate remove(X,InputList,OutputList) holds when OutputList is the result of removing each occurrence of an element X from a given (possibly empty) list InputList. In queries, OutputList can be either a variable representing a list that should be computed, or a list that should be verified.
Examples of queries that succeed:
?- remove(a,[c,a,n,a,d,a],[c,n,d]).
?- remove(a,[],[]).
?- remove(a,[[d,e,f],[a,a]],[[d,e,f],[a,a]]). ?- remove([],[[]],X). returns X=[]
Examples of queries that fail:
?- remove(a,[a,b,c,d,a,e],[b,c,d,a,e]).
?- remove(a,[],[a]).
?- remove(a,[d,e,f,g,h],[d,e,f]).
1

3. splitEvenOdd(InList,List1,List2): InList is a given unsorted list of numbers (input to your program), and List1, List2 are lists of some elements from InList such that List1 is the list of all (if any) even numbers from InList, and List2 is a list containing all odd numbers of InList, if any. Both List1 and List2 should be sequences of elements in same order as in InList. Note that InList can be empty, and elements there can be repeated. There is no need to check your input for correctness.
Examples of queries that succeed:
?- splitEvenOdd([22,9,11,400,0],X,Y).
returns X=[22,400,0] and Y=[9,11] ?- splitEvenOdd([33],[],[33]).
?- splitEvenOdd([7,8,8,9,7],L1,L2).
returns L1=[8,8] and L2=[7,9,7]
Examples of queries that fail:
?- splitEvenOdd([],[H|T],X).
?- splitEvenOdd([1,2,3,4],[2,4],[3,1]).
?- splitEvenOdd([1,2],[2],[]).
4. The predicate lessThanEq(List1,List2,List3) is true if and only if the total number of elements in List1 and List2 is less than or equal to the number of elements in List3. Write a recursive program that implements this predicate. You can assume that in any query, the first, the second and the third arguments will be (possibly empty) given lists (input to your program). Examples of queries:
The following all succeed
?- lessThanEq([],[a,b,c],[k,l,m,n]). ?- lessThanEq([a],[[b],[c]],[k,l,m]).
The following all fail
?- lessThanEq([p,q,r],[a,b,c],[k,l,m,n]).
?- lessThanEq([H|T],[],[]).
5. PascalTriangleisasetofnumbersarrangedasatriangle:startwith”1”atthetop,thencontinueplacingnumbersbelowit in a triangular pattern. Each number is sum of the two numbers directly above it. You can find examples and illustrations at the Web page www.mathsisfun.com/pascals-triangle.html The predicate nextRow(Input,Row) is true if Input is a list of numbers representing a row in , and Row is the next row just below the given input row. Write a recursive program implementing this predicate. The predicate row(N,List) is true if List is a list of numbers representing N -th row in . Write a recursive program implementing directly this predicate. Use predicate nextRow(Input,Row) in your implementation. Note you cannot use a formula for calculating entries in the triangle or introduce any other predicates. Your program must be implemented as specified. Examples of output from your program:
?- row(7, R).
R = [1,6,15,20,15,6,1]
?- row(8, R).
R = [1,7,21,35,35,21,7,1]
?- row(10, R).
R = [1,9,36,84,126,126,84,36,9,1]
?- row(9, R).
R = [1,8,28,56,70,56,28,8,1]
Handing in solutions: (a) An electronic copy of your file recursion.pl with all your Prolog rules must be included in your zip archive; (b) your session with Prolog, showing the queries you submitted and the answers returned (the name of the file must be recursion.txt). It is up to you to formulate a range of queries that demonstrates that your programs are working properly.
3. (30 points).
This part will exercise what you have learned about recursion over terms in Prolog. This part consists of two sub-parts. First, you have to work with lists represented as terms. Second, you have to work with terms representing binary trees.
