SlideShare a Scribd company logo
1 of 18
Introduction to Prolog
Outline
• What is Prolog?
• Prolog basics
• Prolog Demo
• Syntax:
– Atoms and Variables
– Complex Terms
– Facts & Queries
– Rules
• Examples
What is Prolog?
• Prolog is the most commonly used logic
– Simple syntax
• PROgramming in LOGic
• High-level interactive language.
• Logic programming language.
What is Prolog? (Cont.)
• Programming languages are of two kinds:
– Procedural (BASIC, Pascal, C++, Java);
– Declarative (LISP, Prolog, ML).
• In procedural programming, we tell the computer how
to solve a problem.
• In declarative programming, we tell the computer what
problem we want solved.
• (However, in Prolog, we are often forced to give clues
as to the solution method).
The use of Prolog
• Prolog is used in artificial intelligence applications such as:
– Natural language interfaces,
– automated reasoning systems and
– Expert systems: usually consist of a data base of facts and
rules and an inference engine, the run time system of Prolog
provides much of the services of an inference engine.
What is Prolog used for?
• Good at
– Grammars and Language processing,
– Knowledge representation and reasoning,
– Unification,
– Pattern matching,
– Planning and Search.
• Poor at:
– Repetitive number crunching,
– Representing complex data structures,
– Input/Output (interfaces).
Basic Elements of Prolog
• A program consists of clauses. These are of 3 types: facts, rules,
and questions (Queries).
• Some are always true (facts):
father( ali, haya).
• Some are dependent on others being true (rules):
parent( Person1, Person2 ) :- father( Person1, Person2 ).
• To run a program, we ask questions about the database.
KB
Prolog
Interpreter
Query
Answer
Prolog in English• Example Database:
– Saleh is a teacher
– Nora is a teacher
– Saleh is the father of Jaber.
– Nora is the mother of Jaber.
– Hamza is the father of Saleh
– Person 1 is a parent of Person 2 if
Person 1 is the father of Person 2 or
Person 1 is the mother of Person 2.
– Person 1 is a grandparent of Person 2 if
some Person 3 is a parent of Person 2 and
Person 1 is a parent of Person 3.
• Example questions:
– Who is Jaber's father?
– Is Nora the mother of Jaber?
– Does Hamza have a grandchild?
Facts
Rules
A knowledge base of facts
• teacher(saleh).
• teacher(nora).
• father( saleh, jaber).
• mother( nora, jaber ).
• father( hamza, saleh ).
Queries we can ask
?- teacher(saleh). Yes
?- teacher(nora). Yes
?- mother( nora, jaber ). Yes
?- mother( nora, saleh ). No
?- grandparent( hamza, X). Jaber
?- nurse(nora).
ERROR: Undefined procedure: nurse/1
More queries we can ask
• ?-teacher(X).
– X=saleh ;
– X=nora ;
– No.
• ?-mother(X,Y).
– X = nora
– Y = jaber ;
– No
Syntax: Atoms and Variables
• Atoms:
– All terms that consist of letters, numbers, and the underscore
and start with a non-capital letter are atoms: uncle_ali, nora,
year2007, . . . .
– All terms that are enclosed in single quotes are atoms:
’Aunt Hiba’, ’(@ *+ ’, . . . .
– Certain special symbols are also atoms: +, ,, . . . .
• Variables:
– All terms that consist of letters, numbers, and the underscore
and start with a capital letter or an underscore are variables:
X, Jaber, Lama, . . . .
– _is an anonymous variable: two occurrences of _are different
variables.
– E.g. if we are interested in people who have children, but not
in the name of the children, then we can simply ask: ?-
parent(X,_).
Syntax: Complex Terms
• Complex terms
– Complex terms are of the form:
functor (argument, ..., argument).
– Functors have to be atoms.
– Arguments can be any kind of Prolog term, e.g., complex
terms.
• likes(lama,apples), likes(amy,X).
Syntax: Facts & Queries
• Facts are complex terms which begin with lower case alphabetic
letter and ends with a full stop.
– teacher(nora).
– female( aunt hiba).
– likes(alia,choclate).
• Queries are also complex terms followed by a full stop.
– ?- teacher(nora).
Query
Prompt provided by the Prolog interpreter.
Syntax: Rules
• A Prolog rule consists of a head and a body.
a(X) :- b(X), c(X)
• Rules are of the form Head :- Body.
• Like facts and queries, they have to be followed by a full stop.
• Head is a complex term.
• Body is complex term or a sequence of complex terms separated by
commas.
happy(uncle_ yussef) :- happy(nora).
grandparent( Person1, Person2 ) :- parent( Person3, Person2 ) ,
parent( Person1, Person3 ).
head body
A knowledge base of facts & Rules
• happy(uncle_ yussef) :- happy(nora).
if ... then ...: If happy(nora) is true, then happy(uncle_ yussef) is true.
• parent( Person1, Person2 ) :- father( Person1, Person2 ).
• parent( Person1, Person2 ) :- mother( Person1, Person2 ).
Person 1 is a parent of Person 2 if Person 1 is the father of Person 2
or Person 1 is the mother of Person 2.
• grandparent( Person1, Person2 ) :- parent( Person3, Person2 )
, parent( Person1, Person3 ).
Person 1 is a grandparent of Person 2 if some Person 3 is a parent of Person 2
and Person 1 is a parent of Person 3.
Querying slide 15
• ?- happy(nora). Yes
• ?-happy(uncle_yussef). yes
• ?- happy(X).
– X = uncle_yussef ;
– X = nora ;
– No
• Does Hamza have a grandchild?
• ?- grandparent(hamza,_).
– Yes
Facts & Rules containing variables
• teacher(saleh).
• teacher(nora).
• father( saleh, jaber).
• mother( nora, jaber ).
• This knowledge base defines 3 predicates:
– teacher/1.
– father/2, and
– mother/2.
• teacher(X) :- father(Y,X), teacher(Y),mother(Z,X), teacher(Z).
• For all X, Y, Z, if father(Y,X)is true and teacher (Y) is true and
mother(Z,X) is true and teacher (Z) is true, then teacher (X) is true.
• I.e., for all X, if X’s father and mother are teachers,
then X is a teacher.
Summary
• A Prolog program consists of a database of facts and rules, and
queries (questions).
– Fact: ... .
– Rule: ... :- ... .
– Query: ?- ... .
– Variables: must begin with an upper case letter or underscore.
• Nora, _nora.
– Constants (atoms): begin with lowercase letter, or enclosed in
single quotes.
• uncle_ali, nora, year2007, .
• numbers 3, 6, 2957, 8.34, ...
– complex terms An atom (the functor) is followed by a comma
separated sequence of Prolog terms enclosed in parenthesis (the
arguments).
• likes(lama,apples), likes(amy,X).

