Professional Documents
Culture Documents
No part of this digital document may be reproduced, stored in a retrieval system or transmitted in any form or
by any means. The publisher has taken reasonable care in the preparation of this digital document, but makes no
expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No
liability is assumed for incidental or consequential damages in connection with or arising out of information
contained herein. This digital document is sold with the clear understanding that the publisher is not engaged in
rendering legal, medical or any other professional services.
PETER MILOSAV
AND
IRENE ERCEGOVACA
EDITORS
CONTENTS
Preface
vii
Chapter 1
On Numbers Nature
Dimitris Gavalas
Chapter 2
Chapter 3
67
87
Chapter 4
1
57
Chapter 5
115
Chapter 6
129
Chapter 7
Chapter 8
Reversible Logic
Alexis DeVos
Chapter 9
Index
179
203
243
261
PREFACE
A computational model is a mathematical structure which is constructed in an easy way
and is useful in performing certain computations on the structure. This book discusses how
the idea of "computational model" has been formalized by connecting the domain theory with
the theory of metric spaces and related topological spaces. The nature of number is also examined, from a synthetic, holistic and interdisciplinary point-of-view, which is mostly
mathematical but also encompasses respective psychological, neuro-physiological and philosophical views. Reversible logic circuits are discussed, which are beneficial to both classical and quantum computer design. Three experimental prototypes are used to illustrate how,
in the near future, reversible computers will outperform conventional computers, in terms of
power dissipation and heat generation. In quantum mechanics and field theory, Schroedinger
equation for a single particle in one-dimensional imaginary potential represents one of the
most popular schematic non-Hermitian models. Via a solvable square-well approximation
technique, this book examines the problems in both the coordinate and momentum representations. The optimization problem is also looked at, which in traditional designs, is stated in
precise mathematical terms but in real life, are stated in vague and linguistic terms.
Chapter 1 - This chapter deals with the question regarding the essential nature of number.
It is about ideas, which commence from the Pythagoreans and through the Platonists end to
the modern era. Here the authors meet on the one hand Cantor, Gdel and their descendents
and on the other Jung and his students. The distance, between the numbers well-known concept as cardinality and means of numbering and the one of dynamical psychic factor, which is
sustained in this article, is enormous.
What really happens with numbers issue? This question concerns us in a work, which
poses more problems than those that solves. In the present text, the authors goal is to investigate the nature of number from a synthetic, holistic, interdisciplinary aspect, which mostly
uses mathematical, but also the respective psychological, neuro-physiological and philosophical view. The spread of information also, which is taken as evidence of progress and knowledge, can be viewed as an effort to compensate and counterbalance the loss of the collective
memory and the natural wisdom. For this reason the recourse to ancient knowledge and to
modern research about the collective memory, that is the unconscious and its structural elements -Jungs archetypes-, is obligatory.
The structure of this chapter goes as follows: After the Introduction and Etymology of the
Concepts Number and Archetype it encompasses four parts.
viii
In Part I: Pythagoras and His Descendants on Number, the authors discuss Pythagoras
View about Number and His Vindication in Contemporary Mathematics.
In Part II: Number in Contemporary Mathematics, the authors present numbers concept
in relation to Standard Contemporary Mathematics, Logic, Category Theory, Philosophy,
Neurophysiological and Social Aspects, Fuzziness, and Non-standard View.
In Part III: Jung and the Concept of Archetype, the authors refer to subjects as Chthonic
and Celestial Mathematics, Jungs - Paulis General Hypothesis of Archetypes, Number as
Archetype, Jung and Cantor - Gdel, and Number and Jungs Psychology.
In Part IV: Number, Monoid and Archetype, the authors discuss the issues 2-categories;
Monad, Monoid, Monoidal Category, Monoid Object; The Dynamical System as Functor,
The Archetype of Number as Monoid and its Interpretation as the Set of Numbers, and A
Holistic View of Mathematics.
The chapter comes to an end with the Final View and the Epilogue.
Chapter 2 - As will be seen, the mathematical apparatus of the fuzzy theory of fuzzy sets
provides a natural basis for the theory of the possibility as well described [1]. Viewed in this
perspective, a fuzzy restriction may be interpreted as a possibility distribution with its membership function playing the role of possibility distribution function. This principle will be
described in this chapter.
Chapter 3 - This work proposes a new consensus scheme for group decision making,
which allows one to obtain a consistent collective opinion, from information provided by each
expert in terms of multigranular fuzzy estimates. It is based on a linguistic hierarchical model
with multigranular sets of linguistic terms, and the choice of the most suitable set is a prerogative of each expert. From the human viewpoint, using such model is advantageous, since
it permits each expert to utilize linguistic terms that reflect more adequately the uncertainty
level intrinsic to his evaluation. From the operational viewpoint, the advantage of using such
model lies in the fact that it allows one to express the linguistic information in a unique domain, without information losses, during the discussion process. Such consensus scheme is
applied in the analysis of a multicriteria decision problem, generated with the use of the Balanced Scorecard methodology for enterprise strategy planning. Three techniques for multicriteria analysis, based on fuzzy preference relation modeling, are considered. They permit the
evaluation, comparison, selection, prioritization, and/or ordering of alternatives with the use
of both quantitative and qualitative estimates. With the availability of different techniques, the
most appropriate one can be chosen, considering possible sources of information and its uncertainty.
Chapter 4 - This chapter applies combinatorial and group-theoretical relationships to the
study of periodicity in atomic and molecular spectroscopy. The relationship between combinatorics and both atomic and molecular energy levels must be intimate since the energy levels
arise from the combinatorics of the electronic or nuclear spin configurations or the rotational
or vibrational energy levels of molecules. Over the years the authors have done considerable
work on the use of combinatorial and group-theoretical methods for molecular spectroscopy.
The role of group theory is evident since the classification of electronic and molecular levels
has to be made according to the irreducible representations of the molecular symmetry group
of the molecule under consideration. Combinatorics plays a vital role in the enumeration of
electronic, nuclear, rotational and vibrational energy levels and wave functions. As can be
seen from other chapters in this book, the whole Periodic Table of the elements has a mathematical group-theoretical basis since the electronic shells have their origin in group theory.
Preface
ix
Indeed, this concept can even be generalized to other particles beyond electrons such as bosons or other fermions that exhibit more spin configurations than just the bi-spin orientations
of electrons.
Chapter 5 - The back and forth characterization of equivalence of interpretations for finitary (and some infinitary) second-order languages introduced in Weaver and Penev [2005] is
applied to obtain a condition necessary and sufficient for an attribute of an interpretation to be
definable in that interpretation by a second-order formula (either finitary or infinitary). This
condition is applied to obtain some "reduction" theorems for the second-order theories of
those infinite interpretations having pairing functions that are definable by two simple classes
of second-order formulas.
Chapter 6 Many applications of discrete mathematics for science, medicine, industry
and engineering are carried out using algebraic methods, such as group theory, polynomial
rings or finite fields.
This chapter is intended as a survey of the main algebraic topics used for developing
methods in ambit of combinatorial theory. Plya's enumeration method, Latin squares,
patterns design or block design are examples of this usage. Others applications can be seen in
Section 5, about foundation design, RNA patterns or octonions.
Chapter 7 - Network design and network synthesis have been the classical optimization
problems in telecommunication for a long time. In the recent past, there have been many
technological developments such as digitization of information, optical networks, Internet,
and wireless networks. These developments have led to a series of new optimization problems. In communication networks, a number of requirements can be identified. For instance,
the network operator requires a good earning capacity, and the network users require reliable
communication. The degree to which these and other requirements are fulfilled, can in many
cases be deduced from how the network resources are distributed. In contrast to the Public
Switched Telephony Network (PSTN), services offered in a data communication network
vary significantly in terms of the required bandwidth. This adds a new challenging dimension
into design of the networks, since inevitably, questions of fair medium sharing, quality guarantees, delays, etc. become crucial.
Different methods of obtaining fair resource sharing are derived and investigated, for example, Max-Min Fairness, Proportional Fairness, etc. The authors focus on fairness on backbone networks possessing certain desired fairness properties.
Chapter 8 - Reversible logic circuits are beneficial to both classical and quantum computer design. Present-day logic building-blocks (like OR gates and NAND gates) are logically
irreversible and therefore cannot be used for designing reversible computers. Thus reversible
computation needs an appropriate design methodology. In contrast to conventional digital
logic circuits, reversible logic circuits (of a same logic width w) form a mathematical group.
The reversible circuits of width w form a group isomorphic to the symmetric group S2w. Its
Young subgroups allow systematic and efficient synthesis of an arbitrary reversible circuit.
The author can choose a left coset, a right coset, or a double coset approach. The optimal design is reminiscent of the so-called banyan networks of telecommunication.