(a) The predicate qs(Input,Output) is true if Output is a sorted list of numbers from a given list Input. Let term next(Head,Tail) represents a Prolog list [H ead | T ail]. For example, next(7, next(1, next(5, next(0, next(9,nil))))) represents the list [7,1,5,0,9]. We use the constant nil to represent the empty list [ ]. You have to implement the well-known quick-sort algorithm in Prolog using this term-based notation for lists. Your program should work as follows. Given an input list of numbers, the program should take the head X of this input list next(X,Others) and use it as a pivot. This should be implemented using a helping predicate part(X, Others, Ls, Bs) which partitions numbers from Others into two sub-lists: Ls which include only elements less than the pivot X, and Bs which include only the numbers bigger than or equal to X. Once this partitioning has been completed, your program must recursively sort the lists Ls, Bs, and finally, it must merge the sorted halves together with the pivot into an ordered output list. The latter merge operation should be implemented using a helping predicate mergeLists(LT1,LT2,Result) that takes as input two lists LT1,LT2 represented using terms, as explained above, and combines them into a sorted list Result that also has a term-based representation. The following are examples of how your Prolog program should work.
2

?- qs(nil, Sorted).
Sorted = nil
?- qs(next(8, next(5, nil)), Out).
Out = next(5, next(8, nil))
?- qs(next(7, next(1, next(10, next(5, next(0, next(12, next(9, next(2,
next(11, next(4, next(6, next(8, next(3, nil))))))))))))), X). X = next(0, next(1, next(2, next(3, next(4, next(5, next(6, next(7, next(8,
next(9, next(10, next(11, next(12, nil)))))))))))))
(b) Let the term tree(X,Left,Mid,Right) represent a ternary tree with the element X in the root, and three branches Left, Mid, Right. The constant void represents the empty tree. In other words, a tree is ternary if nodes have at most 3 children. Recall that terms must be either arguments of predicates or arguments of equality since each term represents a structured object. Implement the predicate subsF irst(X, Y, T 1, T 2) that computes the output tree T 2 by replacing the very first occurrence of X (if any) in a tree T 1 with Y . You can assume that T 1 is a given input ternary tree and that the arguments X and Y are also given, but the argument T 2 is either a variable (representing a ternary tree that should be computed) or a given ternary tree. Since a node in a ternary tree has at most 3 children, we have to determine in which order we search them to find the first occurrence of X. Your program has to search first all nodes in Left to find the first occurrence of X, but if X is not in Left, then your program should try to locate X in the middle branch Mid, but X does not occur there, then it must try to locate X in Right. In other words, the occurrences of elements are ordered top-down, and within same level left-most occurrences are before occurrences in the middle branch, which are ordered before right-most occurrences. Use in your program a helping predicate memberTree(X,T) that is true if element X occurs in one of the nodes of the ternary tree T . Hint: this predicate can be implemented similarly to a binary tree example that we have considered in class. A sample ternary tree and examples of queries that succeed can be downloaded together with this assignment. Write your Prolog program in the file subsFirst.pl
Handing in solutions. An electronic copy of: (a) your programs (qs.pl and subsFirst.pl) that include all your Prolog rules; (b) your session with Prolog, showing the queries you submitted and the answers returned (the name of the file must be terms.txt) . It is up to you to formulate a range of queries that demonstrates that your program is working properly. Your queries should include not only the examples given above, but a few other tests as well (e.g., test all base cases). Request all answers (using either “;” or the button more).
4. Bonus work (up to 50 points):
To make up for a grade on another assignment or test that was not what you had hoped for, or simply because you find this area of Artificial Intelligence interesting, you may choose to do extra work on this assignment. Do not attempt any bonus work until the regular part of your assignment is complete. This part of the assignment is more challenging than questions in the regular part of your assignment. If your assignment is submitted from a group, write whether this bonus question was implemented by all people in your team (in this case bonus marks will be divided evenly between all students) or whether it was implemented by one person only (in this case only this student will get all bonus marks). Wrong or incomplete solutions may be graded as 0.
This problem tests your knowledge about writing recursive programs that work with Prolog terms (structures).
First order logic (FOL) is considered as one of the candidate languages for knowledge representation. This is because FOL has an expressive, well-known syntax and precise semantics. This part of the assignment is concerned with syntax of FOL only. In this assignment, we consider a language of FOL that consists of the following disjoint sets of distinct primitive symbols:
• FOLVariables:x,y,z,p,f,m,…withorwithoutsubscripts;thepredicatefol var(X)holdsifXisoneofthesymbols declared as a variable.
• FOL Constants: c,i,b,… with or without subscripts; the predicate fol const(X) holds if X is one of the symbols declared as a constant.
