ON HOMOMORPHISMS of KRASNER HYPERRINGS 1. Introduction a Hyperoperation on a Nonempty Set H Is a Function

Total Page:16

File Type:pdf, Size:1020Kb

ON HOMOMORPHISMS of KRASNER HYPERRINGS 1. Introduction a Hyperoperation on a Nonempty Set H Is a Function ANALELE S¸TIINT¸IFICE ALE UNIVERSITAT¸II˘ \AL.I. CUZA" DIN IAS¸I (S.N.) MATEMATICA,˘ Tomul LVII, 2011, f.2 DOI: 10.2478/v10157-011-0023-2 ON HOMOMORPHISMS OF KRASNER HYPERRINGS BY W. PHANTHAWIMOL, Y. PUNKLA, K. KWAKPATOON and Y. KEMPRASIT Abstract. By a homomorphism from a Krasner hyperring (A; +; ·) into a Krasner 0 0 0 0 hyperring (A ; + ; · ) we mean a function f : A ! A satisfying f(x+y) ⊆ f(x)+f(y) and 0 f(x · y) = f(x) · f(y) for all x; y 2 A: The kernel of f, ker f, is defined by ker f = fx 2 0 0 0 0 0 A j f(x) = 0 g where 0 is the zero of (A ; + ; · ). In fact, ker f may be empty. In this paper, some general properties of a Krasner hyperring homomorphism with nonempty kernel are given. Various examples are also provided. Mathematics Subject Classification 2000: 20N20. Key words: Krasner hyperring, homomorphism. 1. Introduction A hyperoperation on a nonempty set H is a function ◦ : H × H ! P(H)nf;g where P(H) is the power set of H and (H; ◦) is called a hyper- groupoid. For nonempty subsets A; B of H and x 2 H; let [ A ◦ B = a ◦ b; A ◦ x = A ◦ fxg and x ◦ A = fxg ◦ A: a2A b2B An element e 2 H is called an identity of (H; ◦) if x 2 x ◦ e \ e ◦ x, for all x 2 H and it is called a scalar identity of (H; ◦) if x ◦ e = e ◦ x = fxg, for all x 2 H. If e is a scalar identity of (H; ◦), then e is the unique identity of (H; ◦): The hypergroupoid is said to be commutative if x ◦ y = y ◦ x, for all x; y 2 H: A hypergroupoid (H; ◦) is called a semihypergroup if (x◦y)◦z = x◦(y◦z); for all x; y; z 2 H: 240 W. PHANTHAWIMOL, Y. PUNKLA, K. KWAKPATOON, Y. KEMPRASIT 2 A semihypergroup is called a hypergroup if H ◦ x = x ◦ H = H; for all x 2 H: An element y of a hypergroupoid (H; ◦) is called an inverse of x 2 H if (x ◦ y) \ (y ◦ x) contains at least one identity. A hypergroup (H; ◦) is said to be regular if every element of (H; ◦) has at least one inverse. A regular hypergroup (H; ◦) is said to be reversible if for all x; y; z 2 H; 0 0 0 x 2 y ◦ z ) z 2 y ◦ x and y 2 x ◦ z , for some inverse y of y and some 0 inverse z of z. A hypergroup (H; ◦) is called a canonical hypergroup if: 1. (H; ◦) is commutative; 2. (H; ◦) has a scalar identity; 3. every element of (H; ◦) has a unique inverse; 4. (H; ◦) is reversible. A canonical subhypergroup of a canonical hypergroup (H; ◦) is a non- empty subset K of H containing the scalar identity of (H; ◦) which forms a canonical hypergroup