As an illustration, three experimental prototypes (in c-MOS chip technology) of reversible computing devices are presented. Special care has been taken to avoid as much as possible
the appearance of garbage bits. The examples illustrate how, in a near future, reversible com-
puters will outperform conventional computers, in terms of power dissipation and heat generation.
Chapter 9 - Schrdinger equation with imaginary PT symmetric potential V (x) = i x3 is
studied using the numerical discretization methods in both the coordinate and momentum
representations. In the former case our results confirm that the model generates an innite
number of bound states with real energies. In the latter case the dierential equation is of the
third order and a square-well, solvable approximation of kinetic energy is recommended and
discussed. One finds that in the strong-coupling limit, the exact PT symmetric solutions converge to their Hermitian predecessors.
Chapter 1
ON NUMBERS NATURE
Dimitris Gavalas*
Varvakeios Experimental School
Athens, Greece
ABSTRACT
This chapter deals with the question regarding the essential nature of number. It is
about ideas, which commence from the Pythagoreans and through the Platonists end to
the modern era. Here we meet on the one hand Cantor, Gdel and their descendents and
on the other Jung and his students. The distance, between the numbers well-known concept as cardinality and means of numbering and the one of dynamical psychic factor,
which is sustained in this article, is enormous.
What really happens with numbers issue? This question concerns us in a work,
which poses more problems than those that solves. In the present text, our goal is to investigate the nature of number from a synthetic, holistic, interdisciplinary aspect, which
mostly uses mathematical, but also the respective psychological, neuro-physiological and
philosophical view. The spread of information also, which is taken as evidence of progress and knowledge, can be viewed as an effort to compensate and counterbalance the
loss of the collective memory and the natural wisdom. For this reason the recourse to ancient knowledge and to modern research about the collective memory, that is the unconscious and its structural elements -Jungs archetypes-, is obligatory.
The structure of this chapter goes as follows: After the Introduction and Etymology
of the Concepts Number and Archetype it encompasses four parts.
* Folois 6
112 56 Athens, Greece
gavdim@otenet.gr
Dimitris Gavalas
In Part I: Pythagoras and His Descendants on Number, we discuss Pythagoras View
about Number and His Vindication in Contemporary Mathematics.
In Part II: Number in Contemporary Mathematics, we present numbers concept in
relation to Standard Contemporary Mathematics, Logic, Category Theory, Philosophy,
Neurophysiological and Social Aspects, Fuzziness, and Non-standard View.
In Part III: Jung and the Concept of Archetype, we refer to subjects as Chthonic
and Celestial Mathematics, Jungs - Paulis General Hypothesis of Archetypes, Number
as Archetype, Jung and Cantor - Gdel, and Number and Jungs Psychology.
In Part IV: Number, Monoid and Archetype, we discuss the issues 2-categories; Monad, Monoid, Monoidal Category, Monoid Object; The Dynamical System as Functor,
The Archetype of Number as Monoid and its Interpretation as the Set of Numbers, and A
Holistic View of Mathematics.
The chapter comes to an end with the Final View and the Epilogue.
INTRODUCTION
From a cognitive point of view, the reason to discuss the subject of number is the fundamental changes in its mental representation. Indeed, after the failure of the effort to limit
number in a frame of Logic -that is to limit it only to its logical aspect-, nowadays inside the
cognitive realm in order to have a complete image for it, is emerged the need to see it from all
of its aspects, logical and non-logical. Gdel set aside the Logic of Frege - Russell - Hilbert
and posed the matter of uncertainty for Mathematics, using its own means. Other mathematicians also, like Weyl, talk about the abysmal character of numbers. Afterwards, the introduction of methods of Fuzzy Logic and Non-standard Analysis leads to corresponding views
about number.
In a society, and especially in a scientific community, where is considered officially that
the dominating function is the rational thinking, even though this is just a myth, a little attention is paid to the other side of things. Jung stresses that no matter how much beautiful and
perfect finds man his logic, this is just one of his psychological functions and man is covered
only by one side. From all the other sides though, man is surrounded by the irrational, the
collective, the unconscious, the chance. Therefore, next to the rational exists the irrational and
in much more proportion. When logic and the time linear sequence of events stops being applied, then our rationalism does not function anymore and in order to understand what is happening we need other functions and methods.
On Numbers Nature
number which moves itself (Heinze, 1965, Fragm. 61). Aristotle explains that because psyche is both kinetic and knowing, so somebody united these two and said that psyche is number which moves itself (De an.).
In L. we have the words numero (verb), numerus (noun), from which comes the word
number (verb and noun): The sum, total, count, or aggregate of a collection of units, or the
like. Both, Gk. and L words are related to rhythm. In Mathematics and Science number is a
basic concept, and a mode of thought: Number is the basis of science.
Also, the term (archetype) means: Original pattern from which copies are
made, from L. archetypum, which comes from Gk. archetypon pattern, model, firstmoulded from arche- first + typos model, type, blow, mark of a blow. So, from the Gk.
for original pattern, archetype is a basic model from which copies are made; therefore a prototype. In general terms, the abstract idea of a class of things which represents the most typical and essential characteristics shared by the class, thus a paradigm or exemplar. Jungian
psychology speeks about pervasive idea or image from the collective unconscious.
Pythagoras considers that number lies behind all things and facts, beginning from musical
harmony and finishing to the planets orbits. This aspect leads him to the belief that everything
is number. Iamblichus (1922; Waterfield, 1988a, 1988b) writes about the Pythagorean view
on number. According to him, the Pythagorean philosophy bases mostly on the mathematical
semantics of numbers and their relationships. The study of number entails not only the material phenomena but mostly the spiritual and mental aspects, the symbolic meaning of each
separate number as well as its mystical properties. All these views about number do not limit
to the relationships of the material phenomena, instead number has mental, cosmological, and
ethical applications. This means that the Pythagorean entailment on number is not just a
mathematical science according to the modern view, but study of the hidden wisdom of number, which contains truths that are being taught on the initiatory rites of antiquity.
In Metaphysics Aristotle describes the teaching of Pythagoreans: They thought they
found in numbers, many resemblances to things which are and become; thus such and
such an attribute of numbers is justice, another is soul and mind, another is opportunity,
and so on; and again they saw in numbers the attributes and ratios of the musical scales.
Since, then, all other things seemed in their whole nature to be assimilated to numbers,
while numbers seemed to be the first things in the whole of nature, they supposed the
elements of numbers to be the elements of all things, and the whole heaven to be a musical scale and a number.
According to O Meara (1990), the Pythagorean idea that number is the key to
understanding reality inspired Neoplatonist philosophers in Late Antiquity to develop theories
in Physics and Metaphysics based on mathematical models. He examines this theme,
describing first the Pythagorean interests of Platonists in the second and third centuries and
Dimitris Gavalas
then Iamblichuss program to Pythagoreanize Platonism in the fourth century in his work On
Pythagoreanism -whose unity of conception is shown and parts of which are reconstructed for
the first time. The impact of Iamblichuss program is examined as regards Hierocles of
Alexandria and Syrianus and Proclus in Athens: Their conceptions of the figure of Pythagoras
and of Mathematics and its relation to Physics and Metaphysics are examined and compared
with those of Iamblichus. This provides insight into Iamblichuss contribution to the
evolution of Neoplatonism, to the revival of interest in Mathematics, and to the development
of a philosophy of Mathematics and a mathematizing Physics and Metaphysics.
So, for Philolaus the nature of number is gnomonical, magisterial and pedagogical: If
one focuses and reflects on number as symbol, then one can realize concepts that lie beyond
the limits of the usual human consciousness. According to Aristotle, the Pythagoreans sustain
that entities pattern upon number. Syrianus also characterizes number as eidetic, that is its
meaning is demonstrative of the kind, the quality and not only the quantity of the things and
entities.
Proclus helps us to realize the relationship between number and the rest Pythagorean philosophy. By his sayings it is clear that the mystical meaning of number is closely related to
the Pythagorean mystical revelation. This meaning is revealed to the initiates at rites, where
the relations and lows that refer to the divine aspect of number for the principles and things
are being explained to them. Many writers of the antiquity compare the Pythagorean meaning
of number with that of Orpheus who seems to be the first that introduces this mystical theory.
Syrianus says that the Pythagoreans accepted the theory about number from the Orphics.
They also extended it up to the sensual material phenomena beginning from the spiritual and
the mental aspects.
For the non-sensual that is the spiritual, mental, mystical and esoteric meaning of number, we have many fragments from the writers of antiquity. However, a complete and systematic study is not rescued nowadays except the one attributed to Iamblichus. In his work the
mathematical properties of the first ten natural numbers are developed and are referred the
many appellative names for each one of them. Both from the mathematical properties and
from the appellative names we can figure out the way and the spirit under which the Pythagoreans dealt with number. We can also compare this spirit with the modern approach and ask
ourselves, whether except from ours is there another one lost and forgotten spirit, which is
the other side of the coin that must co-exist with the current one.