More Related Content

Viewers also liked

Memory caching
Memory cachingMemory caching
Memory cachingFraboni Ec
 
Text classification
Text classificationText classification
Text classificationFraboni Ec
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practiceFraboni Ec
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoFraboni Ec
 
Overview prolog
Overview prologOverview prolog
Overview prologFraboni Ec
 
Data miningmaximumlikelihood
Data miningmaximumlikelihoodData miningmaximumlikelihood
Data miningmaximumlikelihoodFraboni Ec
 
Access data connection
Access data connectionAccess data connection
Access data connectionFraboni Ec
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in cryptoFraboni Ec
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsFraboni Ec
 
List in webpage
List in webpageList in webpage
List in webpageFraboni Ec
 
Database concepts
Database conceptsDatabase concepts
Database conceptsFraboni Ec
 

Viewers also liked (20)

Memory caching
Memory cachingMemory caching
Memory caching
 
Text classification
Text classificationText classification
Text classification
 
Crypto theory practice
Crypto theory practiceCrypto theory practice
Crypto theory practice
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Big data
Big dataBig data
Big data
 
Gm theory
Gm theoryGm theory
Gm theory
 
Exception
ExceptionException
Exception
 
Overview prolog
Overview prologOverview prolog
Overview prolog
 
Stack queue
Stack queueStack queue
Stack queue
 
Naïve bayes
Naïve bayesNaïve bayes
Naïve bayes
 
Game theory
Game theoryGame theory
Game theory
 
Data miningmaximumlikelihood
Data miningmaximumlikelihoodData miningmaximumlikelihood
Data miningmaximumlikelihood
 
Access data connection
Access data connectionAccess data connection
Access data connection
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in crypto
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
List in webpage
List in webpageList in webpage
List in webpage
 
Decision tree
Decision treeDecision tree
Decision tree
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Maven
MavenMaven
Maven
 
Exception
ExceptionException
Exception
 

Similar to Introduction toprolog

Chaps 1-3-ai-prolog
Chaps 1-3-ai-prologChaps 1-3-ai-prolog
Chaps 1-3-ai-prologsaru40
 
