Sets, Relations, Functions
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Proof of Cantor's Theorem
Cantor’s Theorem Joe Roussos 1 Preliminary ideas Two sets have the same number of elements (are equinumerous, or have the same cardinality) iff there is a bijection between the two sets. Mappings: A mapping, or function, is a rule that associates elements of one set with elements of another set. We write this f : X ! Y , f is called the function/mapping, the set X is called the domain, and Y is called the codomain. We specify what the rule is by writing f(x) = y or f : x 7! y. e.g. X = f1; 2; 3g;Y = f2; 4; 6g, the map f(x) = 2x associates each element x 2 X with the element in Y that is double it. A bijection is a mapping that is injective and surjective.1 • Injective (one-to-one): A function is injective if it takes each element of the do- main onto at most one element of the codomain. It never maps more than one element in the domain onto the same element in the codomain. Formally, if f is a function between set X and set Y , then f is injective iff 8a; b 2 X; f(a) = f(b) ! a = b • Surjective (onto): A function is surjective if it maps something onto every element of the codomain. It can map more than one thing onto the same element in the codomain, but it needs to hit everything in the codomain. Formally, if f is a function between set X and set Y , then f is surjective iff 8y 2 Y; 9x 2 X; f(x) = y Figure 1: Injective map. -
Linear Transformation (Sections 1.8, 1.9) General View: Given an Input, the Transformation Produces an Output
Linear Transformation (Sections 1.8, 1.9) General view: Given an input, the transformation produces an output. In this sense, a function is also a transformation. 1 4 3 1 3 Example. Let A = and x = 1 . Describe matrix-vector multiplication Ax 2 0 5 1 1 1 in the language of transformation. 1 4 3 1 31 5 Ax b 2 0 5 11 8 1 Vector x is transformed into vector b by left matrix multiplication Definition and terminologies. Transformation (or function or mapping) T from Rn to Rm is a rule that assigns to each vector x in Rn a vector T(x) in Rm. • Notation: T: Rn → Rm • Rn is the domain of T • Rm is the codomain of T • T(x) is the image of vector x • The set of all images T(x) is the range of T • When T(x) = Ax, A is a m×n size matrix. Range of T = Span{ column vectors of A} (HW1.8.7) See class notes for other examples. Linear Transformation --- Existence and Uniqueness Questions (Section 1.9) Definition 1: T: Rn → Rm is onto if each b in Rm is the image of at least one x in Rn. • i.e. codomain Rm = range of T • When solve T(x) = b for x (or Ax=b, A is the standard matrix), there exists at least one solution (Existence question). Definition 2: T: Rn → Rm is one-to-one if each b in Rm is the image of at most one x in Rn. • i.e. When solve T(x) = b for x (or Ax=b, A is the standard matrix), there exists either a unique solution or none at all (Uniqueness question). -
Functions and Inverses
Functions and Inverses CS 2800: Discrete Structures, Spring 2015 Sid Chaudhuri Recap: Relations and Functions ● A relation between sets A !the domain) and B !the codomain" is a set of ordered pairs (a, b) such that a ∈ A, b ∈ B !i.e. it is a subset o# A × B" Cartesian product – The relation maps each a to the corresponding b ● Neither all possible a%s, nor all possible b%s, need be covered – Can be one-one, one&'an(, man(&one, man(&man( Alice CS 2800 Bob A Carol CS 2110 B David CS 3110 Recap: Relations and Functions ● ) function is a relation that maps each element of A to a single element of B – Can be one-one or man(&one – )ll elements o# A must be covered, though not necessaril( all elements o# B – Subset o# B covered b( the #unction is its range/image Alice Balch Bob A Carol Jameson B David Mews Recap: Relations and Functions ● Instead of writing the #unction f as a set of pairs, e usually speci#y its domain and codomain as: f : A → B * and the mapping via a rule such as: f (Heads) = 0.5, f (Tails) = 0.5 or f : x ↦ x2 +he function f maps x to x2 Recap: Relations and Functions ● Instead of writing the #unction f as a set of pairs, e usually speci#y its domain and codomain as: f : A → B * and the mapping via a rule such as: f (Heads) = 0.5, f (Tails) = 0.5 2 or f : x ↦ x f(x) ● Note: the function is f, not f(x), – f(x) is the value assigned b( f the #unction f to input x x Recap: Injectivity ● ) function is injective (one-to-one) if every element in the domain has a unique i'age in the codomain – +hat is, f(x) = f(y) implies x = y Albany NY New York A MA Sacramento B CA Boston .. -
Primitive Recursive Functions Are Recursively Enumerable