Therefore, for the Pythagoreans, number is the structural element both for the material
world and for the soul and pre-existed of them and indeed the world and the soul were created
in pattern upon the number. The Pythagoreans deepen in the numbers concept, considering
that the numbers principles are all entities principles. The natural elements are inadequate for
the worlds interpretation; in contrary to the number that contains mental power. The elements consisting number are also all entities elements and the heaven is governed by
harmony and number. With Pythagoras a new multi-leveled world is created, since the sensual is reduced to the conceptual, while the conceptual in its turn is reduced to the ideal. This
view is further developed by Plato.
With the Pythagoreans, number acquires transcendental power, since by its existence derive and become thinkable the physical magnitudes. In Plato also, number tends to replace
idea. Indeed, Plato is inducted to the Hen (One) and he approaches the idea to the number,
reducing the many to the One. So, if the worlds nature is mathematical according to Pythago-
On Numbers Nature
ras and Plato, this happens in virtue of number mental power, which ensures ontological validity. Number is the highest degree of knowledge; it is knowledge itself, Plato says.
Dimitris Gavalas
was vindicated and is expressed by Kronecker as follows: God has made the naturals, all the
rest is mans project. Their divine nature makes them so simple, but their deepest substance
always escapes from us.
On Numbers Nature
exactly one isomorphism between them that is all systems of natural numbers are isomorphic
by twos. Thus we determine a particular system <, 0, s> of natural numbers, the members of
which are called natural numbers. A choice for this system could be the following: N={,
{}, {{}}, } and s: n s(n)={n}. Another choice is ={0, 1, 2, 3, } and s(n)=n+1,
that is to accept that there is indeed the set of true natural numbers, where each of them is
not a set but a number, and the successor is not the function s: n s(n)={n} but the function
which correlates to every number n its successor n+1. The classical theory of Zermelo, allows
for instance such non-sets -as the true natural numbers- as urelements and it only insists on
the premise that the system of the natural numbers must satisfy Peanos axioms. Therefore,
we construct the natural numbers beginning with 0 or and infinitely repeating the operation
of the successor.
To summarize: The natural numbers start out from elementary operations of counting,
listing and comparing. They then develop into effective tools for calculation. The rules for
calculation are formal and can be organized as the consequences of simple systems of postulates. The consequences of these postulates include the remarkably varied and rich properties
studied in Number Theory, properties by no means apparent in the original processes of
counting and listing. (Mac Lane, 1986)
From a philosophical point of view, the common aspect of mathematicians and philosophers of science was, and up to a point still is, that it is really feasible to construct the set of
natural numbers from nothing and only with Logic. But all the relevant efforts lean against
the fallacious General Principle of Inclusion and lead to contradictions. Logic, by its nature,
seems that cannot prove the existence of anything, which means that it cannot have ontological demands. This is a critical point for the continuation of our aspects. Since it is not Logic,
and the resulting typical theories that lead to the answer about numbers existence, then which
is?
Dimitris Gavalas
bers of L and R are numbers, and every member of R is greater than or equal to every member of L. The and the arithmetical operations are also defined in a natural recursive manner. The construction generates virtually all the numbers, including infinitesimals, but excluding the complex numbers and if cardinals are to be identified with initial ordinals, a nonuniform definition of arithmetical operations is necessary. Moreover, the construction generates many novel numbers, for example, numbers obtained by applying the full range of realnumber operations to infinite numbers, which make no sense on the usual understanding.
Moreover, a simple generalization of the construction -dropping the ordering condition on L
and R-, produces even more number-like objects.
Just conceivably, a unifying account of number might eventually be found, but in the
meantime the emergence of new kinds of numbers seems likely. There are non-standard inconsistent models of Arithmetic which contain inconsistent numbers -natural numbers with
inconsistent properties. These have some notable applications; for example, some of them can
be shown to provide solutions for arbitrary sets of simultaneous linear equations. Just as the
existence of non-standard models of Analysis made infinitesimals legitimate, so might these
legitimize the notion of an inconsistent number.
Besides, there are three points of particular importance:
(i) The proof by Gdel in 1931 that the Peano axioms, and all other consistent axiom
systems for Arithmetic, are incomplete, in the sense that there are truths of Arithmetic that cannot be proved from the axioms -at least if the underlying Logic is firstorder (Gdels Theorems). The axioms are complete if the underlying Logic is second-order and the Induction Principle is formulated as a second-order axiom and not
just a first-order schema; but second-order Logic is not itself axiomatizable. This
raises profound questions about the nature of both numbers and our knowledge about
them.
(ii) The paradoxes surrounding transfinite numbers. The dominant view is that they are
embedded in ZF Set Theory. According to this, there is no totality of all ordinals, all
sets or other large collections, and so the question of their size does not arise. Although this account provides enough Set Theory for most Mathematics -though not
all: Category Theory appears to require large sets of just this kind-, it can hardly be
said to be conceptually adequate. Standard Logic, for example, defines the sense of a
quantifier in terms of the domain (totality) over which it ranges. It is therefore unclear what the sense of the quantifiers of ZF is, if, as it claims, there is no such totality.
(iii) Robinsons Non-standard Analysis. As was proved by Lwenheim-Skolem, firstorder theories of number have non-standard models. In particular, any theory of the
reals has such models. Robinson shows that in all of these models, there are non-zero
numbers that are smaller than any real number: Infinitesimals. Using these, he demonstrates that the reasoning of the Infinitesimal Calculus -which is much more intuitive than limit reasoning-, can be interpreted in a perfectly consistent manner. Hence,
infinitesimals have been rehabilitated as perfectly good numbers (Priest, 1998).
It is regarded that natural numbers should obey the Induction Principle, but this exhibits a
form of circularity known as impredicativity: The statement of the principle involves quantification over properties of numbers, but to understand this quantification we must assume a
On Numbers Nature
prior grasp of the number concept, which it was our intention to define. It is nowadays a
commonplace to draw a distinction between impredicative definitions and impredicative
specifications: The first are illegitimate, while the second are not. The conclusion in this case
is that the Induction Principle on its own does not provide a non-circular route to an understanding of the natural number concept. It is therefore needed an independent argument. Five
main strategies have been attempted, which are the well known: Intuitionism, Platonism,
Formalism, Logicism, and Empiricism.
10
Dimitris Gavalas
peals to a mental process (abstraction) that many have found mysterious. Benacerrafs way that Arithmetic should be seen as the study not of one particular model of Peanos axioms but
of the structure which all such models have in common- is in danger of relapsing into the
axiomatic formalism.
The well-known Russells paradox suggests to Dummett (1991) that the concept set is
what he calls indefinitely extensible. This means that any attempt to regard the objects falling under the concept as forming a definite totality leads inevitably to the realization that
there are other objects not in the totality which we are nevertheless forced to admit as falling
under the concept. Dummett holds that the presence of indefinitely extensible concepts is a
characteristic feature of Mathematics which should lead us to espouse for it the anti-realism
which his more general meaning-theoretic arguments make room for. He recommends that we
abandon the law of the excluded middle and espouse the Mathematics of Intuitionism but not
Brouwers solipsistic conception of its objects. Dummett thinks that in this way we can retain
Freges logicist insight that numbers are abstract objects truths about which embody deductive subroutines whose application to the world is validated by Logic alone. Just as Brouwers
Intuitionism has been accused of an instability which reduces it to strict Finitism, not everyone is persuaded that Dummetts position does not collapse into the ultra-intuitionism of middle-period Wittgenstein, according to which the meaning of an arithmetical generalization is
identical with its proof. On this view Goldbachs conjecture does not in the present state of
knowledge have any meaning at all. About Freges work one can see the following contemporary studies: Boolos, 1986, 1987; Heck, 1993; Maddy, 1992; Zalta, 1998, 1999.
Benacerraf (1965), on the other hand, discusses the classical problem for set-theoretic
foundations -that Arithmetic has no unique set-theoretic representation- on the line of thought
of Dedekinds (1888/ 1963), Hilberts (1900), Weyls (1927/ 1949) and Bernays (1950/
1976). This argument was influential in shaping later work. It is the inspiration of the position
known as Structuralism -the view that mathematical objects are essentially positions in structures and have no important additional internal composition or nature (Resnik, 1981, 1982;
Shapiro, 1983, 1989).
The version of questions with regard to numbers, which is discussed more often in the
modern philosophical bibliography, emanates from this work of Benacerrafs. The essay of
Benacerrafs does not aspire it explains what precisely the numbers are, but is focused on exposing the limits of various opinions on numbers, explaining what they are not. Concretely,
Benacerraf concludes that numbers are not sets, as most mathematicians believe. In the end in
any case, where he presents his own opinion for the question, he adopts the aspect that numbers do not exist at all. With this view, for which he offers some justification, avoids the difficulties of various theories for the numbers. Moreover, this view is mathematical acceptable,
after the Mathematics do not require to be the numbers certain concrete objects, but simply
some structure exists. It is possible for one to conclude that, after the numbers are a clean
mathematical affair, then the opinion that these do not exist as separate entities it should be
also philosophically acceptable. (Potter, 1998; Heijenoort, 1967).