10 logic+programming+with+prolog
10 logic+programming+with+prolog10 logic+programming+with+prolog
10 logic+programming+with+prologbaran19901990
 
Iccs presentation 2k17 : Predicting dark triad personality traits using twit...
Iccs presentation  2k17 : Predicting dark triad personality traits using twit...Iccs presentation  2k17 : Predicting dark triad personality traits using twit...
Iccs presentation 2k17 : Predicting dark triad personality traits using twit...Ravi Agrawal
 
An introduction to Prolog language slide
An introduction to Prolog language slideAn introduction to Prolog language slide
An introduction to Prolog language slide2021uam4641
 
Artificial Intelligence Notes Unit 4
Artificial Intelligence Notes Unit 4Artificial Intelligence Notes Unit 4
Artificial Intelligence Notes Unit 4DigiGurukul
 
ProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) IntroductionProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) Introductionwahab khan
 
Prolog fundamentals for beeginers in windows.ppt
Prolog  fundamentals for beeginers in windows.pptProlog  fundamentals for beeginers in windows.ppt
Prolog fundamentals for beeginers in windows.pptDrBhagirathPrajapati
 
predicateLogic.ppt
predicateLogic.pptpredicateLogic.ppt
predicateLogic.pptMUZAMILALI48
 
Predlogic
PredlogicPredlogic
Predlogicsaru40
 
Fuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionFuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionNagasuri Bala Venkateswarlu
 
Learning rule of first order rules
Learning rule of first order rulesLearning rule of first order rules
Learning rule of first order rulesswapnac12
 
Language Model (N-Gram).pptx
Language Model (N-Gram).pptxLanguage Model (N-Gram).pptx
Language Model (N-Gram).pptxHeneWijaya
 
lect4-morphology.pptx
lect4-morphology.pptxlect4-morphology.pptx
lect4-morphology.pptxSahilAli23165
 
lect4-morphology.ppt
lect4-morphology.pptlect4-morphology.ppt
lect4-morphology.pptKrismalita
 

Similar to Introduction toprolog (20)

Chaps 1-3-ai-prolog
Chaps 1-3-ai-prologChaps 1-3-ai-prolog
Chaps 1-3-ai-prolog
 
10 logic+programming+with+prolog
10 logic+programming+with+prolog10 logic+programming+with+prolog
10 logic+programming+with+prolog
 
Prolog final
Prolog finalProlog final
Prolog final
 
Plc part 4
Plc  part 4Plc  part 4
Plc part 4
 
Iccs presentation 2k17 : Predicting dark triad personality traits using twit...
Iccs presentation  2k17 : Predicting dark triad personality traits using twit...Iccs presentation  2k17 : Predicting dark triad personality traits using twit...
Iccs presentation 2k17 : Predicting dark triad personality traits using twit...
 
Ics1019 ics5003
Ics1019 ics5003Ics1019 ics5003
Ics1019 ics5003
 
An introduction to Prolog language slide
An introduction to Prolog language slideAn introduction to Prolog language slide
An introduction to Prolog language slide
 
Artificial Intelligence Notes Unit 4
Artificial Intelligence Notes Unit 4Artificial Intelligence Notes Unit 4
Artificial Intelligence Notes Unit 4
 
ProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) IntroductionProLog (Artificial Intelligence) Introduction
ProLog (Artificial Intelligence) Introduction
 
Prolog fundamentals for beeginers in windows.ppt
Prolog  fundamentals for beeginers in windows.pptProlog  fundamentals for beeginers in windows.ppt
Prolog fundamentals for beeginers in windows.ppt
 
Syntax.ppt
Syntax.pptSyntax.ppt
Syntax.ppt
 
predicateLogic.ppt
predicateLogic.pptpredicateLogic.ppt
predicateLogic.ppt
 
Predlogic
PredlogicPredlogic
Predlogic
 
Artificial intelligence course work
Artificial intelligence  course workArtificial intelligence  course work
Artificial intelligence course work
 
Fuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionFuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introduction
 
Learning rule of first order rules
Learning rule of first order rulesLearning rule of first order rules
Learning rule of first order rules
 
Language Model (N-Gram).pptx
Language Model (N-Gram).pptxLanguage Model (N-Gram).pptx
Language Model (N-Gram).pptx
 
lect4-morphology.ppt
lect4-morphology.pptlect4-morphology.ppt
lect4-morphology.ppt
 
lect4-morphology.pptx
lect4-morphology.pptxlect4-morphology.pptx
lect4-morphology.pptx
 
lect4-morphology.ppt
lect4-morphology.pptlect4-morphology.ppt
lect4-morphology.ppt
 

