A Transfer Function Model for Ternary Switching Logic Circuits

Total Page:16

File Type:pdf, Size:1020Kb

A Transfer Function Model for Ternary Switching Logic Circuits A Transfer Function Model for Ternary Switching Logic Circuits Mitchell A. Thornton Southern Methodist University Dallas, Texas USA 75275–0122 Email: [email protected] Abstract an interconnection of symbols or gates whose function- ality is modeled by the operators within the algebraic Ternary switching functions are formulated as trans- structure. A common set of ternary logic network formations over vector spaces resulting in a character- elements are the MIN, MAX, and Literal Selection ization in the form of a transfer function. Ternary logic gates whose corresponding functionalities provide for constants are modeled as vectors, thus the transfer the specification of a functionally complete algebra functions are of the form of matrices that map vectors with constants. For conciseness we refer to the Literal representing logic network input values to correspond- Selection gate as a Ji gate where i denotes the polarity ing output vectors. Techniques for determination of the of the selected literal, i 2 f0; 1; 2g as defined in [2]. transfer matrix from a logic switching model or directly Here we use three-dimensional vectors to represent from a netlist are provided. The use of transfer matrices ternary logic values instead of the integers f0; 1; 2g for logic network simulation are then developed that and we model a ternary logic function or a ternary allow for multiple output responses to be obtained logic network by a characterizing transfer matrix. The through a single vector-matrix product calculation. transfer matrix transforms the logic network input vectors to corresponding output vectors. This linear algebraic model of a ternary logic network or function 1. Introduction is an alternative to the more commonly employed switching model. While we do not propose that the Design and analysis tasks require some means to rich set of results based on switching functions be specify logic network functionality that is compact and abandoned in favor of the linear algebraic model, useful for purposes such as simulation, implication, we do propose that this alternative model may be synthesis, and others. We introduce a linear algebraic advantageous for certain ternary logic synthesis and model analogous to the transfer function model used analysis tasks such as those described in [3], [4]. As in other areas of engineering. The transfer function an example, we examine the use of the linear algebra captures the behavior of the network and can also be approach when used for ternary logic simulation. We used to determine the network output response for a utilize a netlist as input where the term “netlist” is used given set of input stimuli [1]. The transfer function in the commonly accepted definition of representing model is formulated as a mapping of elements over a structural interconnections of logic gates. Modern vector spaces representing the function domain and EDA tools parse netlists into intermediate graphical range sets. Transfer functions are in the form of a representations representing a structural logic circuit matrix or linear transformation, thus, we use the terms and the term netlist does not refer to any specific “transfer function” and “transfer matrix” interchange- format. ably. The remainder of the paper is organized as follows. Ternary switching functions are traditionally mod- In Section 2, background and notation is introduced eled with an algebraic structure consisting of a discrete to support the derivations of the transfer matrices for set of logic constants f0; 1; 2g and an appropriate set of a logic network. Section 3 contains the definitions operators. Logic networks represent implementations and derivations of matrices that characterize a network using electronic or some other technology with a and also includes descriptions of how the matrices corresponding input/output characteristic modeled by can be obtained from a high-level switching function ternary switching functions. A ternary logic network is specification or through direct traversal of a logic Table 1. Ternary Logic Constants Integral Bra-Vector Row-Vector 0 h0j 1 0 0 1 h1j 0 1 0 2 h2j 0 0 1 network representation such as a netlist. Section 3 also contains examples that demonstrate of how the Figure 1. Hasse Diagrams of Ternary Vector Con- matrices are used for computation of system responses. stants Concluding remarks are provided in Section 4. h0j h1j 2. Background and Notation In addition to the vector constants , , and h2j, five other constants are defined and used, denoted as htj, ht01j, ht02j, ht12j, and h?j. htj represents the 2.1. Dirac Notation simultaneous presence of h0j, h1j, and h2j and is given by htj = h0j + h1j + h2j where the + operator denotes “Bra-ket” notation was originally devised as a con- vector space addition. Likewise, the constants ht j, cise representation of vectors and associated operations 12 ht j, and ht j represent the simultaneous presence of to aid in quantum mechanical system calculations [5]. 