On Numbers Nature
11
12
Dimitris Gavalas
On Numbers Nature
13
bolic numerical processing -e.g., similar distance effects in accuracy and reaction-time for
arrays of dots and Arabic numerals. However, neuroimaging studies have remained inconclusive on the neural basis of this link. The IPS is known to respond selectively to symbolic numerical stimuli such as Arabic numerals. Recent studies, however, have arrived at conflicting
conclusions regarding the role of the IPS in processing non-symbolic, numerosity arrays in
adulthood, and very little is known about the brain basis of numerical processing early in development. Addressing the question of whether there is an early-developing neural basis for
abstract numerical processing is essential for understanding the cognitive origins of our
uniquely human capacity for math and science. Using functional Magnetic Resonance Imaging (fMRI) at 4-Tesla and an event-related fMRI adaptation paradigm, the researchers found
that adults showed a greater IPS response to visual arrays that deviated from standard stimuli
in their number of elements, than to stimuli that deviated in local element shape. These results
support previous claims that there is a neurophysiological link between non-symbolic and
symbolic numerical processing in adulthood. In parallel, they tested 4 years-old children with
the same fMRI adaptation paradigm as adults to determine whether the neural locus of nonsymbolic numerical activity in adults shows continuity in function over development. They
found that the IPS responded to numerical deviants similarly in 4 years-old children and
adults. To our knowledge, this is the first evidence that the neural locus of adult numerical
cognition takes form early in development, prior to sophisticated symbolic numerical experience. More broadly, this is also, to our knowledge, the first cognitive fMRI study to test
healthy children as young as 4 years-old, providing new insights into the neurophysiology of
human cognitive development.
Finally, according to Lakoff & Nez (2000), the only mathematical ideas that human
beings can have are ideas that the human brain allows. We know a lot about what human
ideas are like from research in Cognitive Science. Most ideas are unconscious, and that is no
less true of the mathematical ones. Abstract ideas, for the most part, arise via conceptual
metaphor -a mechanism for projecting embodied that is, sensory-motor reasoning to abstract
reasoning. They argue that conceptual metaphor plays a central, defining role in mathematical
ideas within the cognitive unconscious -from Arithmetic and Algebra to sets and Logic to
infinity in all of its forms: transfinite numbers, points at infinity, infinitesimals, and so on.
Even the real numbers, the imaginary numbers, Trigonometry, and Calculus are based on
metaphorical ideas coming out of the way we function in the everyday physical world. This
work is about mathematical ideas, about what Mathematics means -and why. The authors
believe that understanding the metaphors implicit in Mathematics will make Mathematics
make more sense. Moreover, understanding mathematical ideas and how they arise from our
bodies and brains will make it clear that the brains Mathematics is Mathematics, the only
Mathematics we know or can know.
Let us see now another aspect: For Hersh, Mathematics has existence or reality only as
part of human culture. Despite its seeming timelessness and infallibility, it is a social - cultural - historic phenomenon. The questions he posses -What are numbers? What are infinite
sets? What is the meaning and nature of Mathematics?- are answered in this framework: It is
neither physical nor mental, it is social; it is part of culture and of history. It is like law, like
religion, like all those other things which are very real, but only as part of collective human
consciousness.
To the question What kind of a thing is a number? Hersh says that we can think of two
basic answers -either it is out there some place, like material objects; or it is inside, a thought
14
Dimitris Gavalas
in somebodys mind. Philosophers have defended one or the other of those two answers,
which are both completely wrong. A number is not a thing out there; there is not any place
that it is, or any thing that it is. Neither is it just a thought, because after all, two and two is
four, whether you know it or not. Frege, made quite an issue of the fact that mathematicians
didnt know the meaning of One. What is One? Nobody could answer coherently. Of course
Frege answered, but his answer was no better, or even worse, than the previous ones; and so it
has continued to this very day, strange and incredible as it is. We know all about so much
Mathematics, but we dont know what it really is. Of course when we say, What is a number? it applies just as well to a triangle, or a circle, or a differentiable function, or a selfadjoint operator. We know a lot about it, but what is it? What kind of a thing is it?
When we say that a mathematical thing, object, entity, is completely external, independent of human thought or action, or else internal, a thought in our mind -we are not just saying
something about numbers, but about existence- that there are only two kinds of existence.
Everything is either internal or external; and given that choice, that polarity or dichotomy,
numbers do not fit -thats why it is a puzzle. The question is made difficult by a false presupposition, that there are only two kinds of things around. But if we are real, and ask what there
is around, for instance there is the traffic ticket we have to pay, there is the news on the TV,
etc. -none of these things are just thoughts in our mind, and none of them is external to human
thought or activity. They are a different kind of reality, thats the trouble. This kind of reality
has been excluded from Metaphysics and Ontology, even though it is well-known -the sciences of Anthropology and Sociology deal with it. But when we become philosophical,
somehow this third answer is overlooked or rejected.
Mathematics is neither physical nor mental, it is social, part of culture, part of history,
and it is like all those real things which are real only as part of collective human consciousness. Being part of society and culture, it is both internal and external: Internal to society and
culture as a whole, external to the individual, who has to learn it from books in school. That is
what Mathematics is. But for some Platonic mathematicians, that proposition is so outrageous
that it takes a lot of effort even to begin to consider it.
Hersh calls it humanistic philosophy of Mathematics. He uses the term humanism because it is saying that Mathematics is something human. There is no Mathematics without
people. Many people think that numbers are there whether or not any people know about
them; this is confusion. Humanistic philosophy of Mathematics faces Mathematics as part
of human culture and history. This philosophy lands Mathematics, makes it psychologically
accessible and increases the possibility for someone to learn it, because it is exactly one of the
things people do. He names his view social conceptualism too, because Mathematics consists of concepts, but not individually held concepts; socially held concepts. This view sounds
like an anthropic principle of Mathematics.
One can say There are nine planets; there were nine planets before there were any people. That means there was the number nine, before we had any people. We do see mathematical things, like small numbers, in physical reality; and that seems to contradict the idea
that numbers are social entities. We use number words in two different ways: as nouns and
adjectives. This is an important observation. We say nine apples, nine is an adjective. If it is
an objective fact that there are nine apples on the table, that is just as objective as the fact that
the apples are red, or that they are ripe, or anything else about them, that is a fact. And there is
really no special difficulty about that. Things become difficult when we switch unconsciously, and carelessly, between this real-world adjective interpretation of mathematical
On Numbers Nature
15
words like nine, and the pure abstraction. That is not really the same nine. Although there is
of course a correlation and a connection. But the number nine as an abstract object, as part of
a number system, is a human possession, a human creation; it does not exist without us. The
possible existence of collections of nine objects is a physical thing, which certainly exists
without us. The two kinds of nine are different. Like we can say a plate is round, an objective
fact, but the conception of roundness, mathematical roundness, is something else (Hersh,
1997).
According to Ernest (1995), the Philosophy of Mathematics is in the middle of a Kuhnian
revolution. For over two thousand years, Mathematics has been dominated by an absolutist
paradigm, which views it as a body of infallible and objective truth, far removed from the
affairs and values of humanity. Currently, this is being challenged by a growing number of
philosophers and mathematicians, including Lakatos, Davis and Hersh, Tymoczko. Instead,
they are affirming that Mathematics is fallible, changing and, like any other body of knowledge, the product of human inventiveness.
How Mathematics is viewed is significant on many levels, but nowhere more so than in
education and society. For if Mathematics is a body of infallible, objective knowledge then it
can bear no social responsibility. Thus, the underparticipation of sectors of the population,
such as women; the sense of cultural alienation from Mathematics felt by many groups of
students; the relationship of Mathematics to human affairs, such as the transmission of social
and political values; its role in the distribution of wealth and power; none of these issues are
relevant to Mathematics.
On the other hand, if it is acknowledged that Mathematics is a fallible social construct,
then it is a process of inquiry and coming to know, a continually expanding field of human
creation and invention, not a finished product. Such a dynamic view of Mathematics needs to
include the empowerment of learners to create their own mathematical knowledge; Mathematics can be reshaped, at least in school, to give all groups more access to its concepts, and
to the wealth and power its knowledge brings; the social contexts of the uses and practices of
Mathematics can no longer be legitimately pushed aside, the implicit values of Mathematics
need to be squarely faced. When Mathematics is seen in this way, it needs to be studied in
living contexts which are meaningful and relevant to the learners, including their languages,
cultures and everyday lives, as well as their school based experiences. This view of Mathematics provides a rationale, as well as a foundation, for multicultural and girl-friendly approaches to Mathematics. Overall, Mathematics becomes responsible for its uses and consequences in education and society.
