<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Principles and Clusters in Human Syllogistic Reasoning</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Emmanuelle-Anna Dietz Saldanha</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ste en Holldobler</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Richard Morbitz?</string-name>
          <email>richard.moerbitz@tu-dresden.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>International Center for Computational Logic</institution>
          ,
          <addr-line>TU Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>It seems widely accepted that human reasoning cannot be modeled by means of Classical Logic. Psychological experiments have repeatedly shown that participants' answers systematically deviate from the classical logically correct answers. Recently a new approach on modeling human syllogistic reasoning has been developed which seems to perform the best compared to other state-of-the-art cognitive theories. We take this approach as starting point, yet instead of trying to model the human reasoner, we aim at identifying clusters of reasoners, which can be characterized by principles or by heuristic strategies.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        In recent years, a new cognitive theory based on the Weak Completion
Semantics (WCS) has been developed. It has its roots in the ideas rst expressed by
Stenning and van Lambalgen [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], but is mathematically sound [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], and has been
successfully applied to various human reasoning tasks. An overview can be found
in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Hence, it was natural to ask whether WCS is competitive in syllogistic
reasoning and how it performs wrt the cognitive theories evaluated in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Consider
the following quanti ed statements:
      </p>
      <p>
        All a are b.Some c are not b.
(AO3)
Classical logically Some c are not a follows from these premises. However,
according to [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], the majority of participants in experimental studies, concluded
that no valid conclusion and Some c are not a follows. Yet, these two responses
exclude each other, i.e. it is unlikely that the participants who answered no valid
conclusion are the same ones who answered Some c are not a, and vice versa.
      </p>
      <p>The four quanti ers and their formalization in FOL are given in Table 1.
The entities can appear in four di erent orders called gures shown in Table 2.
Hence, a problem can be completely speci ed by the quanti ers of the rst and
second premise and the gure. The example discussed above is AO3.</p>
      <p>
        Recently, a computational logic approach to human syllogistic reasoning has
been developed under the Weak Completion Semantics, which identi es seven
principles for modeling the logical form of the representation of quanti ed
statements in human reasoning [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The results of this approach achieved a match
? The authors are mentioned in alphabetical order.
      </p>
      <p>
        First-order logic
a rmative universal 8X(a(X) ! b(X))
a rmative existential 9X(a(X) ^ b(X))
negative universal 8X(a(X) ! :b(X))
negative existential 9X(a(X) ^ :b(X))
Short
Aab
Iab
Eab
Oab
of 89% with respect to the conclusions participants gave, based on the data
reported in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. This result stands out because the best of the twelve other
state-of-the-art cognitive theories, only achieved a match of 84%.
      </p>
      <p>
        While reasoning with conditionals humans seems to take certain assumptions
for granted which however are not stated explicitly in the task description. As
psychological experiments show, these assumptions seem not to be arbitrary but
instead are systematic in the sense that they are repeatedly made by participants.
Furthermore, some assumptions reappear in various experiments, whereas other
assumptions are only made in very few experiments or only by some participants.
In order to identify and structure these assumptions, we view them as principles
that are either applied or ignored by the participants who have to solve the
task. As starting point, we take the syllogistic reasoning approach presented
in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. However, a major drawback of this approach is that only the matching
with respect to the aggregated data is considered, i.e. the approach models the
human reasoner. However, the above example and other examples such as cases
of the Wason Selection Task reported in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], serve as indication that the human
reasoner does not exist, but instead we might better search for clusters of human
reasoners. These clusters might be expressed by principles, i.e. some clusters
might apply some principles that are not applied by other clusters.
      </p>
      <p>The paper is structured as follows: First, we present the principles for the
representation of quanti ed statements, motivated by ndings from Cognitive
Science and Linguistics. Next, the Weak Completion Semantics is introduced and
the encoding of quanti ed statements within this approach in Section 3 and 4.
Then the clusters and heuristics are discussed and nally an overall evaluation
of the Weak Completion Semantics is presented.
2</p>
      <p>
        Principles about Quanti ed Statements
Eight principles for developing a logical form of quanti ed statements are
presented. They originate from [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ] except of the principles in Section 2.5 and 2.8.
2.1
      </p>
      <sec id="sec-1-1">
        <title>Quanti ed Statements as Implication (conditionals)</title>
        <p>Independent of the quanti ers mood, we decide to formalize any relation between
two objects of a quanti ed statement by means of the implication such that the
rst object is the antecedent and the second object the conclusion in the
implication. For instance, the statement All a are b is expressed as 8X(a(X) ! b(X)).
2.2</p>
        <p>
          Licenses for Inferences (licenses)
[
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] proposed to formalize conditionals in human reasoning not by inferences
straight away, but rather by licenses for inferences. Given the quanti ed
statement All a are b, a license for this inference can then be expressed by All a that
are not abnormal, are b. Given the previous formalization of this statement as
8X(a(X) ! b(X)), we extend this implication by conjoining a(X) together with
an abnormality predicate as follows: 8X(a(X) ^ :abpq(X) ! b(X)).
Further, the closed-world assumption with respect to the abnormality predicate
is expressed by nothing is abnormal wrt X, i.e. :abpq(X).