02 01 two logic values ht j = h0j+h1j, ht j = h0j+h2j, and Due to the conciseness of this notation, we employ 01 02 ht j = h1j+h2j. In contrast, h j represents the absence its use in this paper. Column vectors are referred to 12 ? of all logic values and is given as h j = 0 0 0 . as “kets” and the notation for column vector x is jxi. ? h j should not be confused with the logic-0 value, Likewise, a row vector y is referred to as “bra-y” and ? h0j = 1 0 0 . The collection of vector constants is written as hyj. The inner (or “dot”) product of two can be expressed as a Hasse diagram as shown in vectors x and y is written as hxjyi and the outer (or Figure 1 [2]. Two versions of the Hasse diagram are de- “Kronecker”) product as jxihyj. picted using bra- and the row-vector notation. The five additional constants can arise during calculations using 2.2. Ternary Logic Constants transfer function representations of logic networks. Ternary logic switching models commonly use an integral encoding f0; 1; 2g to represent logic values. 2.3. Network Elements In the model presented here, we represent ternary logic values as three-dimensional vectors, where each Any of a variety of two- and one-place operators logic value j is represented by a row vector whose can be defined and represented by logic gates within jth component is unity-valued and all other remaining a ternary logic network. For the algebraic construction components are zero-valued. Table 1 shows the corre- to enable representation of all possible functions, some spondence of the integral and vector logic values. The primitive set of operators is required such that all other choice of using row vectors as models for ternary logic possible operators can be expressed as a function of the values is arbitrary and column-vectors could have been primitives and constants [2]. In this work, we utilize chosen. As will become apparent in a later section, the the ternary MIN, MAX, and Ji operators as logic choice of row-vectors for ternary constants results in primitives. the logic network transfer function being expressed as a matrix that closely resembles the switching model 3. Transfer Functions truth table. We use the notation H to represent a Hilbert vector The transfer function is an expression that yields the space whose elements are three-dimensional row vec- output response of the corresponding network when tors. The 3n-dimensional Hilbert space is denoted as multiplied by an input stimulus. A particular input Hn and may be constructed through use of the outer stimulus is represented by a row vector of dimension product operation, denoted by the ⊗ operator, as shown 3n where n is the number of parallel network inputs. in Equation 1 where n is any natural number, n 2 N. Individual network input values are used to compute n the overall stimulus vector through the relationship in n O Equation 1. Lemma 3.1 describes a characteristic that H = H ⊗ H ⊗ ::: ⊗ H = H (1) i=1 is useful in the derivation of the transfer function. Lemma 3.1: Linear Independence: Consider a one or more logic network input vectors through a ternary logic network with n inputs. Two distinct single vector-matrix multiplication operation. Modern n network input assignments (hxij; hxjj) 2 H are Electronic Design Automation (EDA) tools generally linearly independent vectors when i 6= j. implement this operation through the use of discrete Proof: hxij and hxjj are represented as event simulation algorithms in conjunction with a hdndn−1 : : : d0j, where each di 2 f0; 1g represents description of the logic network. For the transfer a particular network input logic value. Using the matrix approach to be a practical alternative to EDA relation in Equation 1, the input vectors are expanded approaches, the transfer matrix T must be obtained in as hdnj ⊗ hdn−1j ⊗ ::: ⊗ hd0j. Expressed as a row an efficient manner. vector, hxj = 0 0 ::: 1 ::: 0 where The transfer matrix T can be derived in several the single unity-valued vector component exists in ways. We focus on two approaches here; derivation a different location for hxij and hxjj since i 6= j. of T when the switching function behavior is given, Therefore hxijxji = 0 and the norm of xi and xj and alternatively, when a low-level characterization of is L2(xi) = L2(xj) = 1, satisfying the definition the network is provided in the form of a logic network of linear independence. When i = j, hxijxji = 1 or netlist. and this only occurs when hxij = hxjj. Expressed mathematically, ( 3.1.1. Transfer Functions from Switching Models. 0; i 6= j For switching function specifications, common repre- xi · xj = hxijxji = (2) 1; i = j sentations include cube lists [6] or graphical represen- tations such as the Binary Decision Diagrams (BDD) [7] or their generalization as Multiple-valued Decision Lemma 3.2: Input-Output Response: The output re- Diagrams (MDD) [8].
