06. Naive Set Theory I
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mathematics 144 Set Theory Fall 2012 Version
MATHEMATICS 144 SET THEORY FALL 2012 VERSION Table of Contents I. General considerations.……………………………………………………………………………………………………….1 1. Overview of the course…………………………………………………………………………………………………1 2. Historical background and motivation………………………………………………………….………………4 3. Selected problems………………………………………………………………………………………………………13 I I. Basic concepts. ………………………………………………………………………………………………………………….15 1. Topics from logic…………………………………………………………………………………………………………16 2. Notation and first steps………………………………………………………………………………………………26 3. Simple examples…………………………………………………………………………………………………………30 I I I. Constructions in set theory.………………………………………………………………………………..……….34 1. Boolean algebra operations.……………………………………………………………………………………….34 2. Ordered pairs and Cartesian products……………………………………………………………………… ….40 3. Larger constructions………………………………………………………………………………………………..….42 4. A convenient assumption………………………………………………………………………………………… ….45 I V. Relations and functions ……………………………………………………………………………………………….49 1.Binary relations………………………………………………………………………………………………………… ….49 2. Partial and linear orderings……………………………..………………………………………………… ………… 56 3. Functions…………………………………………………………………………………………………………… ….…….. 61 4. Composite and inverse function.…………………………………………………………………………… …….. 70 5. Constructions involving functions ………………………………………………………………………… ……… 77 6. Order types……………………………………………………………………………………………………… …………… 80 i V. Number systems and set theory …………………………………………………………………………………. 84 1. The Natural Numbers and Integers…………………………………………………………………………….83 2. Finite induction -
Redalyc.Sets and Pluralities
Red de Revistas Científicas de América Latina, el Caribe, España y Portugal Sistema de Información Científica Gustavo Fernández Díez Sets and Pluralities Revista Colombiana de Filosofía de la Ciencia, vol. IX, núm. 19, 2009, pp. 5-22, Universidad El Bosque Colombia Available in: http://www.redalyc.org/articulo.oa?id=41418349001 Revista Colombiana de Filosofía de la Ciencia, ISSN (Printed Version): 0124-4620 [email protected] Universidad El Bosque Colombia How to cite Complete issue More information about this article Journal's homepage www.redalyc.org Non-Profit Academic Project, developed under the Open Acces Initiative Sets and Pluralities1 Gustavo Fernández Díez2 Resumen En este artículo estudio el trasfondo filosófico del sistema de lógica conocido como “lógica plural”, o “lógica de cuantificadores plurales”, de aparición relativamente reciente (y en alza notable en los últimos años). En particular, comparo la noción de “conjunto” emanada de la teoría axiomática de conjuntos, con la noción de “plura- lidad” que se encuentra detrás de este nuevo sistema. Mi conclusión es que los dos son completamente diferentes en su alcance y sus límites, y que la diferencia proviene de las diferentes motivaciones que han dado lugar a cada uno. Mientras que la teoría de conjuntos es una teoría genuinamente matemática, que tiene el interés matemático como ingrediente principal, la lógica plural ha aparecido como respuesta a considera- ciones lingüísticas, relacionadas con la estructura lógica de los enunciados plurales del inglés y el resto de los lenguajes naturales. Palabras clave: conjunto, teoría de conjuntos, pluralidad, cuantificación plural, lógica plural. Abstract In this paper I study the philosophical background of the relatively recent (and in the last few years increasingly flourishing) system of logic called “plural logic”, or “logic of plural quantifiers”. -
Chapter 1 Logic and Set Theory
Chapter 1 Logic and Set Theory To criticize mathematics for its abstraction is to miss the point entirely. Abstraction is what makes mathematics work. If you concentrate too closely on too limited an application of a mathematical idea, you rob the mathematician of his most important tools: analogy, generality, and simplicity. – Ian Stewart Does God play dice? The mathematics of chaos In mathematics, a proof is a demonstration that, assuming certain axioms, some statement is necessarily true. That is, a proof is a logical argument, not an empir- ical one. One must demonstrate that a proposition is true in all cases before it is considered a theorem of mathematics. An unproven proposition for which there is some sort of empirical evidence is known as a conjecture. Mathematical logic is the framework upon which rigorous proofs are built. It is the study of the principles and criteria of valid inference and demonstrations. Logicians have analyzed set theory in great details, formulating a collection of axioms that affords a broad enough and strong enough foundation to mathematical reasoning. The standard form of axiomatic set theory is denoted ZFC and it consists of the Zermelo-Fraenkel (ZF) axioms combined with the axiom of choice (C). Each of the axioms included in this theory expresses a property of sets that is widely accepted by mathematicians. It is unfortunately true that careless use of set theory can lead to contradictions. Avoiding such contradictions was one of the original motivations for the axiomatization of set theory. 1 2 CHAPTER 1. LOGIC AND SET THEORY A rigorous analysis of set theory belongs to the foundations of mathematics and mathematical logic. -