2.3
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>Existential Import and Gricean Implicature (import)</title>
        <p>
          Humans understand quanti ers di erently due to a pragmatic understanding of
the language. For instance, in natural language, we normally do not quantify
over things that do not exist. Consequently, for all implies there exists. This
appears to be in line with human reasoning and has been called the Gricean
implicature [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. This corresponds to what sometimes in literature is also called
existential import and assumed by several theories like the theory of mental
models [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] or mental logic [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Likewise, [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] have shown that humans require
existential import for a conditional to be true.
        </p>
        <p>
          Furthermore, as mentioned by [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], the quanti er some a are b often implies
that some a are not b, which again is implied by the Gricean implicature:
Someone would not state some a are b if that person knew that all a are b. As the
person does not say all a are b, but some a are b instead, we assume that not
all a are b, which in turn implies some a are not b.
2.4
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>Unknown Generalization (unknownGen)</title>
        <p>
          Humans seem to distinguish between some y are z and some z are y, as the
results reported by [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] show. Nevertheless, if we would represent some y are z
by 9X(y(X) ^ z(X)) then this is semantically equivalent to 9X(z(X) ^ y(X))
because conjunction is commutative in FOL. Likewise, humans seem to
distinguish between some y are z and all y are z, as we have already discussed in
Section 2.3. Accordingly, if we only observe that an object o belongs to y and z
then we do not want to conclude both, some y are z and all y are z.
        </p>
        <p>In order to distinguish between some y are z and all y are z, we introduce
the following principle: If we know that some y are z, then there must not only
be an object o1, which belongs to y and z but there must be another object
o2, which belongs to y and for which it is unknown whether it belongs to z. To
express this idea, we can make use of the the principle (licenses) presented in
Section 2.2 as follows: We replace :abpq(X) by :abpq(o1), i.e. the closed-world
assumption about abnormal is only applied wrt o1.
2.5</p>
      </sec>
      <sec id="sec-1-4">
        <title>Deliberate Generalization (deliberateGen)</title>
        <p>If all of the principles introduced so far are applied to an existential premise,
the only object about which an inference can be made is the one resulting from
the existential import principle. This is because the abnormality introduced by
the licenses for inferences principle has to be false for inference, but due to the
unknown generalization principle it is unknown for other objects.</p>
        <p>
          There is, however, evidence that some humans still draw conclusions in such
circumstances [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. We believe that they do not take into account abnormalities
regarding objects that are not related to the premise.
2.6
        </p>
      </sec>
      <sec id="sec-1-5">
        <title>Converse Implication (converse)</title>
        <p>
          Although there seems to be some evidence that humans distinguish between
some y are z and some z are y (see the results reported in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]) we propose that
premises of the form Iab imply Iba and vice versa. If there is an object which
belongs to y and z, then there is also an object which belongs to z and y.
2.7
        </p>
      </sec>
      <sec id="sec-1-6">
        <title>Search Alternative Conclusions to NVC (searchAlt)</title>
        <p>Our hypothesis is that when participants are faced with a NVC conclusion (no
valid conclusion), they might not want to accept this conclusion and proceed
to check whether there exists unknown information that is relevant. This
information may be explanations about the facts coming either from an existential
import or from unknown generalization. We use only the rst as source for
observations, since they are used directly to infer new information.
2.8</p>
      </sec>
      <sec id="sec-1-7">
        <title>Contraposition (contraposition)</title>
        <p>
          In FOL, a conditional statement of the form 8(X)(a(X) b(X)) is logically
equivalent to its contrapositive 8(X)(:b(X) :a(X)). This contraposition also
holds for the syllogistic moods A and E. There is evidence in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] that some of
the participants make use of this equivalence when solving syllogistic reasoning
tasks. We believe that when they encounter a premise with the mood A (e.g. All
a are b), then they might reason with the contrapositive conditional as well.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Weak Completion Semantics</title>
      <p>
        The general notation, which we will use in the paper, is based on [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
3.1
      </p>
      <sec id="sec-2-1">
        <title>Contextual Logic Programs</title>
        <p>
          Contextual logic programs are (data) logic programs extended by the
truthfunctional operator ctxt, called context [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. (Propositional) contextual logic
program clauses are expressions of the forms A L1 ^ : : : ^ Lm ^ ctxt(Lm+1) ^
: : : ^ ctxt(Lm+p) (called rules), A &gt; (called facts), A ? (called negative
assumptions ) and A U (called unknown assumptions ). A is an atom and
the Li with 1 i m + p are literals. A is called head and L1 ^ : : : ^ Lm ^
ctxt(Lm+1) ^ : : : ^ ctxt(Lm+p) as well as &gt;; ? and U, standing for true, false and
unknown respectively, are called body of the corresponding clauses. A contextual
(logic) program is a set of contextual logic program clauses. gP denotes the set
of all ground instances of clauses occurring in P. atoms(P) denotes the set of
all atoms occurring in gP. A is de ned in P i P contains a rule or a fact with
head A. A is unde ned in P i A is not de ned in P. The set of all atoms that
are unde ned in P is denoted by undef(P). The de nition of A in P is de ned
as def (A; P) = fA Body j A Body is a rule or a fact occurring in Pg. :A
is negatively assumed in P i P contains an negative assumption with head A,
no unknown assumption with head A and def (A; P) = ;. We omit the word
contextual when we refer to programs, if not stated otherwise.