AN ENUMERATION OF THE PRIMITIVE RECURSIVE FUNCTIONS WITHOUT REPETITION SHIH-CHAO LIU (Received April 15,1900) In a theorem and its corollary [1] Friedberg gave an enumeration of all the recursively enumerable sets without repetition and an enumeration of all the partial recursive functions without repetition. This note is to prove a similar theorem for the primitive recursive functions. The proof is only a classical one. We shall show that the theorem is intuitionistically unprovable in the sense of Kleene [2]. For similar reason the theorem by Friedberg is also intuitionistical- ly unprovable, which is not stated in his paper. THEOREM. There is a general recursive function ψ(n, a) such that the sequence ψ(0, a), ψ(l, α), is an enumeration of all the primitive recursive functions of one variable without repetition. PROOF. Let φ(n9 a) be an enumerating function of all the primitive recursive functions of one variable, (See [3].) We define a general recursive function v(a) as follows. v(0) = 0, v(n + 1) = μy, where μy is the least y such that for each j < n + 1, φ(y, a) =[= φ(v(j), a) for some a < n + 1. It is noted that the value v(n + 1) can be found by a constructive method, for obviously there exists some number y such that the primitive recursive function <p(y> a) takes a value greater than all the numbers φ(v(0), 0), φ(y(Ϋ), 0), , φ(v(n\ 0) f or a = 0 Put ψ(n, a) = φ{v{n), a). -
Polya Enumeration Theorem
Polya Enumeration Theorem Sasha Patotski Cornell University [email protected] December 11, 2015 Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 1 / 10 Cosets A left coset of H in G is gH where g 2 G (H is on the right). A right coset of H in G is Hg where g 2 G (H is on the left). Theorem If two left cosets of H in G intersect, then they coincide, and similarly for right cosets. Thus, G is a disjoint union of left cosets of H and also a disjoint union of right cosets of H. Corollary(Lagrange's theorem) If G is a finite group and H is a subgroup of G, then the order of H divides the order of G. In particular, the order of every element of G divides the order of G. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 2 / 10 Applications of Lagrange's Theorem Theorem n! For any integers n ≥ 0 and 0 ≤ m ≤ n, the number m!(n−m)! is an integer. Theorem (ab)! (ab)! For any positive integers a; b the ratios (a!)b and (a!)bb! are integers. Theorem For an integer m > 1 let '(m) be the number of invertible numbers modulo m. For m ≥ 3 the number '(m) is even. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 3 / 10 Polya's Enumeration Theorem Theorem Suppose that a finite group G acts on a finite set X . Then the number of colorings of X in n colors inequivalent under the action of G is 1 X N(n) = nc(g) jGj g2G where c(g) is the number of cycles of g as a permutation of X . -
Enumeration of Finite Automata 1 Z(A) = 1
INFOI~MATION AND CONTROL 10, 499-508 (1967) Enumeration of Finite Automata 1 FRANK HARARY AND ED PALMER Department of Mathematics, University of Michigan, Ann Arbor, Michigan Harary ( 1960, 1964), in a survey of 27 unsolved problems in graphical enumeration, asked for the number of different finite automata. Re- cently, Harrison (1965) solved this problem, but without considering automata with initial and final states. With the aid of the Power Group Enumeration Theorem (Harary and Palmer, 1965, 1966) the entire problem can be handled routinely. The method involves a confrontation of several different operations on permutation groups. To set the stage, we enumerate ordered pairs of functions with respect to the product of two power groups. Finite automata are then concisely defined as certain ordered pah's of functions. We review the enumeration of automata in the natural setting of the power group, and then extend this result to enumerate automata with initial and terminal states. I. ENUMERATION THEOREM For completeness we require a number of definitions, which are now given. Let A be a permutation group of order m = ]A I and degree d acting on the set X = Ix1, x~, -.. , xa}. The cycle index of A, denoted Z(A), is defined as follows. Let jk(a) be the number of cycles of length k in the disjoint cycle decomposition of any permutation a in A. Let al, a2, ... , aa be variables. Then the cycle index, which is a poly- nomial in the variables a~, is given by d Z(A) = 1_ ~ H ~,~(°~ . (1) ~$ a EA k=l We sometimes write Z(A; al, as, .. -
The Axiom of Choice and Its Implications