Fast and Private Computation of Cardinality of Set Intersection and Union
Fast and Private Computation of Cardinality of Set Intersection and Union Emiliano De Cristofaroy, Paolo Gastiz, and Gene Tsudikz yPARC zUC Irvine Abstract. With massive amounts of electronic information stored, trans- ferred, and shared every day, legitimate needs for sensitive information must be reconciled with natural privacy concerns. This motivates var- ious cryptographic techniques for privacy-preserving information shar- ing, such as Private Set Intersection (PSI) and Private Set Union (PSU). Such techniques involve two parties { client and server { each with a private input set. At the end, client learns the intersection (or union) of the two respective sets, while server learns nothing. However, if desired functionality is private computation of cardinality rather than contents, of set intersection, PSI and PSU protocols are not appropriate, as they yield too much information. In this paper, we design an efficient crypto- graphic protocol for Private Set Intersection Cardinality (PSI-CA) that yields only the size of set intersection, with security in the presence of both semi-honest and malicious adversaries. To the best of our knowl- edge, it is the first protocol that achieves complexities linear in the size of input sets. We then show how the same protocol can be used to pri- vately compute set union cardinality. We also design an extension that supports authorization of client input. 1 Introduction Proliferation of, and growing reliance on, electronic information trigger the increase in the amount of sensitive data stored and processed in cyberspace. Consequently, there is a strong need for efficient cryptographic techniques that allow sharing information with privacy. Among these, Private Set Intersection (PSI) [11, 24, 14, 21, 15, 22, 9, 8, 18], and Private Set Union (PSU) [24, 15, 17, 12, 32] have attracted a lot of attention from the research community. -
1 Measurable Sets
Math 4351, Fall 2018 Chapter 11 in Goldberg 1 Measurable Sets Our goal is to define what is meant by a measurable set E ⊆ [a; b] ⊂ R and a measurable function f :[a; b] ! R. We defined the length of an open set and a closed set, denoted as jGj and jF j, e.g., j[a; b]j = b − a: We will use another notation for complement and the notation in the Goldberg text. Let Ec = [a; b] n E = [a; b] − E. Also, E1 n E2 = E1 − E2: Definitions: Let E ⊆ [a; b]. Outer measure of a set E: m(E) = inffjGj : for all G open and E ⊆ Gg. Inner measure of a set E: m(E) = supfjF j : for all F closed and F ⊆ Eg: 0 ≤ m(E) ≤ m(E). A set E is a measurable set if m(E) = m(E) and the measure of E is denoted as m(E). The symmetric difference of two sets E1 and E2 is defined as E1∆E2 = (E1 − E2) [ (E2 − E1): A set is called an Fσ set (F-sigma set) if it is a union of a countable number of closed sets. A set is called a Gδ set (G-delta set) if it is a countable intersection of open sets. Properties of Measurable Sets on [a; b]: 1. If E1 and E2 are subsets of [a; b] and E1 ⊆ E2, then m(E1) ≤ m(E2) and m(E1) ≤ m(E2). In addition, if E1 and E2 are measurable subsets of [a; b] and E1 ⊆ E2, then m(E1) ≤ m(E2). -
Julia's Efficient Algorithm for Subtyping Unions and Covariant
Julia’s Efficient Algorithm for Subtyping Unions and Covariant Tuples Benjamin Chung Northeastern University, Boston, MA, USA [email protected] Francesco Zappa Nardelli Inria of Paris, Paris, France [email protected] Jan Vitek Northeastern University, Boston, MA, USA Czech Technical University in Prague, Czech Republic [email protected] Abstract The Julia programming language supports multiple dispatch and provides a rich type annotation language to specify method applicability. When multiple methods are applicable for a given call, Julia relies on subtyping between method signatures to pick the correct method to invoke. Julia’s subtyping algorithm is surprisingly complex, and determining whether it is correct remains an open question. In this paper, we focus on one piece of this problem: the interaction between union types and covariant tuples. Previous work normalized unions inside tuples to disjunctive normal form. However, this strategy has two drawbacks: complex type signatures induce space explosion, and interference between normalization and other features of Julia’s type system. In this paper, we describe the algorithm that Julia uses to compute subtyping between tuples and unions – an algorithm that is immune to space explosion and plays well with other features of the language. We prove this algorithm correct and complete against a semantic-subtyping denotational model in Coq. 2012 ACM Subject Classification Theory of computation → Type theory Keywords and phrases Type systems, Subtyping, Union types Digital Object Identifier 10.4230/LIPIcs.ECOOP.2019.24 Category Pearl Supplement Material ECOOP 2019 Artifact Evaluation approved artifact available at https://dx.doi.org/10.4230/DARTS.5.2.8 Acknowledgements The authors thank Jiahao Chen for starting us down the path of understanding Julia, and Jeff Bezanson for coming up with Julia’s subtyping algorithm. -