under the hyperoperation ◦ on H. A Krasner hyperring is a triple (A; +; ·) such that 1. (A; +) is a canonical hypergroup, 2. (A; ·) is a semigroup with zero 0 where 0 is the scalar identity of (A; +), 3. for all x; y; z 2 A; x · (y + z) = x · y + x · z and (y + z) · x = y · x + z · x: We call 0 the zero of the Krasner hyperring (A; +; ·): For x 2 A; let −x denote the unique inverse of x in (A; +). Then −(−x) = x, for all x 2 A: In addition, we have (x + y) · (z + w) ⊆ x · z + x · w + y · z + y · w; (−x) · y = x · (−y) = −(x · y); for all x; y; z; w 2 A; ([1], p.167). A subhyperring of a Krasner hyperring (A; +; ·) is a nonempty subset S of A which forms a Krasner hyperring containing 0 under the hyperoperation + and the operation · on A, that is, S is a canonical subhypergroup of (A; +) and S · S ⊆ S: Then a nonempty subset S of A is a subhyperring of (A; +; ·) if and only if, for all x; y 2 S; x + y ⊆ S, −x 2 S and x · y 2 S: A nonempty subset I of A is called a hyperideal of (A; +; ·) if I is a canonical subhypergroup of (A; +) and A · I [ I · A ⊆ I (see [1], p.168 or [2], p.20), that is, x + y ⊆ I and −x 2 I, for all x; y 2 I and xy; yx 2 I, for all x 2 I and y 2 A. 3 ON HOMOMORPHISMS OF KRASNER HYPERRINGS 241 Let I be a hyperideal of A and A=I = fx + I j x 2 Ag: We can see that for x 2 I; x + I = I and for x; y 2 A; (x + I) \ (y + I) =6 ; implies that x + I = y + I: Define (x + I) + (y + I) = fz + I j z 2 x + yg; (x + I) · (y + I) = x · y + I; for all x; y 2 I: Then (A=I; +; ·) is a Krasner hyperring ([1], p.169). It may be called the quotient hyperring of A by I. Notice that 0 + I is the zero of the Krasner hyperring (A=I; +; ·) and for every x 2 A; −x + I is the unique inverse of x + I in the canonical hypergroup (A=I; +). A homomorphism from a Krasner hyperring (A; +; ·) into a Krasner 0 0 0 0 0 hyperring (A ; + ; · ) is a function f : A ! A such that f(x + y) ⊆ f(x) + 0 f(y) and f(x · y) = f(x) · f(y); for all x; y 2 A: A homomorphism f from 0 0 0 (A; +; ·) into (A ; + ; · ) is said to be a good homomorphism if f(x + y) = 0 f(x) + f(y); for all x; y 2 A: 0 0 0 An isomorphism from (A; +; ·) into (A ; + ; · ) is a bijective good homo- 0 0 0 morphism from (A; +; ·) onto (A ; + ; · ). The Krasner hyperrings (A; +; ·) 0 0 0 ∼ 0 0 0 and (A ; + ; · ) are said to be isomorphic, and we write (A; +; ·) = (A ; + ; · ) 0 0 0 if there is an isomorphism from (A; +; ·) onto (A ; + ; · ). Notice that if f is 0 0 0 an isomorphism from (A; +; ·) onto (A ; + ; · ), then f −1 is an isomorphism 0 0 0 from (A ; + ; · ) onto (A; +; ·). Example 1.1. Let (A; ·) be a semigroup with zero 0 such that (Anf0g; ·) is a group. Define