Next Dehaene wonders What is a number? Dehaene, as a neurophysiologist studying
how the human brain wires itself to do Mathematics, answers that number is a parameter of
our physical environment which is extracted and processed by dedicated cerebral networks just like color, which is a subjective property entirely made up by brain area V4. Indeed, he
shows how animals and infants have a largely innate intuition about numerical quantities and
their properties. Recent experimental evidence suggests that: (i) The human baby is born with
innate mechanisms for individuating objects and for extracting the numerosity of small sets.
(ii) This number sense is also present in animals, and hence that it is independent of language and has a long evolutionary past. (iii) In children, numerical estimation, comparison,
counting, simple addition and subtraction all emerge spontaneously without much explicit
instruction. (iv) The inferior parietal region of both cerebral hemispheres hosts neuronal circuits dedicated to the mental manipulation of numerical quantities, and that a lesion to that
16
Dimitris Gavalas
area leads to a loss of number sense, including not knowing what is 3-1, or what number
falls between 2 and 4. This inner feeling of quantity serves as a foundation for the later construction of number through mathematical axiomatizations. Yet as a basic category of experience provided by a dedicated brain circuit, number is as undefinable as color, space,
movement, happiness, or beauty.
Dehaene agrees with Hersh that Platonism -the view that mathematical facts are abstract
and independent of human existence and knowledge- is not a tenable position. His neurobiological interpretation is that Platonism is a cognitive illusion that imposes itself upon so many
great mathematicians because with training, their brains develop a vivid, seemingly real, internal image of mathematical objects. Presumably, one can only become a mathematical genius if one has an outstanding capacity for forming vivid mental representations of abstract
mathematical concepts -mental images that soon turn into an illusion, eclipsing the human
origins of mathematical objects and endowing them with the semblance of an independent
existence.
Mathematics is indeed a product of the human mind and brain, and as such it is indeed a
very human enterprise, fallible, revisable, and highly dependent on the limits and abilities of
our cerebral equipment. Does that mean, however, that mathematics is a purely social activity? The trouble with labelling Mathematics as social or humanistic, and with comparing it
to art and religion, is that this view completely fails to capture what is so special about
Mathematics -first, its universality, and second, its effectiveness.
A mathematician can go to any place in the world and, given enough time, can convince
anyone about mathematical truths -3 is a prime number, or that the 3rd decimal of Pi is a 1 or
that Fermats Last Theorem is true. The point is universal agreement is often easily reached
about what constitutes a mathematical fact. This makes an unqualified relativistic, social,
Lakatosian, or post-modernist view of Mathematics totally untenable. Relativists notwithstanding, the value of Pi does not vary from culture to culture, nor does each culture have its
own different mathematical universality, which is one and only.
The other key difference between Mathematics and other cultural objects is its effectiveness. This was, and still is, a subject of awe and wonder for physicists like Wigner and Einstein. How is it possible that mathematics, a product of human thought that is independent of
experience, fits so excellently the objects of physical reality? Einstein asked in 1921. This is
bound to remain forever a mystery as long as you adhere to a strong relativistic position,
which asserts that Mathematics is the result of the arbitrary cultural choices of mathematical
churches. For that matter, indeed, the effectiveness of Mathematics is also not easy to explain if you believe, as Hersh seems to do, that mathematicians pursue their work for the sole
purpose of its abstract beauty.
Dehaenes solution to both of these riddles appeals to evolution -of the brain and of
Mathematics. In his opinion, mathematical objects are universal and effective, first, because
our biological brains have evolved to progressive internalize universal regularities of the external world -such as the fact that one object plus another object usually makes two objects,
and second, because our cultural mathematical constructions have also evolved to fit the
physical world. If mathematicians throughout the world converge on the same set of mathematical truths, it is because they all have a similar cerebral organization that: (i) Lets them
categorize the world into similar objects -numbers, sets, functions, projections, etc. (ii) Forces
to find over and over again the same solutions to the same problems. One can remind of the
On Numbers Nature
17
18
Dimitris Gavalas
been selected for their usefulness in solving real world problems, for instance in
Physics. Hence, many of our current mathematical tools are well adapted to the outside world, precisely because they were selected as a function of this fit.
Many mathematicians are Platonists. They think that the Universe is made of mathematical stuff, and that the job of mathematicians is merely to discover it. Dehaene strongly denies
this point of view. This does not mean, however, that he is a social constructivist. On the
contrary he believes that mathematical constructions transcend specific human cultures. In his
view, however, this is because all human cultures have the same brain architecture that resonates to the same mathematical tunes. The value of Pi does not change with culture. Furthermore, he is in no way denying that the external world provides a lot of structure, which
gets incorporated into our Mathematics. He only objects to calling the structure of the Universe mathematical. We develop mathematical models of the world, but these are only models, and they are never fully adequate. Planets do not move in ellipses -elliptic trajectories are
a good, but far from perfect approximation. Matter is not made of atoms, electrons, or quarks
-all these are good models, indeed, very good ones-, but ones that are bound to require revision some day. A lot of conceptual difficulties could be clarified if mathematicians and theoretical physicists paid more attention to the basic distinction between model and reality, a
concept familiar to biologists (Dehaene, 1997c).
Finally, according to Cybernetics, number is a conceptual scheme, an abstraction of the
second level from specific numbers. The abstraction procedure to recognize specific numbers
is counting. Counting is based on the ability to divide the surrounding world up into distinct
objects. This ability emerged quite far back in the course of evolution; the vertebrates appear
to have it in the same degree as humans do. The use of specific numbers is a natural integrated description complementary to the differential description by recognizing distinct objects. This ability would certainly be advantageous for higher animals in the struggle for existence. And cybernetic apparatus for counting could be very simple -incomparably simpler
than for recognition of separate objects in pictures.
Yet nature, for some reason, did not give our brain this ability. The numbers we can directly recognize are small, up to five or six at best -though it can be somewhat extended by
training. Thus the number 2 is a neuronal concept, but 20 and 200 are not. We can use them
only through counting, creating artificial representations in the material external to the brain.
The material may be, and was historically, fingers and toes, then pebbles, notches etc., and
finally sophisticated signs on paper and electronic states of computer circuitry. For theoretical
purposes the best is still the ancient-style representation where a chosen symbol, say 'I' stands
for one object. Thus 2 is 'II', and 5 is 'IIIII' (Principia Cybernetica).
From the above report, it is obvious that there is a vivid developing research concerning
the neurological and social basis of the human mathematical ability. It is also obvious that this
research has not yet arrived at definite conclusions. When this happens we will be able to explain in detail both how the human brain and society process the mathematical and especially
numerical notions and magnitudes.
On Numbers Nature
19
gf
g
Z.
This is a first definition of a category.
X f
(2).
X
The object N is then called a natural numbers object (N.N.O.) for E. For such a N.N.O. N
the definition states that the diagram (1) is universal among diagrams of the form 1 x X
f X. It readily follows that N, together with the arrows 0 and s, is unique up to isomorphism. We can thus speak of the N.N.O. of a Topos E, if there is one. In Set the usual set of
all natural numbers N={0, 1, 2, } has the required universal property for a N.N.O. as in (2),
where the arrow 0 sends the one element of 1={0} to 0N, while s is the usual successor
function n n+1. Given a set X, an element xX and a function f: X X, the arrow h
uniquely provided by (2) thus satisfies h(0)=x, h(n+1)=f(h(n)) (3). In other words, h is de-
20
Dimitris Gavalas
fined from x and f by recursion or as one often says by induction. (Mac Lane, 1986; Mac
Lane & Moerdijk, 1992).
7.3. Natural Numbers Object in ETCS (Elementary Theory of the Category of Sets)
Since Dedekind raised the issue for modern Mathematics, some claim that mathematical
objects should have only relevant properties. So, natural numbers should have only arithmetic
properties. Every ZF set has non-arithmetic properties given by its particular elements. So, on
this view numbers cannot be ZF sets. But ETCS models of Arithmetic have no irrelevant
properties. So, this view could say the numbers form an ETCS set (Benacerraf, 1965).
Specifically, recursion data on a set X means an element x of X and a function f: X
X. We define a natural number object to be a set N with recursion data 0 and s: N N,
called zero and successor, such that: For any recursion data x, f on any X there is a unique
function h: N X with h(0) = x, h(sn) = f(h(n)), for all nN. Provably in ETCS there are
infinitely many different natural number objects, but all are isomorphic. None has any properties but the shared ones which follow from the definition (McLarty, 1994). Benacerraf and
McLarty show the structuralism of ETCS.