THE AXIOM OF CHOICE AND ITS IMPLICATIONS KEVIN BARNUM Abstract. In this paper we will look at the Axiom of Choice and some of the various implications it has. These implications include a number of equivalent statements, and also some less accepted ideas. The proofs discussed will give us an idea of why the Axiom of Choice is so powerful, but also so controversial. Contents 1. Introduction 1 2. The Axiom of Choice and Its Equivalents 1 2.1. The Axiom of Choice and its Well-known Equivalents 1 2.2. Some Other Less Well-known Equivalents of the Axiom of Choice 3 3. Applications of the Axiom of Choice 5 3.1. Equivalence Between The Axiom of Choice and the Claim that Every Vector Space has a Basis 5 3.2. Some More Applications of the Axiom of Choice 6 4. Controversial Results 10 Acknowledgments 11 References 11 1. Introduction The Axiom of Choice states that for any family of nonempty disjoint sets, there exists a set that consists of exactly one element from each element of the family. It seems strange at first that such an innocuous sounding idea can be so powerful and controversial, but it certainly is both. To understand why, we will start by looking at some statements that are equivalent to the axiom of choice. Many of these equivalences are very useful, and we devote much time to one, namely, that every vector space has a basis. We go on from there to see a few more applications of the Axiom of Choice and its equivalents, and finish by looking at some of the reasons why the Axiom of Choice is so controversial. -
17 Axiom of Choice
Math 361 Axiom of Choice 17 Axiom of Choice De¯nition 17.1. Let be a nonempty set of nonempty sets. Then a choice function for is a function f sucFh that f(S) S for all S . F 2 2 F Example 17.2. Let = (N)r . Then we can de¯ne a choice function f by F P f;g f(S) = the least element of S: Example 17.3. Let = (Z)r . Then we can de¯ne a choice function f by F P f;g f(S) = ²n where n = min z z S and, if n = 0, ² = min z= z z = n; z S . fj j j 2 g 6 f j j j j j 2 g Example 17.4. Let = (Q)r . Then we can de¯ne a choice function f as follows. F P f;g Let g : Q N be an injection. Then ! f(S) = q where g(q) = min g(r) r S . f j 2 g Example 17.5. Let = (R)r . Then it is impossible to explicitly de¯ne a choice function for . F P f;g F Axiom 17.6 (Axiom of Choice (AC)). For every set of nonempty sets, there exists a function f such that f(S) S for all S . F 2 2 F We say that f is a choice function for . F Theorem 17.7 (AC). If A; B are non-empty sets, then the following are equivalent: (a) A B ¹ (b) There exists a surjection g : B A. ! Proof. (a) (b) Suppose that A B. -
Upper and Lower Bounds on Continuous-Time Computation
Upper and lower bounds on continuous-time computation Manuel Lameiras Campagnolo1 and Cristopher Moore2,3,4 1 D.M./I.S.A., Universidade T´ecnica de Lisboa, Tapada da Ajuda, 1349-017 Lisboa, Portugal [email protected] 2 Computer Science Department, University of New Mexico, Albuquerque NM 87131 [email protected] 3 Physics and Astronomy Department, University of New Mexico, Albuquerque NM 87131 4 Santa Fe Institute, 1399 Hyde Park Road, Santa Fe, New Mexico 87501 Abstract. We consider various extensions and modifications of Shannon’s General Purpose Analog Com- puter, which is a model of computation by differential equations in continuous time. We show that several classical computation classes have natural analog counterparts, including the primitive recursive functions, the elementary functions, the levels of the Grzegorczyk hierarchy, and the arithmetical and analytical hierarchies. Key words: Continuous-time computation, differential equations, recursion theory, dynamical systems, elementary func- tions, Grzegorczyk hierarchy, primitive recursive functions, computable functions, arithmetical and analytical hierarchies. 1 Introduction The theory of analog computation, where the internal states of a computer are continuous rather than discrete, has enjoyed a recent resurgence of interest. This stems partly from a wider program of exploring alternative approaches to computation, such as quantum and DNA computation; partly as an idealization of numerical algorithms where real numbers can be thought of as quantities in themselves, rather than as strings of digits; and partly from a desire to use the tools of computation theory to better classify the variety of continuous dynamical systems we see in the world (or at least in its classical idealization). -
Hyperoperations and Nopt Structures