Mereology Then and Now
Logic and Logical Philosophy Volume 24 (2015), 409–427 DOI: 10.12775/LLP.2015.024 Rafał Gruszczyński Achille C. Varzi MEREOLOGY THEN AND NOW Abstract. This paper offers a critical reconstruction of the motivations that led to the development of mereology as we know it today, along with a brief description of some questions that define current research in the field. Keywords: mereology; parthood; formal ontology; foundations of mathe- matics 1. Introduction Understood as a general theory of parts and wholes, mereology has a long history that can be traced back to the early days of philosophy. As a formal theory of the part-whole relation or rather, as a theory of the relations of part to whole and of part to part within a whole it is relatively recent and came to us mainly through the writings of Edmund Husserl and Stanisław Leśniewski. The former were part of a larger project aimed at the development of a general framework for formal ontology; the latter were inspired by a desire to provide a nominalistically acceptable alternative to set theory as a foundation for mathematics. (The name itself, ‘mereology’ after the Greek word ‘µρoς’, ‘part’ was coined by Leśniewski [31].) As it turns out, both sorts of motivation failed to quite live up to expectations. Yet mereology survived as a theory in its own right and continued to flourish, often in unexpected ways. Indeed, it is not an exaggeration to say that today mereology is a central and powerful area of research in philosophy and philosophical logic. It may be helpful, therefore, to take stock and reconsider its origins. -
Naïve Set Theory Basic Definitions Naïve Set Theory Is the Non-Axiomatic Treatment of Set Theory
Naïve Set Theory Basic Definitions Naïve set theory is the non-axiomatic treatment of set theory. In the axiomatic treatment, which we will only allude to at times, a set is an undefined term. For us however, a set will be thought of as a collection of some (possibly none) objects. These objects are called the members (or elements) of the set. We use the symbol "∈" to indicate membership in a set. Thus, if A is a set and x is one of its members, we write x ∈ A and say "x is an element of A" or "x is in A" or "x is a member of A". Note that "∈" is not the same as the Greek letter "ε" epsilon. Basic Definitions Sets can be described notationally in many ways, but always using the set brackets "{" and "}". If possible, one can just list the elements of the set: A = {1,3, oranges, lions, an old wad of gum} or give an indication of the elements: ℕ = {1,2,3, ... } ℤ = {..., -2,-1,0,1,2, ...} or (most frequently in mathematics) using set-builder notation: S = {x ∈ ℝ | 1 < x ≤ 7 } or {x ∈ ℝ : 1 < x ≤ 7 } which is read as "S is the set of real numbers x, such that x is greater than 1 and less than or equal to 7". In some areas of mathematics sets may be denoted by special notations. For instance, in analysis S would be written (1,7]. Basic Definitions Note that sets do not contain repeated elements. An element is either in or not in a set, never "in the set 5 times" for instance. -
Fast and Private Computation of Cardinality of Set Intersection and Union*
Fast and Private Computation of Cardinality of Set Intersection and Union* Emiliano De Cristofaroy, Paolo Gastiz, Gene Tsudikz yPARC zUC Irvine Abstract In many everyday scenarios, sensitive information must be shared between parties without com- plete mutual trust. Private set operations are particularly useful to enable sharing information with privacy, as they allow two or more parties to jointly compute operations on their sets (e.g., intersec- tion, union, etc.), such that only the minimum required amount of information is disclosed. In the last few years, the research community has proposed a number of secure and efficient techniques for Private Set Intersection (PSI), however, somewhat less explored is the problem of computing the magnitude, rather than the contents, of the intersection – we denote this problem as Private Set In- tersection Cardinality (PSI-CA). This paper explores a few PSI-CA variations and constructs several protocols that are more efficient than the state-of-the-art. 1 Introduction Proliferation of, and growing reliance on, electronic information generate an increasing amount of sensitive data stored and processed in the cyberspace. Consequently, there is a compelling need for efficient cryptographic techniques that allow sharing information while protecting privacy. Among these, Private Set Intersection (PSI) [15, 29, 18, 26, 19, 27, 12, 11, 22], and Private Set Union (PSU) [29, 19, 21, 16, 36] have recently attracted a lot of attention from the research community. In particular, PSI allows one party (client) to compute the intersection of its set with that of another party (server), such that: (i) server does not learn client input, and (ii) client learns no information about server input, beyond the intersection. -