3.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Integrity Constraints</title>
        <p>
          A set of integrity constraints IC consists of clauses of the form U Body,
where Body is a conjunction of literals and U denotes the unknown. Hence, an
interpretation maps an integrity constraint to &gt; i Body is either mapped to U
or ?. This understanding is similar to the de nition of the integrity constraints
for the Well-founded Semantics in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Given an interpretation I and a set of
integrity constraints IC, I satis es IC i all clauses in IC are true under I.
3.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Three-Valued Lukasiewicz Logic Extended by ctxt Connective</title>
        <p>We consider the three-valued Lukasiewicz logic together with the ctxt connective,
for which the corresponding truth values are &gt;, ? and U, meaning true, false
and unknown, respectively. A three-valued interpretation I is a mapping from
atoms(P) to the set of truth values f&gt;; ?; Ug, represented as a pair I = hI&gt;; I?i
of two disjoint sets of atoms: I&gt; = fA j A is mapped to &gt; under Ig and I? =
fA j A is mapped to ? under Ig. Atoms which do not occur in I&gt; [ I? are
mapped to U. The truth value of a given formula under I is determined according
to the truth tables in Table 3. I(F ) = &gt; means that a formula F is mapped
to true under I. A three-valued model M of P is a three-valued interpretation
such that M(A Body) = &gt; for each A Body 2 P. Let I = hI&gt;; I?i and
J = hJ &gt;; J ?i be two interpretations. I J i I&gt; J &gt; and I? J ?. I is the
least model of P i for any other model J of P it holds that I J .
3.4</p>
      </sec>
      <sec id="sec-2-4">
        <title>Forward Reasoning: Least Models under the Weak Completion</title>
        <p>For a given P, consider the following transformation: 1.For each ground atom A
which is de ned in P, replace all clauses of the form A Body1; : : : ; A Bodym
occurring in gP by A Body1 _ : : : _ Bodym. 2. Replace all occurrences of
by $. The obtained ground program is called weak completion of P or wcP.</p>
        <p>F :F
&gt; ?
? &gt;
U U
^ &gt; U ?
&gt; &gt; U ?
U U U ?
? ? ? ?
_ &gt; U ?
&gt; &gt; &gt; &gt;
U &gt; U U
? &gt; U ?</p>
        <p>
          &gt; U ?
&gt; &gt; &gt; &gt;
U U &gt; &gt;
? ? U &gt;
$ &gt; U ?
&gt; &gt; U ?
U U &gt; U
? ? U &gt;
&gt;
?
U
&gt;
?
?
The least xed point of P is denoted by lfp P , if it exists. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] showed that
non-contextual programs as well as their weak completions always have a least
model under Lukasiewicz logic, which can be obtained as the least xed point
of . However, for programs with the ctxt operator this property only holds if
the programs do not contain cycles [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. We de ne P j=wcs F i P is acyclic and
lfp P j= F . In the remainder of this paper, we only consider acyclic programs
and MP denotes the least xed point of P .
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>Backward Reasoning: Explanations by Means of Abduction</title>
        <p>An abductive framework hP; A; IC; j=wcsi consists of a program P, a set A of
abducibles, a set IC of integrity constraints, and the entailment relation j=wcs.
The set of abducibles A = fA &gt; j def (A; P) = ;g [ fA ? j A 2 undef(P)g:
Let hP; A; IC; j=wcsi be an abductive framework and observation O a set of
literals. O is explainable in hP; A; IC; j=wcsi if and only if there exists an E A,
such that P [ E j= L for all L 2 O and P [ E satis es IC. E is then called
explanation for O given P and IC. We restrict E to be minimal, i.e. there does
not exist any other explanation E 0 A for O such that E 0 E .</p>
        <p>
          Among the minimal explanations, it is possible that some of them entail a
certain formula F while others do not. There exist two strategies to determine
whether F is a valid conclusion in such cases. F follows credulously, if it is
entailed by at least one explanation. F follows skeptically, if it is entailed by
all explanations. Due to previous results on modeling human reasoning [
          <xref ref-type="bibr" rid="ref1 ref3 ref4">3,4,1</xref>
          ],
skeptical abduction is applied. The set of observations wrt P, OP , as follows:
OP = ffAg j A
&gt; 2 def (A; P) ^ (A
        </p>
        <p>B1 ^
^ Bn) 2 def (A; P)g;
where n &gt; 0 and Bi is a literal for all 1 i n. These are the atoms that
occur in the head of a both rule and a fact. In the following, the idea is nd
an explanation for each observation O 2 OP where the observation is further
restricted by considering only facts that result from certain principles.</p>
      </sec>
      <sec id="sec-2-6">
        <title>Negation by Transformation (transformation) The logic programs we con</title>
        <p>sider do not allow heads of clauses to be negative literals. A negative
conclusion :p(X) is represented by introducing an auxiliary formula p0(X) together
with the clause p(X) :p0(X) and the integrity constraint U p(X) ^ p0(X).