Recommended publications
  • Handbook Vatican 2014
    HANDBOOK OF THE WORLD CONGRESS ON THE SQUARE OF OPPOSITION IV Pontifical Lateran University, Vatican May 5-9, 2014 Edited by Jean-Yves Béziau and Katarzyna Gan-Krzywoszyńska www.square-of-opposition.org 1 2 Contents 1. Fourth World Congress on the Square of Opposition ..................................................... 7 1.1. The Square : a Central Object for Thought ..................................................................................7 1.2. Aim of the Congress.....................................................................................................................8 1.3. Scientific Committee ...................................................................................................................9 1.4. Organizing Committee .............................................................................................................. 10 2. Plenary Lectures ................................................................................................... 11 Gianfranco Basti "Scientia una contrariorum": Paraconsistency, Induction, and Formal Ontology ..... 11 Jean-Yves Béziau Square of Opposition: Past, Present and Future ....................................................... 12 Manuel Correia Machuca The Didactic and Theoretical Expositions of the Square of Opposition in Aristotelian logic ....................................................................................................................... 13 Rusty Jones Bivalence and Contradictory Pairs in Aristotle’s De Interpretatione ................................
    [Show full text]
  • Proceedings of the 30 Nordic Workshop on Programming Theory
    Proceedings of the 30th Nordic Workshop on Programming Theory Daniel S. Fava Einar B. Johnsen Olaf Owe Editors Report Nr. 485 ISBN 978-82-7368-450-9 Department of Informatics Faculty of Mathematics and Natural Sciences UNIVERSITY OF OSLO October 24, 2018 NWPT'18 Preface Preface This volume contains the extended abstracts of the talks presented at the 30th Nordic Workshop on Programming Theory held on October 24-26, 2018 in Oslo, Norway. The objective of Nordic Workshop on Programming Theory is to bring together researchers from the Nordic and Baltic countries interested in programming theory, in order to improve mutual contacts and co-operation. However, the workshop also attracts researchers outside this geographical area. In particular, it is targeted at early- stage researchers as a friendly meeting where one can present work in progress. Typical topics of the workshop include: • semantics of programming languages, • programming language design and programming methodology, • programming logics, • formal specification of programs, • program verification, • program construction, • tools for program verification and construction, • program transformation and refinement, • real-time and hybrid systems, • models of concurrency and distributed computing, • language-based security. This volume contains 29 extended abstracts of the presentations at the workshop including the abstracts of the three distinguished invited speakers. Prof. Andrei Sabelfeld, Chalmers University, Sweden Prof. Erika Abrah´am,RWTH´ Aachen University, Germany Prof. Peter Olveczky,¨ University of Oslo, Norway After the workshop selected papers will be invited, based on the quality and topic of their presentation at the workshop, for submission to a special issue of The Journal of Logic and Algebraic Methods in Programming.
    [Show full text]
  • Web Corrections-Vector Logic and Counterfactuals-Rev 2
    This article was published in: "Logic Journal of IGPL" Online version: doi:10.1093/jigpal/jzaa026, 2020 Vector logic allows counterfactual virtualization by The Square Root of NOT Eduardo Mizraji Group of Cognitive Systems Modeling, Biophysics and Systems Biology Section, Facultad de Ciencias, Universidad de la República Montevideo, Uruguay Abstract In this work we investigate the representation of counterfactual conditionals using the vector logic, a matrix-vectors formalism for logical functions and truth values. Inside this formalism, the counterfactuals can be transformed in complex matrices preprocessing an implication matrix with one of the square roots of NOT, a complex matrix. This mathematical approach puts in evidence the virtual character of the counterfactuals. This happens because this representation produces a valuation of a counterfactual that is the superposition of the two opposite truth values weighted, respectively, by two complex conjugated coefficients. This result shows that this procedure gives an uncertain evaluation projected on the complex domain. After this basic representation, the judgment of the plausibility of a given counterfactual allows us to shift the decision towards an acceptance or a refusal. This shift is the result of applying for a second time one of the two square roots of NOT. Keywords : Vector logic; Conditionals; Counterfactuals; Square Roots of NOT. Address: Dr. Eduardo Mizraji Sección Biofísica y Biología de Sistemas, Facultad de Ciencias, UdelaR Iguá 4225, Montevideo 11400, Uruguay e-mails: 1) [email protected], 2) [email protected] Phone-Fax: +598 25258629 1 1. Introduction The comprehension and further formalization of the conditionals have a long and complex history, full of controversies, famously described in an article of Lukasiewicz [20].