• FOL Relation symbols: human, owns, . . ., where each relation symbol has a positive number of arguments (called arity); the predicate f ol rel(P, N ) holds if P is one of the N -place relation symbols.
• FOL Function symbols: mother, plus, . . ., where each function symbol has a positive number of arguments (called arity); the predicate f ol f unc(F, N ) holds if F is one of the N -argument function symbols.
• FOLConnectives:¬(neg),∧(and),∨(or),→(implies),↔(iff,i.e.,ifandonlyif),eqv(equality);hereandsubsequently, we use the symbol eqv to avoid conflict with = in Prolog.
3

• FOL Quantifiers: ∀ (forall), ∃ (exists).
This syntax of FOL allows us to represent complex English assertions. For example, the English sentence “all humans are mortal” can be written in FOL as ∀x(human(x) → mortal(x)). In a similar vein, the well-known logical argument “All humans are mortal. I am a human. Consequently, I am mortal” can be written in FOL using constant i as follows:
􏶩∀x(human(x) → mortal(x)) ∧ human(i)􏶪 → mortal(i).
The English sentence “everyone has a mother” can be written in FOL as ∀p∃m(mother(p) eqv m) , and a sentence “everyone
has one and the only one mother” can be written in FOL as
∀p∃m􏶩(mother(p) eqv m) ∧ ∀x(¬(x eqv m) → ¬(x eqv mother(p)))).
One of the main strength of FOL comes with its ability to formulate precisely different readings of ambiguous English sentences. To represent the sentence ”Everyone who owns a donkey beats it”, we can use 2-place relations own(p, d) (a person p owns a donkey d) and 2-place relation beat(p, d) (a person p beats a donkey d). Then, one possible reading of this sentence is ∃d∀p(owns(p, d) → beats(p, d)): “there is donkey (a single poor creature) such that every peasant who owns this donkey beats it”. A different possible reading is ∀p∃d(owns(p, d) ∧ beats(p, d)): “every peasant has his donkey such that the peasant owns his donkey and beats it”. Moreover, FOL was instrumental to clarify the foundations of mathematics, a discipline where the very basic concept of set turned out to be ambiguous at the end of XIX century. This might be hinted with a , an overly simplified, but popular version of ’s paradox about sets. Russell states it as follows: “You can define the barber as one who shaves all those, and those only, who do not shave themselves. The question is, does the barber shave himself?” Using 1-place related barber and 2-place relation shaves, this puzzle can be written as ∃x(barber(x) ↔ ∀p(shaves(x, p) ↔ ¬shaves(p, p). It turns out that using the well-defined semantics of FOL, one can prove that negation of this formula holds no matter how we interpret the relations in the puzzle. As far as CPS721 is concerned, FOL might be a language of choice to represent a vast Web of beliefs in a knowledge base. For example, in the beginning of CPS721, we considered as an example a sentence ”Someone is a bachelor if and only if there has never been a wedding where that person is the groom”. Using 1-place relation bachelor, another 1-place relation wedding, and assuming that wedding is an event that has an associated participant who is represented using 1-place function groom, we can represent this sentence in FOL as ∀x􏶩bachelor(x) ↔ ¬∃y􏶩 wedding(y) ∧ (x eqv groom(y)) 􏶪 􏶪.
In this assignment, we are interested only in verifying simple properties of FOL formulas and FOL terms. Roughly speaking, simple FOL terms are the noun phrases of first-order languages: constants can be thought of as first-order counterparts of proper names (bob, mary), and variables as first-order counterparts of pronouns (his, its, my) or nouns. We can then combine our ‘noun phrases’ with our various ‘relation symbols’ to form what we call an atomic FOL formula. Intuitively, an atomic formula is the first-order counterpart of a natural language sentence consisting of a single clause (that is, a simple sentence). Subsequently, we represent both FOL formulas and FOL terms as structures in Prolog (i.e., as Prolog terms). Let’s proceed with precise definitions that you can use when you will be writing your program.
A well-formed FOL term is:
• either FOL constant, or
• FOL variable, or
• iff isN-placefunctionsymbol(N ≥1),andt1,…,tN arewell-formedterms,thenf(t1,…,tN)isalsoawell-formed term. (Note that in the last sentence we need exactly N terms to occupy N argument positions associated with f ).