the hyperoperation + on A by 8 <> y + x = fxg; if y = 0; x + y = Anfxg; if x = y =6 0; :> fx; yg; if x; y 2 Anf0g and x =6 y: Then (A; +; ·) is a Krasner hyperring ([1], p.170). Notice that 0 is the zero of (A; +; ·) and for every x 2 A; x is the inverse of x in (A; +). Since Ax = A, for all x 2 Anf0g, it follows that f0g and A are the only hyperideals of (A; +; ·). Example 1.2. Define the hyperoperation ⊕ on the unit interval [0; 1] by ( fmax fx; ygg; if x =6 y; x ⊕ y = [0; x]; if x = y: Then ([0; 1]; ⊕; ·) is a Krasner hyperring where · is the usual multiplication ([3]). We can see that 0 is the zero of ([0; 1]; ⊕; ·) and for every x 2 [0; 1]; x is the inverse of x in ([0; 1]; ⊕). 242 W. PHANTHAWIMOL, Y. PUNKLA, K. KWAKPATOON, Y. KEMPRASIT 4 Define f : [0; 1] ! [0; 1] by f(x) = 1, for all x 2 [0; 1]: Since 1 ⊕ 1 = [0; 1] and 1 · 1 = 1, it follows that f is a homomorphism from the Krasner hyperring ([0; 1]; ⊕; ·) into itself. Observe that ker f = ;. It is easily seen that for a 2 (0; 1], [0; a] and [0; a) are nonzero hyper- ideals of ([0; 1]; ⊕; ·). Let I be an hyperideal of ([0; 1]; ⊕; ·). Then 0 2 I. Let a be the supremum of I. If a 2 I; then [0; a] ⊇ I ⊇ a ⊕ a = [0; a]; so I = [0; a]: Assume that a2 = I. Then a > 0 and I ⊆ [0; a): Let N be the set 2 N − 1 of positive integers. Let N be such that a N > 0. Since a = sup I, it follows that for every [n ≥ N; there] exists an element xn 2 I such that − 1 ≤ − 1 ⊆ ⊕ ⊆ ≥ a n xn < a. Hence 0; a n [0; xn] = xn xn I, for all n N. Thus [ [ 1 ] [0; a) = 0; a − ⊆ I: n n2N n≥N It follows that I = [0; a): This shows that f[0; a] j a 2 [0; 1]g [ f[0; a) j a 2 (0; 1]g is the set of all hyperideals of the Krasner hyperring ([0; 1]; ⊕; ·). Notice from the proof that it is also the set of all canonical subhypergroups of the canonical hypergroup ([0; 1]; ⊕). For a 2 (0; 1) and x; y 2 [0; 1]; we have ( ( [0; a]; if x ≤ a; [0; a); if x < a; x ⊕ [0; a] = ; x ⊕ [0; a) = fxg; if x > a; fxg; if x ≥ a; { } [0; 1]=[0; a] = fz ⊕ [0; a] j z 2 [0; 1]g = f[0; a]g [ fzg j z 2 (a; 1] ; { } [0; 1]=[0; a) = fz ⊕ [0; a) j z 2 [0; 1]g = f[0; a)g [ fzg j z 2 [a; 1] ; (x ⊕ [0; a]) ⊕ (y ⊕ [0; a]) = fz ⊕ [0; a] j z 2 x ⊕ yg 8{ } > f g < x ; { } if x > y > a; = f[0; a]g [ fzg j z 2 (a; x] ; if x = y > a; :> f[0; a]g if x; y ≤ a; (x ⊕ [0; a)) ⊕ (y ⊕ [0; a)) = fz ⊕ [0; a) j z 2 x ⊕ yg 8{ } > f g ≥ < x ; { } if x > y a; = f[0; a)g [ fzg j z 2 [a; x] ; if x = y ≥ a; :> f[0; a)g; if x; y ≤ a; 5 ON HOMOMORPHISMS OF KRASNER HYPERRINGS 243 ( [0; a]; if xy ≤ a; (x ⊕ [0; a]) · (y ⊕ [0; a]) = xy ⊕ [0; a] = fxyg; if xy > a; ( [0; a); if xy < a; (x ⊕ [0; a)) · (y ⊕ [0; a)) = xy ⊕ [0; a) = fxyg; if xy ≥ a: 2.