This is a widely used technique in logic programming. Together with the
principle (licenses) introduced in Section 2.2, this additional clause is extended by the
following two clauses: p(X) :p0(X) ^ :abnpp(X): abnpp(X) ?:
Additionally, the integrity constraint U p(X) ^ p0(X) states that an object
cannot belong to both, p and p0.</p>
        <p>
          No Derivation through Double Negation (doubleNeg) A positive
conclusion can be derived from double negation within two conditionals. Consider the
following two conditionals with each one having a negative premise: If not a,
then b. If not b then c. Additionally, assume that a is true. Let us encode the
two conditionals and the fact that a is true as P = fb :a; c :b; a &gt;g.
wc P is fb $ :a; c $ :b; a $ &gt;g where MP = hfa; cg; fbgi j= a ^ c. It appears
to be the case that humans do not reason in such a way, considering the
results of the participants' responses in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Accordingly, we block them through
abnormalities.
4
        </p>
        <p>Quanti ed Statements as Logic Programs
Based on the principles and encoding aspects in Section 2 and Section 3.6, we
encode the quanti ed statements into logic programs. The programs are speci ed
using the predicates y and z and depending on the gures shown in Table 2, where
yz can be replaced by ab, ba, cb or bc. Here, all principles regarding a premise
are described. However, we will later assume di erent clusters of reasoners, some
of which do not apply certain principles (see Section 5). For such clusters, the
clauses associated with the principles not applied are removed from the program.
4.1</p>
        <p>All y are z (Ayz)
All y are z is represented by PAyz, which consists of the following clauses:
z(X)
abyz(X)</p>
        <p>y(o)
abyz(X)</p>
        <p>y0(X)
abzy(X)
y(X)
y(X) ^ :abyz(X):
?:
&gt;:
ctxt(z0(X)):
:z(X) ^ :abzy(X):
?:
:y0(X) ^ :abnyy(X):
(conditionals&amp;licenses)
(licenses)
(import)
(contraposition &amp; licenses &amp; deliberateGen)
(contraposition &amp; conditionals &amp; licenses)</p>
        <p>(contraposition &amp; licenses)
(contraposition &amp; transformation&amp;licenses)
The rst two clauses are obtained by applying the principles of representing
quanti ed statements as implication and licenses for inferences. The third clause
follows by the principle of existential import and Gricean implicature. The last
four clauses result from applying the contraposition principle. The deliberate
generalization principle must also be used, because otherwise inference of :z(X)
would not be possible. It defeats the original assumption abyz(X) ? in the
sense that the weak completion of
abyz(X)
?; abyz(X)
ctxt(z0(X))
is abyz(X) $ ? _ ctxt(z0(X)), which is equivalent to abyz(X) $ ctxt(z0(X)). As
the contrapositive conditional would have a negative atom in the head, the
negation by transformation encoding is used. Note that there is no import of an object
for which :z(X) holds, because this does not follow from the premises.
Consequently, the abnormality introduced by the principles licenses for inferences and
negation by transformation does not have to be assumed as false for any object.
MPAyz is hfy(o); z(o)g; fabyz(o)gi. If contraposition is applied, by negation by
transformation we have the following integrity constraint: U y(X) ^ y0(X):
4.2</p>
        <p>No y is z (Eyz)
No y is z is represented by PEyz, which consists of the following clauses:
z0(X)
abynz(X)
z(X)
y(o1)
abnzz(o1)
y0(X)
abzny(X)
y(X)
z(o2)
abnyy(o2)
y(X) ^ :abynz(X):</p>
        <p>?:
:z0(X) ^ :abnzz(X):
&gt;:</p>
        <p>?:
z(X) ^ :abzny(X):</p>
        <p>?:
:y0(X) ^ :abnyy(X):
&gt;:
?:
(transformation &amp; licenses)</p>
        <p>(licenses)
(transformation &amp; licenses)</p>
        <p>(import)
(licenses &amp; doubleNeg)
(converse &amp; transformation &amp; licenses)</p>
        <p>(converse&amp;licenses)
(converse &amp; transformation &amp; licenses)</p>
        <p>(converse&amp;import)
(converse &amp; licenses &amp; doubleNeg)
In addition, we have the following two integrity constraints:</p>
        <p>U
U
z(X) ^ z0(X):
y(X) ^ y0(X):</p>
        <p>(transformation)
(converse &amp; transformation)
The rst two clauses in PEyz are obtained by applying the principles of
representing quanti ed statements as conditionals and using licenses for inferences,
where z0(X) is an auxiliary formula used to denote the negation of z(X). z0(X)
is related to z(X) by the third clause applying negation by transformation. In
addition, this principle enforces the integrity constraint. The fourth clause of
PEyz follows by the principle of Gricean implicature and the fth because of
licenses for inferences and no derivation through double negation. The last ve
clauses are obtained by the same reasons as the rst ve clauses together with
the principle of converse implication. Note that the last clause in PEyz cannot be
generalized to all X, because otherwise we allow conclusions by double negatives.