Nothing else can be a well-formed term. For example, using 2-place function symbols sum and prod to represent, respectively, + and ·, and using FOL variable symbols x, y, z, we can compose terms sum(y, z), prod(x, sum(y, z)). Using these compound terms, we can write an atomic FOL formula ∀x∀y∀z(prod(x, sum(y, z)) eqv sum(prod(x, y), prod(x, z))). (Using a more familiar notation, this can be written as x · (y + z) = x · y + x · z.)
A well-formed FOL formulas are defined inductively similar to terms:
• Let r be N-place relation symbol (N ≥ 1), and t1,…,tN are terms, then r(t1,…,tN) is an (atomic) well-formed
formula. (Note that in the last sentence we need exactly N terms to occupy N argument positions associated with r).
• Let t1, t2 be well-formed FOL terms, then the equality between these terms (t1 eqv t2) is also a well-formed formula.
• Ifα,βarewell-formedformulas,thensoare(¬α),(α∨β),(α∧β),(α→β),(α↔β).
4

• If v is a FOL variable and α is a well-formed formula, then (∃v)(α) and (∀v)(α) are also well-formed formulas.
Nothing else can be a well-formed formula. In formulas (∃v)(α) and (∀v)(α), α is called the scope of the quantifier Notice that it might happen that α does not contain the variable v. An occurrence of a FOL variable v is said to be bound in a well-formed formula α if either it is the occurrence of v in a quantifier ‘(∀v)′ (in a quantifier ‘(∃v)′, respectively), or it lies within the scope of a quantifier ‘(∀v)′ inside α (of a quantifier ‘(∃v)′ inside α, respectively). Otherwise, a FOL variable that is an argument of one of the relation or one of the function symbols in α is said to be free in α. All formulas mentioned as examples above are well-formed FOL formulas, except that sometimes we omitted parentheses to improve readability.
In this part of the assignment, you have to write a few Prolog programs that will check whether a given language contains ambiguous symbols, whether FOL terms and FOL formulas are well formed, and finally, determine whether a given FOL formula has free variables or not.
(a). Design a simple KB using Prolog predicates fol const(C), fol var(X), fol func(F,N), fol rel(R,N). Include in your KB, all symbols that you need to represent your own testing formulas. For example, to represent some of the symbols in the examples above, we can write
fol_var(h). fol_var(x). fol_var(y). fol_var(z). fol_const(i). fol_rel(human,1). fol_rel(mortal,1). fol_rel(owns,2). fol_func(mother,1). fol_func(prod,2). fol_func(sum,2).
(b). The Prolog predicate ambiguous(X) is true if X is one of the symbols in the FOL that has two different declarations. This predicate is useful to check whether a language in KB is defined properly. For example, if a 2-place symbol is defined both as function and as relation, then we cannot read uniquely formulas with this symbol. However, if same symbol is used for different purposes with different number of arguments, then the number of arguments helps to disambiguate this symbol. Write a complete set of rules that define the predicate ambiguous(X).
(c). The Prolog predicate wf t(T ) is true if T is a FOL well-formed term. Similarly, the Prolog predicate wf f (F ) is true if F is a FOL well-formed formula. Write a complete set of Prolog rules to define these two predicates. Use the precise definitions given above. Note that both Prolog predicates take as arguments Prolog structures (terms), see examples in sub-part (d) below. In particular, the Prolog term exists(d, forall(p, owns(p,d))) represents FOL formula (∃d)((∀p)(owns(p, d))). To represent connectives, include the following declarations of the new operators on the top of your program:
:- op(250,yfx, ’eqv’).
:- op(300,fx,’neg’).
:- op(400,yfx,’and’).
:- op(500,yfx,’or’).
:- op(600,xfx,’implies’).
:- op(650,xfx,’iff’).