Recommended publications
  • Introduction to Dependence Relations and Their Links to Algebraic Hyperstructures
    mathematics Article Introduction to Dependence Relations and Their Links to Algebraic Hyperstructures Irina Cristea 1,* , Juš Kocijan 1,2 and Michal Novák 3 1 Centre for Information Technologies and Applied Mathematics, University of Nova Gorica, 5000 Nova Gorica, Slovenia; [email protected] 2 Department of Systems and Control, Jožef Stefan Institut, Jamova Cesta 39, 1000 Ljubljana, Slovenia 3 Faculty of Electrical Engineering and Communication, Brno University of Technology, Technická 10, 61600 Brno, Czech Republic; [email protected] * Correspondence: [email protected] or [email protected]; Tel.: +386-533-153-95 Received: 11 July 2019; Accepted: 19 September 2019; Published: 23 September 2019 Abstract: The aim of this paper is to study, from an algebraic point of view, the properties of interdependencies between sets of elements (i.e., pieces of secrets, atmospheric variables, etc.) that appear in various natural models, by using the algebraic hyperstructure theory. Starting from specific examples, we first define the relation of dependence and study its properties, and then, we construct various hyperoperations based on this relation. We prove that two of the associated hypergroupoids are Hv-groups, while the other two are, in some particular cases, only partial hypergroupoids. Besides, the extensivity and idempotence property are studied and related to the cyclicity. The second goal of our paper is to provide a new interpretation of the dependence relation by using elements of the theory of algebraic hyperstructures. Keywords: hyperoperation; hypergroupoid; dependence relation; influence; impact 1. Introduction In many real-life situations, there are contexts with numerous “variables”, which somehow depend on one another.
    [Show full text]
  • Categorical Comprehensions and Recursion Arxiv:1501.06889V2
    Categorical Comprehensions and Recursion Joaquín Díaz Boilsa,∗ aFacultad de Ciencias Exactas y Naturales. Pontificia Universidad Católica del Ecuador. 170150. Quito. Ecuador. Abstract A new categorical setting is defined in order to characterize the subrecursive classes belonging to complexity hierarchies. This is achieved by means of coer- cion functors over a symmetric monoidal category endowed with certain recur- sion schemes that imitate the bounded recursion scheme. This gives a categorical counterpart of generalized safe composition and safe recursion. Keywords: Symmetric Monoidal Category, Safe Recursion, Ramified Recursion. 1. Introduction Various recursive function classes have been characterized in categorical terms. It has been achieved by considering a category with certain structure endowed with a recursion scheme. The class of Primitive Recursive Functions (PR in the sequel), for instance, has been chased simply by means of a carte- sian category and a Natural Numbers Object with parameters (nno in the sequel, see [11]). In [13] it can be found a generalization of that characterization to a monoidal setting, that is achieved by endowing a monoidal category with a spe- cial kind of nno (a left nno) where the tensor product is included. It is also known that other classes containing PR can be obtained by adding more struc- ture: considering for instance a topos ([8]), a cartesian closed category ([14]) or a category with finite limits ([12]).1 Less work has been made, however, on categorical characterizations of sub- arXiv:1501.06889v2 [math.CT] 28 Jan 2015 recursive function classes, that is, those contained in PR (see [4] and [5]). In PR there is at least a sequence of functions such that every function in it has a more complex growth than the preceding function in the sequence.
    [Show full text]
  • The Notion Of" Unimaginable Numbers" in Computational Number Theory
    Beyond Knuth’s notation for “Unimaginable Numbers” within computational number theory Antonino Leonardis1 - Gianfranco d’Atri2 - Fabio Caldarola3 1 Department of Mathematics and Computer Science, University of Calabria Arcavacata di Rende, Italy e-mail: [email protected] 2 Department of Mathematics and Computer Science, University of Calabria Arcavacata di Rende, Italy 3 Department of Mathematics and Computer Science, University of Calabria Arcavacata di Rende, Italy e-mail: [email protected] Abstract Literature considers under the name unimaginable numbers any positive in- teger going beyond any physical application, with this being more of a vague description of what we are talking about rather than an actual mathemati- cal definition (it is indeed used in many sources without a proper definition). This simply means that research in this topic must always consider shortened representations, usually involving recursion, to even being able to describe such numbers. One of the most known methodologies to conceive such numbers is using hyper-operations, that is a sequence of binary functions defined recursively starting from the usual chain: addition - multiplication - exponentiation. arXiv:1901.05372v2 [cs.LO] 12 Mar 2019 The most important notations to represent such hyper-operations have been considered by Knuth, Goodstein, Ackermann and Conway as described in this work’s introduction. Within this work we will give an axiomatic setup for this topic, and then try to find on one hand other ways to represent unimaginable numbers, as well as on the other hand applications to computer science, where the algorith- mic nature of representations and the increased computation capabilities of 1 computers give the perfect field to develop further the topic, exploring some possibilities to effectively operate with such big numbers.