Therefore we apply the encoding doubleNeg. MPEyz is
hfy(o1); z0(o1); z(o2); y0(o2)g;</p>
        <p>fabynz(o1); abnzz(o1); z(o1); abzny(o2); abnyy(o2); y(o2)gi:
Some y are z is represented by PIyz, which consists of the following clauses:</p>
        <p>The rst two clauses are again obtained by the principles of representing
quantied statements as conditionals and using licenses for inferences. The abnormality
predicate is restricted to the object o1, which is assumed to exist by the
principle of Gricean implicature, represented by the third clause. The fourth clause is
obtained by the principle of unknown generalization. The fth and sixth clause
are obtained by the principle of unknown generalization. The last six clauses
are obtained by the same reasons as the rst six clauses together with the
principle of converse implication. MPIyz is hfy(o1); y(o2); z(o1)g; fabyz(o1)gi: Note
abyz(o2) is an unknown assumption in PIyz. Accordingly, z(o2) stays unknown
Some y are not z is represented by POyz which consists of the following clauses:
z0(X) y(X) ^ :abynz(X):
abynz(o1) ?:
z(X) :z0(X) ^ :abnzz(X):
y(o1) &gt;:
y(o2) &gt;:
abnzz(o1) ?:
abnzz(o2) ?:
In addition, we have the following integrity constraint:
(conditionals &amp; transformation &amp; licenses)</p>
        <p>(unknownGen &amp; licenses)
(transformation &amp; licenses)</p>
        <p>(import)
(unknownGen)
(doubleNeg &amp; licenses)
(doubleNeg &amp; licenses)
U
z(X) ^ z0(X):
(transformation)
The rst four clauses as well as the integrity constraint are derived as in the
program PEyz except that object o1 is used instead of o and abynz is restricted
to o1 like in PIyz. The fth clause of POyz is obtained by the principle of
unknown generalization. The last two clauses are again not generalized to all
objects for the same reason as previously discussed in Section 4.2 for the
representation of E: The generalization of abnzz to all objects can lead to
conclusions through double negation, in case there is a second premise. MPOyz is
hfy(o1); y(o2); z0(o1)g; fabynz(o1); abnzz(o1); abnzz(o2); z(o1)gi:
We de ne when MP entails a conclusion, where yz is to be replaced by ac or ca.
All (A) P j= Ayz i there exists an object o such that P j=wcs y(o) and for all
objects o we nd that if P j=wcs y(o) then P j=wcs z(o).</p>
        <p>No (E) P j= Eyz i there exists an object o1 such that P j=wcs y(o1) and for
all objects o1 we nd that if P j=wcs y(o1) then P j=wcs :z(o1) and if there
exists an object o2 such that P j=wcs z(o2) and for all objects o2 we nd
that if P j=wcs z(o2) then P j=wcs :y(o2).</p>
        <p>Some (I) P j= Iyz i there exists an object o1 such that P j=wcs y(o1) ^ z(o1)
and there exists an object o2 such that P j=wcs y(o2) and P 6j=wcs z(o2) and
there exists an object o3 such that P j=wcs z(o3) ^ y(o3) and there exists an
object o4 such that P j=wcs z(o4) and P 6j=wcs y(o4).</p>
        <p>Some Are Not (O) P j= Oyz i there exists an object o1 such that P j=wcs
y(o1) ^ :z(o1) and there exists an object o2 such that P j=wcs y(o2) and
P 6j=wcs :z(o2).</p>
        <p>NVC When no previous conclusion can be derived, no valid conclusion holds.
4.6</p>
      </sec>
      <sec id="sec-2-7">
        <title>Accuracy of Predictions</title>
        <p>We have nine di erent answer possibilities for each of the 64 syllogisms:</p>
        <p>Aac, Eac, Iac, Oac, Aca, Eca, Ica, Oca and NVC.</p>
        <p>For every syllogism, we de ne a list of length 9 for the predictions of the Weak
Completion Semantics, where the rst element represents Aac, the second
element represents Eac, and so forth. When Aac is predicted under the Weak
Completion Semantics for a given syllogism, then the value of the rst element of this
list is a 1, otherwise it is a 0, and the same holds for the other eight elements
in the list. Analogously, for every syllogism we de ne a list of the participants'
conclusions of length 9 containing either 1 or 0 for all nine answer possibilities,
depending on whether the majority concluded Aac, Eac, and so forth. For each
syllogism we compare each element of both lists as follows, where i is the ith
element of both lists:
comp(i) =
1
0
if both lists have the same value for the ith element
otherwise
The matching percentage of this syllogism is then computed by Pi9=1 comp(i)=9.
Note that the percentage of the match does not only take in account when the
Weak Completion Semantics correctly predicts a conclusion, but also whenever
it correctly rejected a conclusion.
5</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Clusters and Heuristics</title>
      <p>
        We consider clusters of human reasoners in terms of principles. Each cluster
is a group of humans that applies the same principles. When identifying such
clusters, e.g. by among the participants of [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], the principles used by a single
cluster should lead to a signi cant answer for the syllogism in question. As
the answers of all participants have been accumulated in the meta-analysis, the
combined answers of all clusters should exactly correspond to the signi cant
answers for that syllogism.
Basic principles are assumed to be applied by all reasoners, regardless of any
cluster. These are conditionals, licenses, import, and unknownGen. Note that they
are not necessarily applicable to every syllogism: unknownGen may only be used
for premises with an existential mood.
Advanced principles are assumed to be used by not all humans, making them
the starting point for clusters. Advanced principles considered in this paper are
converse, deliberateGen, contraposition, and searchAlt, but there may exist more.
When two individuals di er in the sense that one applies such a principle and
the other one does not, we assume that they belong to di erent clusters.