/* the highest priority operator */
/* the lowest priority operator */
The first argument in op above is designed to give different priorities to logical connectives according to the well-known conventions: negation neg is stronger than conjunction and, that is in turn stronger than disjunction or, and so on. Thanks to these priorities, the formula neg a and b implies c or d has the unique reading ((neg a) and b) implies (c or d). In your implementation, you can use the system predicate =.. that is being applied to LHS =.. [Name|Arguments] converts a Prolog structure on left hand side into a list. For example,
?- this(is,a,complex,structure(with,several,arguments)) =.. [Name | Arguments]. Name = this
Arguments = [is, a, complex, structure(with,several,arguments)]
This system predicate =.. is convenient to parse complex terms and atomic formulas into constituents. (Note that there is no space between = and .. in =..). In your implementation you can also use the system predicate compound(Expr) that is true if Expr is a compound Prolog structure (term). You are not allowed to use any other system predicates. In other words, your rules have to be written using only Prolog predicates from KB, predicates wf t(T ), wf f (F ), compound(Expr), =.., or any of the predicates that we discussed in class. Save your Prolog rules in the file logic.pl
(d). Test your program on at least 10 different queries of your own choice. Your queries should include formulas different from those mentioned above in this assignment. Remember to include in KB declarations for all symbols that occur in your formulas. For example, for the two formulas mentioned in the beginning, the queries are
?- wff( (forall(h, human(h) implies mortal(h)) and human(i)) implies mortal(i)).
?- wff(forall(x, forall(y, forall(z, prod(x, sum(y,z)) eqv sum(prod(x,y),prod(x,z)))))). Save your session with Prolog (queries submitted, and answers returned) in the file logic.txt
5

(e). The Prolog predicate closed(F) is true if F is a well-formed formula and does not exists a FOL variable in KB such that it has at least one free occurrence in F. Write the rule implementing closed(F) with the help of an auxiliary predicate f ree occurs(X, F ). The helping predicate f ree occurs(X, F ) is true if X is one of the FOL variables that has a free occurrence in F . You have to write a complete set of rules defining the predicate f ree occurs(X, F ). You cannot use any of the system predicates except of those mentioned above. Keep all these rules in the same file logic.pl Once you have completed your program, test it using same formulas or different formulas to show that you get answers “yes”, and “no” depending on whether a formula F is closed or not. Keep all results of your test in the file logic.txt
Handing in solutions: (a) An electronic copy of the file logic.pl with your Prolog program must be included in your zip archive; (b) Test your program using your own examples. It is up to you to formulate a range of queries that demonstrates that your program is working properly. Include your session with Prolog in the file logic.txt
How to submit this assignment.
Read regularly Frequently Answered Questions and replies to them that are linked from the Assignments Web page at http://www.scs.ryerson.ca/ ̃mes/courses/cps721/assignments.html
If you write your code on a Windows machine, make sure you save your files as plain text that one can easily read on Linux machines. Before you submit your Prolog code electronically make sure that your files do not contain any extra binary sym- bols: it should be possible to load recursion.pl or qs.pl or any other your solution into a recent release 6 of ECLiPSe Prolog, compile your program and ask testing queries. TA will mark your assignment using ECLiPSe Prolog. If you run any other version of Prolog on your home computer, it is your responsibility to make sure that your program will run on ECLiPSe Prolog (release 6 or any more recent release), as required. For example, you can run a command-line version of ECLiPSe on moon remotely from your home computer to test your program (read handout about running ECLiPSe Prolog). To submit files electronically do the following. First, create a zip archive:
zip yourLoginName.zip lists.txt recursion.pl recursion.txt qs.pl subsFirst.pl terms.txt [logic.pl]
where yourLoginName is the login name of the person who submits this assignment from a group. Remember to mention at the beginning of each file student, section numbers and names of all people who participated in discussions (see the course management form). You may be penalized for not doing so. Second, upload your ZIP file yourLoginName.zip
to D2L into “Assignment 2” folder. Make sure it includes all your files. Improperly submitted assignments will not be marked. In particular, you are not allowed to submit your assignment by email to a TA or to the instructor.
Revisions: If you would like to upload a revised copy of your assignment, then simply upload it again. (The same person must upload.) A new copy of your assignment will override the old copy. You can upload new versions as many times as you like and you do not need to inform anyone about this. Do not ask your team members to upload your assignment, because TA will be confused which version to mark: only one person from a group should submit different revisions of the assignment. The groups that submit more than one copy of their solutions will be penalized. The time stamp of the last file you upload will determine whether you have submitted your work on time.
6

Leave a Reply

Your email address will not be published. Required fields are marked *