    [Show full text]
  • Hyperoperations and Nopt Structures
    Hyperoperations and Nopt Structures Alister Wilson Abstract (Beta version) The concept of formal power towers by analogy to formal power series is introduced. Bracketing patterns for combining hyperoperations are pictured. Nopt structures are introduced by reference to Nept structures. Briefly speaking, Nept structures are a notation that help picturing the seed(m)-Ackermann number sequence by reference to exponential function and multitudinous nestings thereof. A systematic structure is observed and described. Keywords: Large numbers, formal power towers, Nopt structures. 1 Contents i Acknowledgements 3 ii List of Figures and Tables 3 I Introduction 4 II Philosophical Considerations 5 III Bracketing patterns and hyperoperations 8 3.1 Some Examples 8 3.2 Top-down versus bottom-up 9 3.3 Bracketing patterns and binary operations 10 3.4 Bracketing patterns with exponentiation and tetration 12 3.5 Bracketing and 4 consecutive hyperoperations 15 3.6 A quick look at the start of the Grzegorczyk hierarchy 17 3.7 Reconsidering top-down and bottom-up 18 IV Nopt Structures 20 4.1 Introduction to Nept and Nopt structures 20 4.2 Defining Nopts from Nepts 21 4.3 Seed Values: “n” and “theta ) n” 24 4.4 A method for generating Nopt structures 25 4.5 Magnitude inequalities inside Nopt structures 32 V Applying Nopt Structures 33 5.1 The gi-sequence and g-subscript towers 33 5.2 Nopt structures and Conway chained arrows 35 VI Glossary 39 VII Further Reading and Weblinks 42 2 i Acknowledgements I’d like to express my gratitude to Wikipedia for supplying an enormous range of high quality mathematics articles.
    [Show full text]
  • I Jornada De Investigación Sistemas.Pdf
    ISBN: 978-9942-9902-6-6 1 1 Copyright: Dirección de Investigación de la Pontificia Universidad Católica del Ecuador Sede Esmeraldas, prohibida la reproducción total o parcial de este libro por ningún medio impreso o electrónico sin el permiso previo y por escrito del dueño del copyright. PONTIFICIA UNIVERSIDAD CATÓLICA DEL ECUADOR SEDE ESMERALDAS Dirección: Espejo y subida a Santa Cruz Casilla: 08-01-0065 Teléfonos: +593 (06) 2721983 – 2721595 Email: [email protected] www.pucese.edu.ec ESMERALDAS - ECUADOR PUBLICACIÓN ELECTRÓNICA ISBN: 978-9942-9902-6-6 Los artículos incluidos en esta publicación fueron sometidos a procedimientos de admisión y revisión por pares, llevados a cabo por un comité científico nacional e internacional de alto nivel. 2 La simulación en ingeniería, transcendiendo fronteras Coordinador de la Carrera de Sistemas y Computación Víctor Xavier Quiñonez Ku Director de Investigación PUCE Esmeraldas Ignacio Carazo Ortega Comité Organizador Víctor Xavier Quiñonez Ku Jaime Paúl Sayago Heredia Luis Alberto Herrera Izquierdo Comité Editorial Pablo Antonio Pico Valencia, Universidad de Granada – España Evelin Lorena Flores García, Universidad de Almería – España Cesar Raúl García Jacas, Universidad Nacional Autónoma de México José Luis Sampietro Saquicela, Universidad de Barcelona – España Luis Dionicio Rosales Romero, Universidad de los Andes – Venezuela Juan Luis Casierra Cavada, Pontificia Universidad Católica del Ecuador Pedro Roberto Suarez Suri, Pontificia Universidad Católica del Ecuador Víctor Xavier Quiñonez
    [Show full text]
  • New Thinking About Math Infinity by Alister “Mike Smith” Wilson