    [Show full text]
  • Metaphsyics of Knowledge.Pdf
    The Metaphysics of Knowledge This page intentionally left blank The Metaphysics of Knowledge Keith Hossack 1 1 Great Clarendon Street, Oxford ox2 6dp Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries Published in the United States by Oxford University Press Inc., New York Keith Hossack 2007 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2007 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above You must not circulate this book in any other binding or cover and you must impose the same condition on any acquirer British Library Cataloguing in Publication Data Data available Library of Congress Cataloging in Publication Data Hossack, Keith.
    [Show full text]
  • Eigenlogic in the Spirit of George Boole
    Eigenlogic in the spirit of George Boole Zeno TOFFANO July 1, 2019 CentraleSupelec - Laboratoire des Signaux et Systèmes (L2S-UMR8506) - CNRS - Université Paris-Saclay 3 rue Joliot-Curie, F-91190 Gif-sur-Yvette, FRANCE zeno.toff[email protected] Abstract This work presents an operational and geometric approach to logic. It starts from the multilinear elective decomposition of binary logical functions in the original form introduced by George Boole. A justification on historical grounds is presented bridging Boole’s theory and the use of his arithmetical logical functions with the axioms of Boolean algebra using sets and quantum logic. It is shown that this algebraic polynomial formulation can be naturally extended to operators in finite vector spaces. Logical operators will appear as commuting projection operators and the truth values, which take the binary values {0, 1}, are the respective eigenvalues. In this view the solution of a logical proposition resulting from the operation on a combination of arguments will appear as a selection where the outcome can only be one of the eigenvalues. In this way propositional logic can be formalized in linear algebra by using elective developments which correspond here to combinations of tensored elementary projection operators. The original and principal motivation of this work is for applications in the new field of quantum information, differences are outlined with more traditional quantum logic approaches. 1 Introduction The year 2015 celebrated discretely the 200th anniversary of the birth of George Boole (1815-1864). His visionary approach to logic has led to the formalization in simple mathematical language what was prior to him a language and philosophy oriented discipline.
    [Show full text]
  • Complexity of Fixed-Size Bit-Vector Logics
    Noname manuscript No. (will be inserted by the editor) Complexity of Fixed-Size Bit-Vector Logics Gergely Kov´asznai ¨ Andreas Fr¨ohlich ¨ Armin Biere Received: date / Accepted: date Abstract Bit-precise reasoning is important for many practical applications of Satisfiability Modulo Theories (SMT). In recent years, efficient approaches for solving fixed-size bit-vector formulas have been developed. From the theo- retical point of view, only few results on the complexity of fixed-size bit-vector logics have been published. Some of these results only hold if unary encoding on the bit-width of bit-vectors is used. In our previous work [41], we have already shown that binary encoding adds more expressiveness to various fixed-size bit-vector logics with and without quantification. In a follow-up work [30], we then gave additional complexity results for several fragments of the quantifier-free case. In this paper, we revisit our complexity results from [30,41] and go into more detail when specifying the underlying logics and presenting the proofs. We give a better insight in where the additional expressiveness of binary en- coding comes from. In order to do this, we bring together our previous work and propose several new complexity results for new fragments and extensions of earlier bit-vector logics. We also discuss the expressiveness of various bit- vector operations in more detail. Altogether, we provide the currently most complete overview on the complexity of common bit-vector logics. This work is partially supported by FWF, NFN Grant S11408-N23
    [Show full text]
  • Efficient SMT Solving for Bit-Vectors and the Extensional Theory of Arrays
    JOHANNES KEPLER UNIVERSITAT¨ LINZ JKU Technisch-Naturwissenschaftliche Fakult¨at Efficient SMT Solving for Bit-Vectors and the Extensional Theory of Arrays DISSERTATION zur Erlangung des akademischen Grades Doktor im Doktoratsstudium der Technischen Wissenschaften Eingereicht von: Dipl.-Ing. Robert Daniel Brummayer Bakk. techn. Angefertigt am: Institut f¨ur Formale Modelle und Verifikation (FMV) Beurteilung: Univ.-Prof. Dr. Armin Biere (Betreuung) Dr. Daniel Kr¨oning Linz, September, 2009 Abstract The Satisfiability Modulo Theories (SMT) problem is to decide the satisfia- bility of a formula expressed in a (decidable) first-order background theory. In this thesis we address the problem of designing, implementing, testing, and debugging an efficient SMT solver for the quantifier-free extensional theory of arrays, combined with bit-vectors. This thesis consists of three main parts. After an introduction into the problem and its domain, the first part considers the design of an efficient decision procedure for the quantifier-free extensional theory of arrays. We discuss the decision procedure in detail. In particular, we prove correctness, provide a complexity analysis, and discuss implementation and optimization details. The second part focuses on the design and implementation details of our SMT solver, called Boolector. In the SMT competitions 2008 and 2009, Boolector clearly won the division of the quantifier-free theory of bit-vectors, arrays and uninterpreted functions QF AUFBV. Moreover, it won the division of the quantifier-free theory of bit-vectors QF BV in 2008 and achieved the sec- ond place in 2009. We discuss selected optimization techniques and features such as symbolic overflow detection, propagating unconstrained variables, and under-approximation techniques for bit-vectors.