We paint the first card white using a specific quantity of white color. Next, we add a tiny
bit of black color, so as we cannot discern, with our observing abilities, cards 1 and 2 in relation to color. We continue in this way until we have a completely black card and we continue
to paint in black all the following cards. Hence, the predicate standard determines the white
cards that are literally the cards which site before the completely black card, which in their
turn can mean our familiarization with the corresponding natural numbers. Therefore, when
we say standard natural we mean here white number and when we say non-standard natural we mean black number and non-accessible. We must underline here that there is not
maximum white card neither minimum black card. We can consider also that standard
natural means graduated finite white number and non-standard natural means graduated
On Numbers Nature
21
infinite black number. So the natural numbers can be presented as a tape where the white
color becomes gradually black:
standard
non-standard
4 ...
n ...
fuzzy borders
22
Dimitris Gavalas
set, say, ZERO and no other number belongs to it. Every number is either in the ZERO set or
out of it; all or none. In this set sense the number zero alone belongs to the set ZERO. But
what about numbers close to, almost, nearly zero? These numbers are fuzzy numbers, they
define a spectrum of numbers near zero and some belong more in the set than others. The
closer a small number to zero is, the more it belongs to the fuzzy set of small numbers. The
number 1 is closer to 0 than the number 2 is, and 2 is closer than 3 is, and so on. The number
0 belongs 100% to the set ZERO but close numbers may belong only 80% or 50% or 10%.
We might draw the fuzzy number zero as a triangle centered at the exact number 0.
If we draw the triangle narrow enough, we get back the spike of classical Mathematics.
That is another surprise: Mathematics as we know it is but a special case of fuzzy Mathematics, a special limiting case -the degenerate case of black-and-white extremes in a mathematical world of grays. We can add and subtract triangles just as we add and subtract spikes/
numbers. We can also draw the fuzzy number ZERO in infinitely many ways; each one can
draw it differently just as each one thinks differently of HOUSE, SMALL, SMART, FAIR, NICE or
CLEAN. There are as many ways to draw the fuzzy number ZERO as there are numbers.
Exact/ Non-fuzzy Number Zero (0) and Inexact/ Fuzzy Number Zero (-2, 0, 2).
What can we do with fuzzy numbers? We can reason with them; we do it all the time.
Fuzzy Logic means reasoning with fuzzy numbers and sets. The knowledge or intelligence
comes from associating fuzzy events of everyday. For now we have proved the point: Numbers are fuzzy too. We work with fuzzy numbers all the time and, if numbers are fuzzy, then
everything is and indeed is.
So, according to the above view, the consideration of a number can be double: Classical/
exact or fuzzy/ inexact. If we take the horizontal axis of the real numbers, then we can add the
vertical axis up to 1 and transform the exact representation of the number to fuzzy representation using a membership function, for example triangular, trapezoid, conoid etc.
Consequently, a fuzzy number can be represented by a triangle, the apex of which lies
exactly above the number in one unit height (1) and its basis lies on the horizontal axis. The
classical/ exact eight (8), for example, has a basis limited to a point, number 8, and therefore
is represented by a vertical arrow sited on point 8 and of one unit height. Hence, while exact 8
On Numbers Nature
23
can be considered as a unique triad of the form (8,8,8), the fuzzy 8 has the possibility for
many triangles such as: basis interval (7,9) or (6,9) according to data and then the fuzzy
numbers are correspondingly (7,8,9) and (6,8,9). The ordered triad which represents a fuzzy
number has as its centre the apex of the triangle and therefore the corresponding exact number. The first number shows the left point of the basis and the third one shows the right point.
For example, the (3,5,7) is the fuzzy number 5 with basis the interval (3,7).
In conclusion, we would say that a fuzzy number is a quantity the value of which is not
accurate, as it happens with usual numbers, but can be considered as a function with domain
the set of the real numbers and co-domain the interval of the reals between 0 and 1. To each
numerical value in the interval is attributed a particular membership degree, where 0 represents the minimum possible grade and 1 the maximum. Fuzzy numbers on many aspects represent the natural world more realistic than the usual numbers. Fuzzy numbers are used in
Statistics, Programming and Science. The concept of fuzzy number considers the fact that
natural phenomena have a degree of uncertainty. A way then to represent uncertainty is to use
fuzzy numbers and sets. In some cases, a number can be known only approximately or inexact even though its exact value is known. Such paradigms are well-known in Programming.
24
Dimitris Gavalas
On Numbers Nature
25
chetypal patterns of numbers, a common set of ideas in many minds for which our intellect is
predisposed to work and thanks to them to function.
Since archetypes precondition all existence, they are manifest in the spiritual achievements of science, art and religion, as well as in the organization of organic and inorganic matter. The archetype thus provides a basis for a common understanding of data derived from all
sciences and human activities -not least because of its implications for epistemology.
In the platonic dialogue Menon, Socrates addresses questions to slave Menon and he
shows thus, beginning from a particular square, how is constructed another one having the
double surface. Menon recognizes that an obvious construction is not correct and afterwards
he recognizes the correct one. Then Socrates results to the following conclusion: The knowledge he has now either he acquired it some time in the past or he had it all along. If he had it
all along, he also knew all these all along, but if he acquired it some time in the past, it is not
possible he acquired it in his present life. Did someone teach him Geometry? Because he will
do the same he just did both for all Geometry and for each other discipline of knowledge. But
did anyone really teach him all these? The answer is no because Menon is an illiterate
slave. This experiment shows two things: on the one hand that there are three stages in order
for someone to reach knowledge. Firstly, knowledge is unconscious. Next, conjecture and
opinion rouse up with questions and through the dialectic approach. Finally conjecture and
opinion are transformed into knowledge through the understanding of the relation that exists
between the cognitive object and the idea/ form from which it comes. On the other hand that
we know truths we never learned externally, that is from education and experience. This
knowledge is a pattern/ model of the universal truths which we can conceive and acknowledge. Finally, there is a higher hierarchical level of the absolute knowledge and truth, fountain-head of the absolute knowledge and truth, fountain-head of the knowledge of Good (Hill,
1992).
The modern research detects the existence of innate models, universal dynamical
schemes, which are well-known as archetypes and are different from the platonic ideas/
forms. Indeed, what Plato called idea, is a model of ultimate perfection only with the positive/
bright meaning, while archetype is bipolar and realizes both the positive and the negative/
shadowy side, because it is not a pattern of perfection, but of wholeness. In addition, it is accompanied by emotional charge. Therefore a kind of knowledge based on innate principles
mostly, not acquired or resulting from the external experience, is the system of archetypes.
The study of archetypes and their structure, like the study of numbers, can lead to better understanding of the typical properties of mind. The archetypes are structures, models in the
mental realm, norms and limitations, patterns of mental and psychic behavior in the unconscious, giving the possibility to unconscious messages to be sent to the conscious mind with
the form of images.
The nature of these messages is symbolic. The archetypes correspond to a universal
grammar of mind. They predispose it towards particular kinds of universal knowledge, assuring that some issues are universal, like myths, numbers, language structures, ideas/ forms.
26
Dimitris Gavalas
The archetypes provide the potential and the circumstances for the production of ideas and
fantasy. They are not found in the mind as result of information, practice or teaching, but instead are a pan-human legacy. An archetype is not immediately known, but becomes known
only through the emergence of the archetypal image, presented spontaneously. Because the
archetypal information has a universal basis, out of the particular space-time, it is independent
on specific experience. Our coincidence with our conscious and the rational rejects, repulses
or represses archetypes and their images, but these always return with one form or another.
However, this form is always inside a frame and not completely free, i.e. it is not free of being
any form. Archetypes in general have their own special logic and structure and these special
elements illustrate the structure of mind.
The above mentioned issues lead us to think that the opposition between the Superior
World of Pure Mathematics and the Inferior World of Applied Mathematics is not absolute.
These two Worlds are seemingly incompatible, because the connecting bridge is not missing.
Between them, as common factor, stands a medium, the number, the reality of which is valid
in both Worlds, because it is exactly an archetype in its essence, in its ultimate reality. Number belongs to both Worlds real and fantastic; it is visible and invisible, quantitative and
qualitative. The fact that number participates and characterizes the nature of the medium form
and that appears as an interceder between the basic opposition and all the others, is a very
important fact. Because we immediately conclude that the symbol realizing the intermediation, the conjunction, the wholeness, the unity, the order, the identity, the synthesis, the reconciliation can be generally expressed by a mathematical fashion. The meaning of this symbol necessarily presupposes an excess which does not lead to some metaphysical hypothesis.
It is just a borderline meaning and the fact that exists something beyond this cognitive limit is
proved by the spontaneous appearance and observation of archetypes and more clearly by
number. The latter, on the one side of the limit is quantity and on the other side autonomous
entity capable of qualitative denotations expressed in a priori structures of order, regularity
and eurhythmy.