      </p>
      <p>As an example, consider the syllogism AO3 introduced in Section 1. According
to the encoding described in Section 4, it is represented as the following logic
program PAO3;basic if only the basic principles are applied:
b(X)
abab(X)
a(o1)
a(X) ^ :abab(X): b0(X)
?: c(o2)
&gt;: b(X)
c(X) ^ :abcnb(X):
&gt;:
:b0(X) ^ :abnbb(X):
c(o3)
abnbb(o2)
abcnb(o2)
abnbb(o3)
&gt;:
?:
?:
?:
M of PAO3;basic is
h fa(o1); b(o1); c(o2) ; c(o3) ; b0(o2)g;</p>
      <p>fabab(o1); abab(o2); abab(o3); abcnb(o2); abnbb(o2); abnbb(o3)gi:
NVC follows from this model. If additionally contraposition is used, then we
consider the following program instead:</p>
      <p>PAO3;contraposition = PAO3;basic [ fa0(X) :b(X) ^ :abba(X); abba(X)
a(X) :a0(X) ^ :abnaa(X); abab(X) ctxt(b0(X))g:
?;
M of PAO3;contraposition is as follows:
h fa(o1); abab(o2); b(o1); c(o2) ; c(o3) ; a0(o2); b0(o2)g;
f a(o2) ; abab(o1); abab(o3); abcnb(o2); abnba(o1); abnba(o2);</p>
      <p>abnba(o3); abnbb(o2); abnbb(o3); b(o2); a0(o1)gi:
It entails the conclusion Oca. Let us assume there are two clusters of people
whose reasoning process di ers in the application of the contraposition principle.
We unite the conclusions predicted for the clusters just as the answers of the</p>
      <p>Basic principles
1
pcontraposition
NVC
pcontraposition</p>
      <p>
        Oca
participants of psychological studies are accumulated, obtaining fOca; NVCg.
These are exactly the signi cant answers reported in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        In order to represent what principles lead to what conclusions, Multinomial
Processing Trees (MPTs) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] are used. They have been suggested for modeling
cognitive theories, because they represent cognitive processes as probabilistic
procedures, thus being able to predict multiple answers and even their
quantitative distribution [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. We set the latent states (inner nodes) of the MPTs to
the decisions whether to use certain principles and put the corresponding
conclusions in the leaves. An MPT for the AO3 syllogism based on the clustering
described above is presented in Figure 1. The parameter pcontraposition models the
probability that an individual applies the contraposition principle and therefore
belongs to the corresponding cluster. It can be trained from experimental data
with algorithms like Expectation-Maximization [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Note that the MPT cannot
predict all possible conclusions for a syllogism. This issue is addressed below.
Some theories suggest that some humans do not use logic at all to solve a
syllogism, but rely on heuristics such as the atmosphere bias [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] or the matching
bias [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Given the participants' answers presented in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], it seems that often
answers are given by a small amount of people (less then 5%). Many of these
answers, but also some signi cant ones, are not (yet) explainable by the Weak
Completion Semantics. A plausible explanation for that is that these people
simply guess or use one of the heuristics mentioned below (educated guess).
      </p>
      <p>A generative approach to model this lies in using MPTs. A MPT for a random
guess can lead to all nine conclusions. MPTs for a particular heuristic strategy
only take into account the valid conclusions under the corresponding theory. For
the atmosphere bias, universal and a rmative conclusions are excluded when one
of the premises is existential or negative, resp. In the case of identical moods,
the conclusion must have this mood as well. For the matching bias, the following
order from the most to the least conservative quanti er is de ned on moods:</p>
      <p>
        E &gt; O = I &gt; A
A conclusion may not be answered if it is less conservative than one of the
premises wrt. that order. We have also observed biased conclusions in the data
of [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] that may be explained by one of these heuristic strategies: in almost all
syllogisms with gure 1, Xac is answered where X is the least conservative mood
from the premises that is still allowed under the matching strategy (I is preferred
over O). The answer Xca is not given at all.
      </p>
      <p>
        As an alternative to generating the answers given by a cluster of guessers
using MPTs, the following inversed process can be considered: predictions of
the Weak Completion Semantics that are not in accordance with a particular
heuristic strategy are not given by a cluster using that strategy. In the ltering
approach, these conclusions are suppressed in the predictions for such a cluster.
If no conclusion remains, NVC is answered instead. As it is likely that some
participants does not use logic [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], such clusters must be modeled under the
Weak Completion Semantics by using the generative of the ltering approach.
As a consequence, MPTs can construct a prediction for all answer possibilities.
5.4
      </p>
      <sec id="sec-3-1">
        <title>A Clustering Approach</title>
        <p>
          Based on the principles and heuristic strategies described in this paper, the
participants of [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] have been partitioned into three clusters using logic and two
clusters applying heuristic strategies:
1. Basic principles, searchAlt, and converse for I
2. Basic principles, converse for I and deliberateGen
3. Basic principles, converse for I, E, and contraposition for A
4. Matching strategy
5. Biased conclusions in gure 1
Abduction was only used in one cluster because of the computational e ort
it requires. Although it would be interesting to model it for di erent clusters,
except for converse, no other advanced principle would have an impact, because
they do not add existential imports. According to the results of [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], abduction
has the same results independent of whether only the converse I mood or both
the converse I and E mood are used. The matching strategy was implemented
using the ltering approach. The biased conclusions in gure 1 heuristics was
implemented using the generative approach such that its prediction overwrites
the answers of other clusters, except NVC.