More from Fraboni Ec

Hardware multithreading
Hardware multithreadingHardware multithreading
Hardware multithreadingFraboni Ec
 
What is simultaneous multithreading
What is simultaneous multithreadingWhat is simultaneous multithreading
What is simultaneous multithreadingFraboni Ec
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherenceFraboni Ec
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data miningFraboni Ec
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data miningFraboni Ec
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discoveryFraboni Ec
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching worksFraboni Ec
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cacheFraboni Ec
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithmsFraboni Ec
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and pythonFraboni Ec
 
Abstract data types
Abstract data typesAbstract data types
Abstract data typesFraboni Ec
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsFraboni Ec
 
Abstraction file
Abstraction fileAbstraction file
Abstraction fileFraboni Ec
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysisFraboni Ec
 
Abstract class
Abstract classAbstract class
Abstract classFraboni Ec
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with javaFraboni Ec
 

More from Fraboni Ec (20)

Hardware multithreading
Hardware multithreadingHardware multithreading
Hardware multithreading
 
Lisp
LispLisp
Lisp
 
What is simultaneous multithreading
What is simultaneous multithreadingWhat is simultaneous multithreading
What is simultaneous multithreading
 
Directory based cache coherence
Directory based cache coherenceDirectory based cache coherence
Directory based cache coherence
 
Business analytics and data mining
Business analytics and data miningBusiness analytics and data mining
Business analytics and data mining
 
Big picture of data mining
Big picture of data miningBig picture of data mining
Big picture of data mining
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
Cache recap
Cache recapCache recap
Cache recap
 
How analysis services caching works
How analysis services caching worksHow analysis services caching works
How analysis services caching works
 
Hardware managed cache
Hardware managed cacheHardware managed cache
Hardware managed cache
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
Cobol, lisp, and python
Cobol, lisp, and pythonCobol, lisp, and python
Cobol, lisp, and python
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 
Optimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessorsOptimizing shared caches in chip multiprocessors
Optimizing shared caches in chip multiprocessors
 
Abstraction file
Abstraction fileAbstraction file
Abstraction file
 
Object model
Object modelObject model
Object model
 
Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Abstract class
Abstract classAbstract class
Abstract class
 
Concurrency with java
Concurrency with javaConcurrency with java
Concurrency with java
 
Inheritance
InheritanceInheritance
Inheritance
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 