With the existence of a factor, mediating between the two phenomenally incompatible
Worlds, we know for sure today that the one World takes through this exact factor, properties
of the other World. With each others help the two Worlds interact continuously and even
more the ultimate reality bases on a common substratum, still unknown, having properties
simultaneously from the two Worlds which gives us the chance to build a new model of the
World, closer to the idea of the unus mundus. It seems that the method best fits to the nature
of order and chance is arithmetic. From ancient years people used numbers to express the
meaning of order, as well as coincidences with meaning, the ones that can be interpreted.
Also if we denude a set of objects from all of its properties and its characteristics, that is we
consider an abstract set, what finally remains is its multitude, that is its number, a fact the
denotes at least that number is a magnitude initial and irreducible.
The succession of natural numbers seems to be something more than a simple accumulation of identity monads. It includes the set of Mathematics and all that are going to be discovered in this field. That is why number is in a sense non-predictable entity. Number helps more
than anything else to the ordering of the chaos of phenomena. It is the predefined tool for the
creation of order or to become understandable some already existing, but still unknown
smooth arrangement. May be it is the most primitive element of order of the human mind.
The fact that numbers have an archetypal foundation, it makes obvious that it is not so arbitrary to define number as an archetype of order which became conscious by man. Even the
On Numbers Nature
27
intuitionist/ constructivist Brower said that Mathematics refer to becoming and not to being, a
view completely platonic. It is a spiritual action, which is in direct relation with the possibility
of conceptual construction of all mathematical entities from the natural numbers.
People believe in general that numbers were invented or were the result of thinking and
for this reason they are nothing else but concepts of quantities, the content of which was attributed by the human intellect. But it is equally possible the numbers to be discovered. In this
case they are not just concepts, but something more: autonomous entities which contain, in a
way something more than mere quantities. Contrary to the concepts, they do not base in a
hypothesis, they are un-hypothetical according to Plato, but to the property of identity, i.e.
they are themselves, something that cannot be expressed by a conscious intellectual invention.
Under these circumstances it is possible to attribute to them easily some properties which are
not yet been discovered. We tend towards the synthetic view that numbers both were invented
and discovered and therefore have an autonomy analogous to that of the archetype. Consequently, they preexisted of consciousness and that is why they determine it than being determined by it. Also, the archetype as an a priori ideal form both was invented and discovered. It
was discovered because nobody knew its unconscious, autonomous existence and was invented because its presence was the effect of analogous human psychophysical structures. It
seems though, that natural numbers have archetypal character. Some numbers and combinations of numbers relate to or act on particular archetypes. The opposite is real also, as the research of Jung, von Franz etc assure.
The set of natural numbers is an archetype of order, which is illustrated in consciousness,
helping it to place the chaos of phenomena into some sort of ordering diagram. The system of
natural numbers is a form of a priori knowledge, extremely capable of organizing the random
nature of experience. Exactly like the native language it is being learned easily, because different kinds of numerical systems are less accessible. They were not named natural numbers
without special reason. Number which is used for counting and the quantitative relations is
something more than we generally believe. It is simultaneously an entity of the same order
with the mythological elements that is why the Pythagoreans thought it sacred. But when we
use it only for practical purposes, we do not seem to realize that aspect.
The archetypal structures and numbers as such, are not static forms but dynamic elements. We perceive the special power of archetypes and numbers when we have the opportunity to appreciate the appeal, that is the emotion through the unconscious or the awe or the
fear that exert on us. They seem fateful and in this case we can think as example numerophobia, stress for Mathematics, superstitions, arithmomancy etc. It is characteristic the issue of
number 13, which is taboo for many people, it has unfavorable character and the superstitious
feels awe for this number. Archetypes are images and simultaneously emotions and we can
talk about archetypes only when these two aspects are presented simultaneously. When the
image is charged with emotional intensity it acquires mysterious, divine dimension, it becomes dynamic and it necessarily has impacts on the person. The fact that number seems to
be initial and innate concept for man, which is accompanied by emotion, is interpreted by
Gauss sayings: It is curious that all people who study seriously the science of Number Theory, are dominated by a kind of passion for it. Cantor also confesses: When I think and
study infinite, it always follows a real pleasure, in which I succumb pleasantly as I see that
the concept of the integer number is split in two concepts and we ascend to the infinite. The
one is the concept of power (cardinality) and the other the concept of counting.
28
Dimitris Gavalas
Even those contents that are considered the most certain of the consciousness are surrounded by the shadow of uncertainty and vagueness. And the most austere mathematical
concept, that we believe it contains only those elements we attribute to it and is well defined
and limited, it is something more than we believe it is. It is simply a psychic fact and as such
it is partially unknown just like number. Of course these faint and implicate differentiations
are being abolished by being considered needless, ignorable, not worth a fig or they do not
have relation to our needs and their usual applications. Even though we face exact definitions
and clear analysis, we discover sometime the most unexpected differentiations, not only with
the pure mental concept of the term, but with the value that is attributed to number as well as
with its application. The fact that these differentiations exist displays exactly what was originally sustained.
Weyl believed about natural numbers and used to say that he could not understand how
something so simple, constructed by the human mind, could contain something abysmal. He
should ask himself first, whether the human mind really constructed them. He feels that he
controls and leads completely the phenomenon, but this is not true. We claim that what happens is exactly the opposite that is numbers as archetypal dynamic processes control us at
least up to a point. Weyl by the term abysmal means that irrational factor, which is contained in all numbers, and which we cannot conceive and explain with rational terms.
It is very interesting here to see what a psychologist of the Jungian school, von Franz
(1980), exactly says about this issue:
I want to read you in detail what the well-known mathematician, Hermann Weyl, says in
his book Philosophy of Mathematics and Natural Science. You know that until about 1930 the
great and passionate occupation of most mathematicians was the discussion of the fundamentals. They hoped, as has been the fashion nowadays, to re-discuss the fundamentals of all science. But the famous German mathematician, David Hilbert, created a new construction of the
whole building of Mathematics, so to speak, and hoped that this would contain no internal
contradictions. There would be a few basic axioms on which one could build up all branches
of Mathematics: Topology, Geometry, Algebra, and so on; it was to be a big building with
solid foundations in a few axioms. That was in 1926, and Hilbert was even bold enough to
say: I think that with my theory the discussion of fundamentals has been forever removed
from Mathematics.
Then in 1931 came another very famous mathematician, Kurt Gdel, who took a
few of those basic axioms and showed that one could reach complete contradictions with
them: Starting from the same axioms, one could prove something and its complete opposite. In other words, he showed that the basic axioms contain an irrational factor which could
not be eliminated. Nowadays in Mathematics one must not say that obviously this is so-andso and that therefore that and that are also so, but: I assume that it is so-and-so, and if so then
that and that follow. The axioms must be presented as assumptions, or must be postulated,
after which a logical deduction can be made, but one cannot infer that what has been assumed
or postulated could not be contradicted or doubted as an absolute truth.
In order to make such assumptions, Mathematics is generally formulated in such terms
as: It is self-evident or It is reasonable to think -that is how mathematicians posit an
axiom nowadays, and from there they build up. From then on there is no contradiction, only
one conclusion is possible, but in it is reasonable to assume that is where the dog lies buried, as we say. Gdel showed that, and thus threw over the whole thing. Strangely enough that
On Numbers Nature
29
did not reopen the discussion of fundamentals. From then on, as Weyl says, nobody touched
that problem, they just felt awkward and scratched behind their ears and said, Don't lets
discuss fundamentals, theres nothing doing: it is reasonable to assume, we cannot go beyond
that and there the situation rests today.
Weyl, however, went through a very interesting development. At first he was very
much attracted by the physicist Werner Heisenberg. He was very much of a Pythagorean
and was attracted by the numinosity and irrationality of natural integers. Then he became fascinated by David Hilbert, and in the middle of his life had a period during
which he became more and more attracted by Hilbertian logic and dropped the problem of numbers, treating them, erroneously as I think, as simply posited quantities. He
says, for instance, that natural integers are just as though one took a stick and made a
row of marks, which one then named conventionally; there was nothing more behind
them, they were simply posited by the human mind and there was nothing mysterious
about them; it was reasonable and self-evident that one could do that. But at the end
of his life he added -only to the German edition of his book on the philosophy of Mathematics, and shortly before his death- this passage:
The beautiful hope we had of freeing the world of the discussion of fundamentals was
destroyed by Kurt Gdel in 1931 and the ultimate basis and real meaning of Mathematics are
still an open problem. Perhaps one makes Mathematics as one does music and it is just one of
mans creative activities, and though the idea of an existing completely transcendental world
is the basic principle of all formalism, each mathematical formalism has at every step the
characteristics of being incomplete (which means that every mathematical theory is consistent
in itself but is incomplete, at the borders are questions which are not self-evident, are not
clear, and are incomplete) in so far as there are always problems, even of a simple arithmetical
nature, which can be formulated in the frame of a formalism, but which cannot be decided by
deduction within the formalism itself.