5.5
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Evaluation</title>
        <p>
          We evaluate the predictions of WCS based on the clustering approach described
in Section 5.4. The prediction for the syllogism AO3 and the overall results
are compared with other cognitive theories in Table 4. The Weak Completion
Semantics predicts the participants' answers in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] correctly for 33 out of the 64
Syllogisms. For 19 syllogisms there is one incorrect prediction, for 11 syllogisms
there are two and for one syllogism there are three mismatches.
Syllogism Participants PSYCOP Verbal Models Mental Models Conversion WCS
AO3
        </p>
        <p>Oca
NVC</p>
        <p>Oca
Ica Iac</p>
        <p>Oca
NVC</p>
        <p>Oca
NVC Oac</p>
        <p>Oca
NVC</p>
        <p>
          Oca
NVC
The starting point of this paper was the cognitive theory based on the Weak
Completion Semantics and the principles de ned in [
          <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
          ]. We have successfully
extended this approach by introducing two new principles and applying a
clustering approach to model individual di erences in human reasoning. This also
takes into account that some people may not use logic at all, but rather guess or
apply heuristic strategies. The clustering presented in Section 5.4 is only the
currently known best clustering under WCS but we don't know whether it is already
the optimal one. However, due to the combinatorial explosion1, it is di cult to
nd the global optimum. Future work may investigate alternative clusters and
possibly identify new principles. The question whether the predictions change if
abduction is applied to more than one cluster would be particularly interesting.
        </p>
        <p>Finally, we have applied Multinomial Processing Trees to model that di erent
principles lead to di erent conclusions. This information is lost if the predictions
for all clusters are accumulated. This shows how much we depend on the way
experimental results are reported. If we would have more insight about the
patterns participants opted for, we could model single syllogisms by MPTs instead
of tting to the overall results.
1 For n principles, there are up to 2n possible clusters. Additionally, it is unknown if
the current set of principles is already complete.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Ana</given-names>
            <surname>Costa</surname>
          </string-name>
          ,
          <string-name>
            <surname>Emmanuelle-Anna</surname>
            <given-names>Dietz</given-names>
          </string-name>
          ,
          <article-title>Ste en Holldobler, and Marco Ragni. A computational logic approach to human syllogistic reasoning</article-title>
          . In TBA, editor,
          <source>Proceedings of the 39th Annual Conference of the Cognitive Science Society</source>
          ,
          <string-name>
            <surname>COGSCI</surname>
          </string-name>
          <year>2017</year>
          ,
          <article-title>page TBA</article-title>
          .
          <source>Cognitive Science Society</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Ana</given-names>
            <surname>Costa</surname>
          </string-name>
          ,
          <article-title>Emmanuelle-Anna Dietz Saldanha, and Ste en Holldobler. Monadic reasoning using weak completion semantics</article-title>
          . In Ste en Holldobler, Andrey Malikov, and Christoph Wernhard, editors,
          <source>Proceedings of the Young Scientist's Second International Workshop on Trends in Information Processing (YSIP2)</source>
          <year>2017</year>
          . CEUR Workshop Proc.,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>E.-A.</given-names>
            <surname>Dietz</surname>
          </string-name>
          , S. Holldobler, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragni</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the suppression task</article-title>
          . In N. Miyake,
          <string-name>
            <given-names>D.</given-names>
            <surname>Peebles</surname>
          </string-name>
          , and
          <string-name>
            <surname>R. P</surname>
          </string-name>
          . Cooper, editors,
          <source>Proc. of the 34th Annual Conference of the Cognitive Science Society</source>
          , pages
          <fpage>1500</fpage>
          {
          <fpage>1505</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Emmanuelle-Anna Dietz</surname>
          </string-name>
          .
          <article-title>A computational logic approach to the belief bias in human syllogistic reasoning</article-title>
          . In Patrick Brezillon, Roy Turner, and Carlo Penco, editors,
          <source>10th International and Interdisciplinary Conference on Modeling and Using Context CONTEXT</source>
          <year>2017</year>
          ,
          <article-title>Proceedings</article-title>
          , volume
          <volume>10257</volume>
          , pages
          <fpage>692</fpage>
          {
          <fpage>707</fpage>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Emmanuelle-Anna Dietz</surname>
            <given-names>Saldanha</given-names>
          </string-name>
          ,
          <article-title>Ste en Holldobler, and Lu s Moniz Pereira</article-title>
          .
          <article-title>Contextual reasoning: Usually birds can abductively y</article-title>
          .
          <source>In TBA, editor, 14th int. Conference on Logic Programming and Nonmonotonic Reasoning</source>
          , volume
          <volume>TBA</volume>
          <source>of LNAI</source>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>H. P.</given-names>
            <surname>Grice</surname>
          </string-name>
          .