Hyperoperations and Nopt Structures Alister Wilson Abstract (Beta version) The concept of formal power towers by analogy to formal power series is introduced. Bracketing patterns for combining hyperoperations are pictured. Nopt structures are introduced by reference to Nept structures. Briefly speaking, Nept structures are a notation that help picturing the seed(m)-Ackermann number sequence by reference to exponential function and multitudinous nestings thereof. A systematic structure is observed and described. Keywords: Large numbers, formal power towers, Nopt structures. 1 Contents i Acknowledgements 3 ii List of Figures and Tables 3 I Introduction 4 II Philosophical Considerations 5 III Bracketing patterns and hyperoperations 8 3.1 Some Examples 8 3.2 Top-down versus bottom-up 9 3.3 Bracketing patterns and binary operations 10 3.4 Bracketing patterns with exponentiation and tetration 12 3.5 Bracketing and 4 consecutive hyperoperations 15 3.6 A quick look at the start of the Grzegorczyk hierarchy 17 3.7 Reconsidering top-down and bottom-up 18 IV Nopt Structures 20 4.1 Introduction to Nept and Nopt structures 20 4.2 Defining Nopts from Nepts 21 4.3 Seed Values: “n” and “theta ) n” 24 4.4 A method for generating Nopt structures 25 4.5 Magnitude inequalities inside Nopt structures 32 V Applying Nopt Structures 33 5.1 The gi-sequence and g-subscript towers 33 5.2 Nopt structures and Conway chained arrows 35 VI Glossary 39 VII Further Reading and Weblinks 42 2 i Acknowledgements I’d like to express my gratitude to Wikipedia for supplying an enormous range of high quality mathematics articles. -
Enumeration of Structure-Sensitive Graphical Subsets: Calculations (Graph Theory/Combinatorics) R
Proc. Nati Acad. Sci. USA Vol. 78, No. 3, pp. 1329-1332, March 1981 Mathematics Enumeration of structure-sensitive graphical subsets: Calculations (graph theory/combinatorics) R. E. MERRIFIELD AND H. E. SIMMONS Central Research and Development Department, E. I. du Pont de Nemours and Company, Experimental Station, Wilmington, Delaware 19898 Contributed by H. E. Simmons, October 6, 1980 ABSTRACT Numerical calculations are presented, for all Table 2. Qualitative properties of subset counts connected graphs on six and fewer vertices, of the -lumbers of hidepndent sets, connected sets;point and line covers, externally Quantity Branching Cyclization stable sets, kernels, and irredundant sets. With the exception of v, xIncreases Decreases the number of kernels, the numbers of such sets are al highly p Increases Increases structure-sensitive quantities. E Variable Increases K Insensitive Insensitive The necessary mathematical machinery has recently been de- Variable Variable veloped (1) for enumeration of the following types of special cr Decreases Increases subsets of the vertices or edges of a general graph: (i) indepen- p Increases Increases dent sets, (ii) connected sets, (iii) point and line covers, (iv;' ex- X Decreases Increases ternally stable sets, (v) kernels, and (vi) irredundant sets. In e Increases Increases order to explore the sensitivity of these quantities to graphical K Insensitive Insensitive structure we have employed this machinery to calculate some Decreases Increases explicit subset counts. (Since no more efficient algorithm is known for irredundant sets, they have been enumerated by the brute-force method of testing every subset for irredundance.) 1. e and E are always odd. The 10 quantities considered in ref. -
On the Successor Function
On the successor function Christiane Frougny LIAFA, Paris Joint work with Valérie Berthé, Michel Rigo and Jacques Sakarovitch Numeration Nancy 18-22 May 2015 Pierre Liardet Groupe d’Etude sur la Numération 1999 Peano The successor function is a primitive recursive function Succ such that Succ(n)= n + 1 for each natural number n. Peano axioms define the natural numbers beyond 0: 1 is defined to be Succ(0) Addition on natural numbers is defined recursively by: m + 0 = m m + Succ(n)= Succ(m)+ n Odometer The odometer indicates the distance traveled by a vehicule. Odometer The odometer indicates the distance traveled by a vehicule. Leonardo da Vinci 1519: odometer of Vitruvius Adding machine Machine arithmétique Pascal 1642 : Pascaline The first calculator to have a controlled carry mechanism which allowed for an effective propagation of multiple carries. French currency system used livres, sols and deniers with 20 sols to a livre and 12 deniers to a sol. Length was measured in toises, pieds, pouces and lignes with 6 pieds to a toise, 12 pouces to a pied and 12 lignes to a pouce. Computation in base 6, 10, 12 and 20. To reset the machine, set all the wheels to their maximum, and then add 1 to the rightmost wheel. In base 10, 999999 + 1 = 000000. Subtractions are performed like additions using 9’s complement arithmetic. Adding machine and adic transformation An adic transformation is a generalisation of the adding machine in the ring of p-adic integers to a more general Markov compactum. Vershik (1985 and later): adic transformation based on Bratteli diagrams: it acts as a successor map on a Markov compactum defined as a lexicographically ordered set of infinite paths in an infinite labeled graph whose transitions are provided by an infinite sequence of transition matrices.