    New thinking about math infinity by Alister “Mike Smith” Wilson (My understanding about some historical ideas in math infinity and my contributions to the subject) For basic hyperoperation awareness, try to work out 3^^3, 3^^^3, 3^^^^3 to get some intuition about the patterns I’ll be discussing below. Also, if you understand Graham’s number construction that can help as well. However, this paper is mostly philosophical. So far as I am aware I am the first to define Nopt structures. Maybe there are several reasons for this: (1) Recursive structures can be defined by computer programs, functional powers and related fast-growing hierarchies, recurrence relations and transfinite ordinal numbers. (2) There has up to now, been no call for a geometric representation of numbers related to the Ackermann numbers. The idea of Minimal Symbolic Notation and using MSN as a sequential abstract data type, each term derived from previous terms is a new idea. Summarising my work, I can outline some of the new ideas: (1) Mixed hyperoperation numbers form interesting pattern numbers. (2) I described a new method (butdj) for coloring Catalan number trees the butdj coloring method has standard tree-representation and an original block-diagram visualisation method. (3) I gave two, original, complicated formulae for the first couple of non-trivial terms of the well-known standard FGH (fast-growing hierarchy). (4) I gave a new method (CSD) for representing these kinds of complicated formulae and clarified some technical difficulties with the standard FGH with the help of CSD notation. (5) I discovered and described a “substitution paradox” that occurs in natural examples from the FGH, and an appropriate resolution to the paradox.
    [Show full text]
  • The Strange Properties of the Infinite Power Tower Arxiv:1908.05559V1
    The strange properties of the infinite power tower An \investigative math" approach for young students Luca Moroni∗ (August 2019) Nevertheless, the fact is that there is nothing as dreamy and poetic, nothing as radical, subversive, and psychedelic, as mathematics. Paul Lockhart { \A Mathematician's Lament" Abstract In this article we investigate some "unexpected" properties of the \Infinite Power Tower 1" function (or \Tetration with infinite height"): . .. xx y = f(x) = xx where the \tower" of exponentiations has an infinite height. Apart from following an initial personal curiosity, the material collected here is also intended as a potential guide for teachers of high-school/undergraduate students interested in planning an activity of \investigative mathematics in the classroom", where the knowledge is gained through the active, creative and cooperative use of diversified mathematical tools (and some ingenuity). The activity should possibly be carried on with a laboratorial style, with no preclusions on the paths chosen and undertaken by the students and with little or no information imparted from the teacher's desk. The teacher should then act just as a guide and a facilitator. The infinite power tower proves to be particularly well suited to this kind of learning activity, as the student will have to face a challenging function defined through a rather uncommon infinite recursive process. They'll then have to find the right strategies to get around the trickiness of this function and achieve some concrete results, without the help of pre-defined procedures. The mathematical requisites to follow this path are: functions, properties of exponentials and logarithms, sequences, limits and derivatives.