          <article-title>Logic and conversation</article-title>
          . In Peter Cole and Jerry L. Morgan, editors,
          <source>Syntax and semantics</source>
          , volume
          <volume>3</volume>
          . Academic Press,
          <year>1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>S.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>lldobler. Weak completion semantics and its applications in human reasoning</article-title>
          . In U. Furbach and Claudia Schon, editors,
          <source>Proceedings of the Workshop on Bridging the Gap between Human and Automated Reasoning on the 25th International Conference on Automated Deduction</source>
          , pages
          <fpage>2</fpage>
          <lpage>{</lpage>
          16. CEUR-WS.org,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Holldobler and</article-title>
          <string-name>
            <surname>C. D. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Logic programs under three-valued Lukasiewicz semantics</article-title>
          . In P. M. Hill and D. S. Warren, editors,
          <source>25th int. Conference on Logic Programming, LNCS 5649, Lecture Notes in Computer Science</source>
          , pages
          <volume>464</volume>
          {
          <fpage>478</fpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>S.</given-names>
            <surname>Ho</surname>
          </string-name>
          <article-title>lldobler and</article-title>
          <string-name>
            <surname>C. D. Kencana Ramli</surname>
          </string-name>
          .
          <article-title>Logics and networks for human reasoning</article-title>
          .
          <source>In int. Conference on Arti cial Neural Networks, LNCS</source>
          ,
          <volume>5769</volume>
          , pages
          <fpage>85</fpage>
          {
          <fpage>94</fpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Xiangen</given-names>
            <surname>Hu</surname>
          </string-name>
          and
          <string-name>
            <surname>William H Batchelder</surname>
          </string-name>
          .
          <article-title>The statistical analysis of general processing tree models with the em algorithm</article-title>
          .
          <source>Psychometrika</source>
          ,
          <volume>59</volume>
          (
          <issue>1</issue>
          ):
          <volume>21</volume>
          {
          <fpage>47</fpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Johnson-Laird</surname>
          </string-name>
          .
          <article-title>Mental models: towards a cognitive science of language, inference, and consciousness</article-title>
          . Harvard University Press, Cambridge, MA,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>S.</given-names>
            <surname>Khemlani</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Johnson-Laird</surname>
          </string-name>
          .
          <article-title>Theories of the syllogism: A meta-analysis</article-title>
          .
          <source>Psychological Bulletin</source>
          , pages
          <volume>427</volume>
          {
          <fpage>457</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Lloyd</surname>
          </string-name>
          .
          <source>Foundations of Logic Programming</source>
          . Springer,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lu s M. Pereira</surname>
          </string-name>
          , Joaquim Nunes Apar cio, and Jose Julio Alferes.
          <article-title>Hypothetical reasoning with well founded semantics</article-title>
          . In B. Mayoh, editor,
          <source>Scandinavian Conference on Arti cial Intelligence: Proc. of the SCAI'91</source>
          , pages
          <fpage>289</fpage>
          {
          <fpage>300</fpage>
          . IOS Press, Amsterdam,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Marco</surname>
            <given-names>Ragni</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmanuelle-Anna</surname>
            <given-names>Dietz</given-names>
          </string-name>
          , Ilir Kola, and
          <article-title>Ste en Holldobler. Twovalued logic is not su cient to model human reasoning, but three-valued logic is: A formal analysis</article-title>
          .
          <source>In Claudia Schon and Ulrich Furbach</source>
          , editors,
          <source>Proceedings of the Workshop on Bridging the Gap between Human and Automated Reasoning colocated with 25th International Joint Conference on Arti cial Intelligence IJCAI</source>
          , volume
          <volume>1651</volume>
          <source>of CEUR Workshop Proc</source>
          ., pages
          <volume>61</volume>
          {
          <fpage>73</fpage>
          . CEUR-WS.org,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Marco</surname>
            <given-names>Ragni</given-names>
          </string-name>
          , Henrik Singmann, and
          <string-name>
            <surname>Eva-Maria Steinlein</surname>
          </string-name>
          .
          <article-title>Theory comparison for generalized quanti ers</article-title>
          .
          <source>In CogSci</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>David M Riefer and William H Batchelder</surname>
          </string-name>
          .
          <article-title>Multinomial modeling and the measurement of cognitive processes</article-title>
          .
          <source>Psychological Review</source>
          ,
          <volume>95</volume>
          (
          <issue>3</issue>
          ):
          <volume>318</volume>
          {
          <fpage>339</fpage>
          ,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Rips</surname>
          </string-name>
          .
          <article-title>The psychology of proof: Deductive reasoning in human thinking</article-title>
          . MIT Press,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>K.</given-names>
            <surname>Stenning and M. van Lambalgen</surname>
          </string-name>
          .
          <article-title>Human Reasoning and Cognitive Science. A Bradford Book</article-title>
          . MIT Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>N. E.</given-names>
            <surname>Wetherick</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. J.</given-names>
            <surname>Gilhooly</surname>
          </string-name>
          .
          <article-title>`atmosphere', matching, and logic in syllogistic reasoning</article-title>
          .
          <source>Current Psychology</source>
          ,
          <volume>14</volume>
          (
          <issue>3</issue>
          ):
          <volume>169</volume>
          {
          <fpage>178</fpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Woodworth</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Sells</surname>
          </string-name>
          .
          <article-title>An atmosphere e ect in formal syllogistic reasoning</article-title>
          .
          <source>Journal of Experimental Psychology</source>
          ,
          <volume>18</volume>
          (
          <issue>4</issue>
          ):
          <fpage>451</fpage>
          ,
          <year>1935</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>