Worksheet: Cardinality, Countable and Uncountable Sets
Math 347 Worksheet: Cardinality A.J. Hildebrand Worksheet: Cardinality, Countable and Uncountable Sets • Key Tool: Bijections. • Definition: Let A and B be sets. A bijection from A to B is a function f : A ! B that is both injective and surjective. • Properties of bijections: ∗ Compositions: The composition of bijections is a bijection. ∗ Inverse functions: The inverse function of a bijection is a bijection. ∗ Symmetry: The \bijection" relation is symmetric: If there is a bijection f from A to B, then there is also a bijection g from B to A, given by the inverse of f. • Key Definitions. • Cardinality: Two sets A and B are said to have the same cardinality if there exists a bijection from A to B. • Finite sets: A set is called finite if it is empty or has the same cardinality as the set f1; 2; : : : ; ng for some n 2 N; it is called infinite otherwise. • Countable sets: A set A is called countable (or countably infinite) if it has the same cardinality as N, i.e., if there exists a bijection between A and N. Equivalently, a set A is countable if it can be enumerated in a sequence, i.e., if all of its elements can be listed as an infinite sequence a1; a2;::: . NOTE: The above definition of \countable" is the one given in the text, and it is reserved for infinite sets. Thus finite sets are not countable according to this definition. • Uncountable sets: A set is called uncountable if it is infinite and not countable. • Two famous results with memorable proofs. -
Some Set Theory We Should Know Cardinality and Cardinal Numbers
SOME SET THEORY WE SHOULD KNOW CARDINALITY AND CARDINAL NUMBERS De¯nition. Two sets A and B are said to have the same cardinality, and we write jAj = jBj, if there exists a one-to-one onto function f : A ! B. We also say jAj · jBj if there exists a one-to-one (but not necessarily onto) function f : A ! B. Then the SchrÄoder-BernsteinTheorem says: jAj · jBj and jBj · jAj implies jAj = jBj: SchrÄoder-BernsteinTheorem. If there are one-to-one maps f : A ! B and g : B ! A, then jAj = jBj. A set is called countable if it is either ¯nite or has the same cardinality as the set N of positive integers. Theorem ST1. (a) A countable union of countable sets is countable; (b) If A1;A2; :::; An are countable, so is ¦i·nAi; (c) If A is countable, so is the set of all ¯nite subsets of A, as well as the set of all ¯nite sequences of elements of A; (d) The set Q of all rational numbers is countable. Theorem ST2. The following sets have the same cardinality as the set R of real numbers: (a) The set P(N) of all subsets of the natural numbers N; (b) The set of all functions f : N ! f0; 1g; (c) The set of all in¯nite sequences of 0's and 1's; (d) The set of all in¯nite sequences of real numbers. The cardinality of N (and any countable in¯nite set) is denoted by @0. @1 denotes the next in¯nite cardinal, @2 the next, etc. -
Axioms of Set Theory and Equivalents of Axiom of Choice Farighon Abdul Rahim Boise State University, [email protected]
Boise State University ScholarWorks Mathematics Undergraduate Theses Department of Mathematics 5-2014 Axioms of Set Theory and Equivalents of Axiom of Choice Farighon Abdul Rahim Boise State University, [email protected] Follow this and additional works at: http://scholarworks.boisestate.edu/ math_undergraduate_theses Part of the Set Theory Commons Recommended Citation Rahim, Farighon Abdul, "Axioms of Set Theory and Equivalents of Axiom of Choice" (2014). Mathematics Undergraduate Theses. Paper 1. Axioms of Set Theory and Equivalents of Axiom of Choice Farighon Abdul Rahim Advisor: Samuel Coskey Boise State University May 2014 1 Introduction Sets are all around us. A bag of potato chips, for instance, is a set containing certain number of individual chip’s that are its elements. University is another example of a set with students as its elements. By elements, we mean members. But sets should not be confused as to what they really are. A daughter of a blacksmith is an element of a set that contains her mother, father, and her siblings. Then this set is an element of a set that contains all the other families that live in the nearby town. So a set itself can be an element of a bigger set. In mathematics, axiom is defined to be a rule or a statement that is accepted to be true regardless of having to prove it. In a sense, axioms are self evident. In set theory, we deal with sets. Each time we state an axiom, we will do so by considering sets. Example of the set containing the blacksmith family might make it seem as if sets are finite.