    [Show full text]
  • Symmetry in Classical and Fuzzy Algebraic Hypercompositional Structures • Irina Cristea Symmetry in Classical and Fuzzy Algebraic Hypercompositional Structures
    Symmetry Classical Algebraic Fuzzy in and Hypercompositional Structures Symmetry in Classical • Irina Cristea and Fuzzy Algebraic Hypercompositional Structures Edited by Irina Cristea Printed Edition of the Special Issue Published in Symmetry www.mdpi.com/journal/symmetry Symmetry in Classical and Fuzzy Algebraic Hypercompositional Structures Symmetry in Classical and Fuzzy Algebraic Hypercompositional Structures Special Issue Editor Irina Cristea MDPI • Basel • Beijing • Wuhan • Barcelona • Belgrade • Manchester • Tokyo • Cluj • Tianjin Special Issue Editor Irina Cristea Center for Information Technologies and Applied Mathematics, University of Nova Gorica Slovenia Editorial Office MDPI St. Alban-Anlage 66 4052 Basel, Switzerland This is a reprint of articles from the Special Issue published online in the open access journal Symmetry (ISSN 2073-8994) (available at: https://www.mdpi.com/journal/symmetry/special issues/Fuzzy Algebraic Hypercompositional Structures). For citation purposes, cite each article independently as indicated on the article page online and as indicated below: LastName, A.A.; LastName, B.B.; LastName, C.C. Article Title. Journal Name Year, Article Number, Page Range. ISBN 978-3-03928-708-6 (Pbk) ISBN 978-3-03928-709-3 (PDF) c 2020 by the authors. Articles in this book are Open Access and distributed under the Creative Commons Attribution (CC BY) license, which allows users to download, copy and build upon published articles, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. The book as a whole is distributed by MDPI under the terms and conditions of the Creative Commons license CC BY-NC-ND. Contents About the Special Issue Editor .....................................
    [Show full text]
  • The Path Hyperoperation
    DOI: 10.2478/auom-2014-0012 An. S¸t. Univ. Ovidius Constant¸a Vol. 22(1),2014, 141{153 The Path Hyperoperation Antonios Kalampakas, Stefanos Spartalis and Alexandros Tsigkas Abstract A new class of hypergroupoids, deriving from binary relations, is presented, via the introduced path hyperoperation. Its properties are investigated and its connections with Graph Theory are also delineated. Moreover, we present an application of this hyperoperation to assembly line designing and management. 1 Introduction Hypergroupoids deriving from binary relations, namely C-hypergroupoids where introduced by Corsini in [6], see also [16]-[19]. The correlation between hyperstructures and binary relations in general has been also investigated in [3]-[5], [7]-[9] and [11, 14]. In the present paper we further expand the ongoing research on hypergroupoids by generalizing the concept of C-hypergroupoids via the introduced path hyperoperation. More precisely, given a set V and a binary relation R ⊆ V × V the path hyperoperation R assigns to every pair (x; y) 2 V × V the set that consists of every element of V that belongs to at least one directed path from x to y. It is clear that this definition is a generalization of Corsini's hyperoperation and moreover, for any binary relation R ⊆ V × V and elements x; y 2 V , their Corsini product is always a subset of x R y. The connection of this notion with directed graphs is illustrated by proving that given a graph G = (V; R), Key Words: Hypergroupoids, Directed Graphs, Path Hyperoperation, Mixed Model Assembly Lines, Assembly Line Designing. 2010 Mathematics Subject Classification: Primary 05C20, 20N20; Secondary 05C40.