    [Show full text]
  • Philosophy) 15 2.1 References
    Necessity and sufficiency From Wikipedia, the free encyclopedia Contents 1 Abductive reasoning 1 1.1 History ................................................. 1 1.2 Deduction, induction, and abduction ................................. 1 1.3 Formalizations of abduction ...................................... 2 1.3.1 Logic-based abduction .................................... 2 1.3.2 Set-cover abduction ...................................... 2 1.3.3 Abductive validation ..................................... 3 1.3.4 Probabilistic abduction .................................... 3 1.3.5 Subjective logic abduction .................................. 4 1.4 History ................................................. 4 1.4.1 1867 ............................................. 6 1.4.2 1878 ............................................. 6 1.4.3 1883 ............................................. 6 1.4.4 1902 and after ......................................... 6 1.4.5 Pragmatism .......................................... 7 1.4.6 Three levels of logic about abduction ............................. 7 1.4.7 Other writers ......................................... 8 1.5 Applications .............................................. 8 1.6 See also ................................................ 9 1.7 References ............................................... 10 1.8 Notes ................................................. 11 1.9 External links ............................................. 14 2 Condition (philosophy) 15 2.1 References ..............................................
    [Show full text]
  • Vector Interpolative Logic
    Vector Interpolative Logic Dragan Radojević Mihaijlo Pupin Institute, Volgina 15, 11000 Belgrade, Serbia and Montenegro e-mail: [email protected] Zvonko Marić Institute of Physics, Pregrevica 118, 11080 Belgrad-Zemun, Serbia and Montenegro, e-mail: [email protected] Abstract: Vector interpolative logic (I-logic) is a consistent generalization of vector classical logic, so that the components of analyzed I-logic vectors have values from the real interval [0, 1]. All laws of classical logic and as a consequence, vector classical logic too, are preserved in the vector I- logic. This result is not possible in the frame of conventional fuzzy and/or MV- logic approaches. Keywords: Logical Vector (LV); Primary, Atomic Combined LV; Structure of LV; Intensity (Value) of LV Component; 1 Introduction In vector classical logic (vector logic) variables are logical vectors of the same dimension with only 0-1 components (components have classical logic values 1 or 0, true or false, respectively). Logical operations in vector case are logical operations on corresponding components of logic vectors. Vector logic, Section 2, is in the same frame as classical logic – Boolean algebra. Vector I-logic, Section 3, is a consistent generalization of vector logic, so that the components of analyzed vectors have values from the real interval [0, 1]. Vector I-logic has two levels: Symbolic (qualitative) and Valued (quantitative). On symbolic level the following notions are the basic: Symbolic context of vector I-logic is a set of primary logic I-vectors. Algebra of I- logic vectors (set of I-logic vectors generated by the set of primary I-vectors) is Boolean algebra.