Recently uploaded (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

Introduction toprolog

  • 2. Outline • What is Prolog? • Prolog basics • Prolog Demo • Syntax: – Atoms and Variables – Complex Terms – Facts & Queries – Rules • Examples
  • 3. What is Prolog? • Prolog is the most commonly used logic – Simple syntax • PROgramming in LOGic • High-level interactive language. • Logic programming language.
  • 4. What is Prolog? (Cont.) • Programming languages are of two kinds: – Procedural (BASIC, Pascal, C++, Java); – Declarative (LISP, Prolog, ML). • In procedural programming, we tell the computer how to solve a problem. • In declarative programming, we tell the computer what problem we want solved. • (However, in Prolog, we are often forced to give clues as to the solution method).
  • 5. The use of Prolog • Prolog is used in artificial intelligence applications such as: – Natural language interfaces, – automated reasoning systems and – Expert systems: usually consist of a data base of facts and rules and an inference engine, the run time system of Prolog provides much of the services of an inference engine.
  • 6. What is Prolog used for? • Good at – Grammars and Language processing, – Knowledge representation and reasoning, – Unification, – Pattern matching, – Planning and Search. • Poor at: – Repetitive number crunching, – Representing complex data structures, – Input/Output (interfaces).
  • 7. Basic Elements of Prolog • A program consists of clauses. These are of 3 types: facts, rules, and questions (Queries). • Some are always true (facts): father( ali, haya). • Some are dependent on others being true (rules): parent( Person1, Person2 ) :- father( Person1, Person2 ). • To run a program, we ask questions about the database. KB Prolog Interpreter Query Answer
  • 8. Prolog in English• Example Database: – Saleh is a teacher – Nora is a teacher – Saleh is the father of Jaber. – Nora is the mother of Jaber. – Hamza is the father of Saleh – Person 1 is a parent of Person 2 if Person 1 is the father of Person 2 or Person 1 is the mother of Person 2. – Person 1 is a grandparent of Person 2 if some Person 3 is a parent of Person 2 and Person 1 is a parent of Person 3. • Example questions: – Who is Jaber's father? – Is Nora the mother of Jaber? – Does Hamza have a grandchild? Facts Rules
  • 9. A knowledge base of facts • teacher(saleh). • teacher(nora). • father( saleh, jaber). • mother( nora, jaber ). • father( hamza, saleh ). Queries we can ask ?- teacher(saleh). Yes ?- teacher(nora). Yes ?- mother( nora, jaber ). Yes ?- mother( nora, saleh ). No ?- grandparent( hamza, X). Jaber ?- nurse(nora). ERROR: Undefined procedure: nurse/1
  • 10. More queries we can ask • ?-teacher(X). – X=saleh ; – X=nora ; – No. • ?-mother(X,Y). – X = nora – Y = jaber ; – No
  • 11. Syntax: Atoms and Variables • Atoms: – All terms that consist of letters, numbers, and the underscore and start with a non-capital letter are atoms: uncle_ali, nora, year2007, . . . . – All terms that are enclosed in single quotes are atoms: ’Aunt Hiba’, ’(@ *+ ’, . . . . – Certain special symbols are also atoms: +, ,, . . . . • Variables: – All terms that consist of letters, numbers, and the underscore and start with a capital letter or an underscore are variables: X, Jaber, Lama, . . . . – _is an anonymous variable: two occurrences of _are different variables. – E.g. if we are interested in people who have children, but not in the name of the children, then we can simply ask: ?- parent(X,_).
  • 12. Syntax: Complex Terms • Complex terms – Complex terms are of the form: functor (argument, ..., argument). – Functors have to be atoms. – Arguments can be any kind of Prolog term, e.g., complex terms. • likes(lama,apples), likes(amy,X).
  • 13. Syntax: Facts & Queries • Facts are complex terms which begin with lower case alphabetic letter and ends with a full stop. – teacher(nora). – female( aunt hiba). – likes(alia,choclate). • Queries are also complex terms followed by a full stop. – ?- teacher(nora). Query Prompt provided by the Prolog interpreter.
  • 14. Syntax: Rules • A Prolog rule consists of a head and a body. a(X) :- b(X), c(X) • Rules are of the form Head :- Body. • Like facts and queries, they have to be followed by a full stop. • Head is a complex term. • Body is complex term or a sequence of complex terms separated by commas. happy(uncle_ yussef) :- happy(nora). grandparent( Person1, Person2 ) :- parent( Person3, Person2 ) , parent( Person1, Person3 ). head body
  • 15. A knowledge base of facts & Rules • happy(uncle_ yussef) :- happy(nora). if ... then ...: If happy(nora) is true, then happy(uncle_ yussef) is true. • parent( Person1, Person2 ) :- father( Person1, Person2 ). • parent( Person1, Person2 ) :- mother( Person1, Person2 ). Person 1 is a parent of Person 2 if Person 1 is the father of Person 2 or Person 1 is the mother of Person 2. • grandparent( Person1, Person2 ) :- parent( Person3, Person2 ) , parent( Person1, Person3 ). Person 1 is a grandparent of Person 2 if some Person 3 is a parent of Person 2 and Person 1 is a parent of Person 3.
  • 16. Querying slide 15 • ?- happy(nora). Yes • ?-happy(uncle_yussef). yes • ?- happy(X). – X = uncle_yussef ; – X = nora ; – No • Does Hamza have a grandchild? • ?- grandparent(hamza,_). – Yes
  • 17. Facts & Rules containing variables • teacher(saleh). • teacher(nora). • father( saleh, jaber). • mother( nora, jaber ). • This knowledge base defines 3 predicates: – teacher/1. – father/2, and – mother/2. • teacher(X) :- father(Y,X), teacher(Y),mother(Z,X), teacher(Z). • For all X, Y, Z, if father(Y,X)is true and teacher (Y) is true and mother(Z,X) is true and teacher (Z) is true, then teacher (X) is true. • I.e., for all X, if X’s father and mother are teachers, then X is a teacher.
  • 18. Summary • A Prolog program consists of a database of facts and rules, and queries (questions). – Fact: ... . – Rule: ... :- ... . – Query: ?- ... . – Variables: must begin with an upper case letter or underscore. • Nora, _nora. – Constants (atoms): begin with lowercase letter, or enclosed in single quotes. • uncle_ali, nora, year2007, . • numbers 3, 6, 2957, 8.34, ... – complex terms An atom (the functor) is followed by a comma separated sequence of Prolog terms enclosed in parenthesis (the arguments). • likes(lama,apples), likes(amy,X).