    [Show full text]
  • Ackermann Function 1 Ackermann Function
    Ackermann function 1 Ackermann function In computability theory, the Ackermann function, named after Wilhelm Ackermann, is one of the simplest and earliest-discovered examples of a total computable function that is not primitive recursive. All primitive recursive functions are total and computable, but the Ackermann function illustrates that not all total computable functions are primitive recursive. After Ackermann's publication[1] of his function (which had three nonnegative integer arguments), many authors modified it to suit various purposes, so that today "the Ackermann function" may refer to any of numerous variants of the original function. One common version, the two-argument Ackermann–Péter function, is defined as follows for nonnegative integers m and n: Its value grows rapidly, even for small inputs. For example A(4,2) is an integer of 19,729 decimal digits.[2] History In the late 1920s, the mathematicians Gabriel Sudan and Wilhelm Ackermann, students of David Hilbert, were studying the foundations of computation. Both Sudan and Ackermann are credited[3] with discovering total computable functions (termed simply "recursive" in some references) that are not primitive recursive. Sudan published the lesser-known Sudan function, then shortly afterwards and independently, in 1928, Ackermann published his function . Ackermann's three-argument function, , is defined such that for p = 0, 1, 2, it reproduces the basic operations of addition, multiplication, and exponentiation as and for p > 2 it extends these basic operations in a way
    [Show full text]
  • Tetration Analytics Engine
    Tetration Analytics - Network Analytics & Machine Learning Enhancing Data Center Security and Operations Mike Herbert, Principal Engineer, INSBU BRKDCN-2040 Session Abstract Huge amounts of data traverse network infrastructure on a daily basis. With the innovative big data analytics capabilities, it is possible to use rich network metrics to provide unprecedented insight into IT infrastructure. By leveraging pervasive low overhead sensors in both hardware and software, a complete view of application and network behavior can be attained in real time. In modern data center today some of the key operational and security challenges faced are understanding applications dependencies accurately, ability to generate consistent whitelist policy model and to ensure network policy compliance. This session will describe how Analytics uses unsupervised machine learning approach to collect hundreds of data points and, use advanced analytics, addresses these challenges in a scalable fashion. BRKDCN-2040 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 If this is not what you were hoping for here are some other Tetration Sessions • Tetration Analytics, the secret ingredient for every Data Center • Session ID: PSODCN-1800 • Cisco Tetration: Data Center Analytics Deployment and Use Cases • Session ID: BRKACI-2060 • Tetration API’s : • Session ID: DEVNET-2423 • Tetration Analytics - Industry's Powerful Analytics Platform • Session ID: LABACI-3020 • Inside Cisco IT: ACI & Tetration Analytics • Session ID: BRKCOC-2006 BRKDCN-2040 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Okay what does Tetration Mean? • Tetration (or hyper-4) is the next hyperoperation after exponentiation, and is defined as iterated exponentiation • It’s bigger than a Google [sic] (Googol) • And yes the developers are a bunch of mathematical geeks BRKDCN-2040 © 2017 Cisco and/or its affiliates.
    [Show full text]
  • Tetration Analytics - Network Analytics & Machine Learning Enhancing Data Center Security and Operations
    Tetration Analytics - Network Analytics & Machine Learning Enhancing Data Center Security and Operations Michael Herbert Principal Engineer INSBU BRKACI-2040 Okay what does Tetration Mean? • Tetration (or hyper-4) is the next hyperoperation after exponentiation, and is defined as iterated exponentiation • It’s bigger than a Google [sic] (Googol) • And yes the developers are a bunch of mathematical geeks BRKDCN-2040 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 What if you could actually look at every process and every data packet header that has ever traversed the network without sampling? BRKDCN-2040 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Tetration Analytics Pervasive Sensor Framework Provides correlation of data sources across entire application infrastructure Enables identification of point events and provides insight into overall systems behavior Monitors end-to-end lifecycle of application connectivity BRKDCN-2040 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Cisco Tetration Analytics Policy Discovery and Observation APPLICATION WORKSPACES Public Cloud Private Cloud Cisco Tetration Analytics™ Application Segmentation Policy © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public Profile and Context Driven Application Segmentation 1. Real-time Asset Tagging 2. Policy Workflows 3. Policy Enforcement (Role Based and Hierarchical) Cisco Tetration Application Insights (ADM) No Need to Tie Policy + to IP Address and Cisco Tetration Sensors Tag and Label-Based Add-on Policy Port (For Example, Mail Filters) Cisco Tetration Customer Defined Platform Performs the Translation Compliance Monitoring Enforcement Public Cloud Bare Metal Virtual Cisco ACITM* Traditional Network* © 2017 Cisco and/or its affiliates.
    [Show full text]