    [Show full text]
  • Metrics of Vector Logic Algebra for Cyber Space
    Metrics of Vector Logic Algebra for Cyber Space Vladimir Hahanov, Senior Member, IEEE , Svetlana Chumachenko, Member, IEEE, Karina Mostovaya II. B-METIC OF THE VECTOR DIMENSION Abstract - The algebraic structure determining the vector- matrix transformation in the discrete vector Boolean space for the Vector discrete logic (Boolean) space determines the interac- analyzing information based on logical operations on associative tion of objects through the use of three axioms (identity, sym- data. metry and triangle) forming a nonarithmetic B-metric of vector Keywords - vector-matrix transformation, discrete vector Boo- dimension: lean space, information analysis. ⎧d(a, b) = a ⊕ b = (a i ⊕ bi ),i = 1, n; I. INTRODUCTION ⎪d(a, b) = [0 ← ∀i(d = 0)] ↔ a = b; ⎪ i HE purpose of this article is significant decreasing the analy- B = ⎨d(a, b) = d(b, a); sis time of associative data structures through the develop- ⎪d(a, b) ⊕ d(b, c) = d(a, c), T ⎪ ing metrics of vector logic algebra for parallel implementa- ⎩⊕ = [d(a, b) ∧ d(b, c)]∨[d(a, b) ∧ d(b, c)]. tion of vector operations on dedicated multiprocessor device. Vertices of the transitive triangle (a,b,c) are vectors (Fig. 1), The problems are: 1. Develop a signature, satisfying a system of which identify the objects in the n-dimensional Boolean B- axioms, identities and laws for the carrier, which is represented Space; the sides of triangle d(a,b), d(b,c), d(a,c) are the distances by a set of associative vectors of equal length in the logic vector between vertices, which are also represented by vectors of the space.
    [Show full text]
  • Descriptive Vs. Prescriptive Rules
    Break of Logic Symmetry by Self-conflicting Agents: Descriptive vs. Prescriptive Rules Boris Kovalerchuk1, Germano Resconi 2 1Dept. of Computer Science, Central Washington University, WA, USA 2Dept of Mathematics and Physics, Catholic University, Brescia, Italy Abstract — Classical axiomatic uncertainty theories This paper introduces a logic uncertainty theory in the (probability theory and others) model reasoning of rational context of conflicting evaluations of agent preferences. This agents. These theories are prescriptive, i.e., prescribe how a includes logic rules and a mechanism for identifying types rational agent should reason about uncertainties. In of logic relative to levels of conflict and self-conflicts. We particular, it is prescribed that (1) uncertainty P of any show advantages of interpretation of fuzzy logic as an sentence p is evaluated by a single scalar P(p) value, (2) the extension of the classical logic and probability theory for a truth-value of any tautology (p∨¬p) is true, and (3) the mixture of conflicting and non-conflicting agents. This truth-value of any contradiction (p∧¬p) is false for every interpretation shows that fuzzy logic has potential to proposition p. However, real agents can be quite irrational become a scalar version of a descriptive logic of irrational in many aspects and do not follow rational prescriptions. In agents. this paper, we build a Logic of Irrational and conflicting agents called I-Agent Logic of Uncertainty (IALU) as a This work is a further development of our previous works vector logic of evaluations of sentences. This logic does not [5-13] that contain extensive references to related work.
    [Show full text]
  • Redalyc.Illustrating a Neural Model of Logic Computations
    THEORIA. Revista de Teoría, Historia y Fundamentos de la Ciencia ISSN: 0495-4548 [email protected] Universidad del País Vasco/Euskal Herriko Unibertsitatea España Mizraji, Eduardo Illustrating a neural model of logic computations: The case of Sherlock Holmes’ old maxim THEORIA. Revista de Teoría, Historia y Fundamentos de la Ciencia, vol. 31, núm. 1, 2016, pp. 7-25 Universidad del País Vasco/Euskal Herriko Unibertsitatea Donostia, España Available in: http://www.redalyc.org/articulo.oa?id=339744130002 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Illustrating a neural model of logic computations: 1The case of Sherlock Holmes’ old maxim* Eduardo Mizraji Received: 15/02/2015 Final Version: 18/09/2015 BIBLID 0495-4548(2016)31:1p.7-25 DOI: 10.1387/theoria.13959 ABSTRACT: Natural languages can express some logical propositions that humans are able to understand. We illustrate this fact with a famous text that Conan Doyle attributed to Holmes: “It is an old maxim of mine that when you have excluded the impossible, whatever remains, however improbable, must be the truth”. This is a subtle logical statement usually felt as an evident truth. The problem we are trying to solve is the cognitive reason for such a feeling. We postulate here that we accept Holmes’ maxim as true because our adult brains are equipped with neural modules that naturally perform modal logical computations. Keywords: Neural computations; Natural language; Models of reasoning; Modal logics.
    [Show full text]