That is put in a mathematicians complicated way; put simply, it means that I daresay it is
self-evident, by which I posit something irrational, because it is not self-evident. Now one
could make an uroboros movement and say: But from my deduction I can reprove my beginning. You cannot! You cannot from the deductive formalism afterwards deduce a
proof, except by a tautology, which naturally is not allowed, even in Mathematics.
We are therefore not surprised that in an isolated phenomenal existence a piece of nature surprises us by its irrationality and that one cannot analyze it completely. As we have
seen, Physics therefore projects everything which exists onto the background of possibility or
probability.
That is important because it sums up in one word what modern science does. In other
words, any fragment of phenomenal existence, let us say these spectacles, contains something
irrational which one cannot exhaust in physical analysis. Why the electrons of these millions
and millions of atoms of which my spectacles consist are in this place and not in another, I
cannot explain; therefore through Physics, when it comes to a single event in nature, there is
no completely valid explanation.
The single event is always irrational, but in Physics one proceeds by projecting this onto
the background of a possible, i.e., one makes a matrix. For instance, in these spectacles there
30
Dimitris Gavalas
are so many atoms and so many particles of them, and so on, and out of a whole group one
can make a mathematical formula in which one could even count the particles -not 1, 2, 3, 4,
5, but by projecting onto the background of what is possible. That is why these matrices are
nowadays used in engineering and so on, because one can cope with the uncountable; they
provide an instrument with which to cope with the things which cannot be counted singly.
Weyl says:
It is not surprising that any bit of nature we may choose (these spectacles or anything)
has an ultimate irrational factor which we cannot and never will explain and that we can only
describe it, as in physics, by projecting it onto the background of the possible.
That is the confession of one of the most remarkable -because one of the most philosophically oriented- modern mathematicians, Hermann Weyl. We can naturally say that we
do not believe what he believed, namely that the natural integers simply represent the naming of posited dots, therefore to us it is not surprising that natural integers are abysmal
and beyond our grasp. He believed that, and that is why he could not understand. It is
incredible that it should be so, but it is so; in other words, because the natural integers
have something irrational (he called it abysmal) the fundamentals of Mathematics are not
solid, because the whole of Mathematics is ultimately based on the givenness of the series of
natural integers.
Now precisely because numbers are irrational and abysmal -to quote Weyl- they are a
good instrument with which to grasp something irrational. If one uses numbers to grasp
the irrational, one uses irrational means to get hold of something irrational, and that is
the basis of divination. They took those irrational, abysmal numbers which nobody has
so far understood, and tried to guess reality or their connection with reality (von Franz,
1980).
This other factor is illustrated very well on the mythological aspects of number, which
are depicted among the others to the anaglyphs of ancient peoples, like the Mayas about 700
B.C, when the numerical subdivisions of time were personalized by gods. Here characteristic
is the fact that Kant reduces the concept of number to that of time, because the numeration is
in immediate relation with some time evolution. Also, according to the known, the pyramid
with the spots presents the Pythagorean tetraktyn (quaternary number). It consists of the
most used natural numbers 1,2,3,4 which form the sum 10. 4 and 10 were for the Pythagoreans essentially sacred numbers.
The archetype, as well as number, is not just a word or concept, it is literally a part of life
itself, an undivided part of the vivid entity and this happens through emotion. While we do
not perceive the special emotional tone of the archetype, we can intellectually prove that it
has a meaning or that it has not. But the archetype starts living only when we try patiently to
On Numbers Nature
31
discover why and how it has meaning for the particular vivid person. While we consider the
archetype as a mere image or idea, the divine power of which we never felt, we will talk
without knowing for which thing we talk and the words we use are empty and of no value.
The archetype gets vivid only when we try to understand its divine existence and its relation
to the person. Only that moment do we start to understand that the word archetype means
some particular things and that everything depends on the way these are connected to us, in
other words on our stance towards it.
The field Jung considered as the most fertile for future research was that of the basic
mathematical axioms, the first mathematical intuitions, paying special attention to the idea of
the infinite series of the natural numbers and the continuum in Geometry. As Arendt (1958)
says, contemporary Mathematics becomes the science that studies the structure of the human
spirit. In this line of thought it was also discovered that our representations are ordered before we even realize it. Van der Waerden (1975), who refers many paradigms of elementary
mathematical intuitions that come from the unconscious, concluded that the unconscious is
capable not only of taking in but also of combining and judging. The judgment of the unconscious is intuitive, but when the circumstances allow it is perfectly certain.
Among the many initial mathematical intuitions or a priori ideas, the natural numbers are
the most interesting ones. These numbers are not only useful for counting or executing numerical operations, but also for centuries were the unique means man had in order to decipher
the meaning of the various divination techniques and oracles. Of such kind were astrology,
numerology, and geomancy etc, which base on the numerical calculation and were interpreted
by Jung in terms of synchronicity that is a-causal coincidence bearing meaning to the observer. Besides, the natural numbers are certainly archetypal representations, because we are
obliged to bring them in our mind in a particular way. No one for example denies that two (2)
is the only and first number which means a couple, even if one has not thought of it consciously. In other words numbers are not concepts invented consciously by man just to execute calculations. It is obvious that they are spontaneous, autonomous creations of the unconscious, just like the rest archetypal symbols. The natural numbers though, are also properties
of the external objects: We can assure and calculate that here are two stones and three trees.
When we denude the objects from their properties, what is left is the common property of
being together many of them that is a particular magnitude. But the same numbers are undoubtedly part of our psychic composition; they are abstract concepts we can study without
reference to external objects. Therefore numbers are presented to us as a concrete association
between the two fields: nature and psyche.
Therefore number is revealing: it expresses the total World and translates logically the
hidden relations of its elements, on its nature is irrational, is reduced to the wholeness, but
when it is analyzed and developed it reveals universal relations, movements and positions. In
the universe, number is greater than the natural magnitudes, because the latter are expressed
by number. Number de-materializes World and its powers, reduces the empirical thought to
pure contemplate, to noesis, it reaches the human intellect in its origins, since number belongs
neither to time nor to space, since monad, contains everything and is contained in everything.
According to the Pythagoreans, we thus reach the depths of the myth; we touch what can be
called mystery of the mysteries. It is characteristic the observation that human intellect places
everything in a finite World. Mind can assert truths, which the human intellect cannot confirm
(Gdel, undecidable propositions). Intellect is the capability of counting and numbering, mind
is the realizing of number itself.
32
Dimitris Gavalas
On Numbers Nature
33
numbers within T, i.e. into the language of Arithmetic. Since T contains ordinary Arithmetic,
it has constants such as 0, 0=1, 0 = 2 etc. for numerals, variables x, y, z, for numbers,
equality, a successor function and symbols for operations, as well as, the apparatus of the first
order predicate calculus. By the use of Chinese Remainder Theorem, in T we can define the
prime number and prove in T the Fundamental Theorem of Arithmetic: Every natural number is uniquely a product of primes. By explicitly enumerating formulas and proofs in T in
some code, we can replace statements about proofs by statements about the corresponding
numbers, their codes. Here is an example of a code:
0
7
11
=
13
+
17
*
19
x
23
y
29
z
31
Each formula is a finite list of symbols, so is coded by a list of numbers n1, n2, n3, :
This can be replaced by a single number m = 2n1 3n2 5n3 Conversely, give a number m, we
can factor it into primes and so read off the corresponding list of basic symbols. An analogous
procedure is followed just for the proofs in T.
The above process achieves to establish an 1-1 mapping between all the formulas and the
proofs on the one hand and a definite subset of the natural numbers -in particular the set of
prime numbers P- on the other hand. What characterizes not only Gdels work but also the
new era which initiates with it, is the arithmetizing of Meta-mathematics that is the correspondence of logical relations to pure arithmetical relations. With this arithmetizing, it is finally achieved a reduction of Meta-mathematics, as it happened before with Mathematics, to
the natural numbers. Therefore, what Gdel achieves, is to properly map all propositions of
Meta-mathematics which refer to structure properties of the logico-mathematical system in
use containing all natural numbers, to the system itself.
The method of arithmetizing Meta-mathematics that Gdel follows is like that of the
Analytic Geometry where the coordinates correspond to the geometric figures and the latter
are expressed by arithmetical relations. By Gdels work, was also made clear that the noncontradictory of a logical-mathematical system which contains all natural numbers is not expected to be proved with the means of the system itself. This fact is parallel to the descriptive
image where one who is being drawn cannot be saved by dragging own hair out of the sea.
What he needs is someone else to drag him out; the same holds for the proof of noncontradictory, where we must use proofing means out of the system. Jung uses an analogous
argument, when he sustains that the reply to the question How does the system hummer-nail
work? cannot be found into the system, but outside of it, at the hand which holds the hummer
and hits the nail. But according to Gdel himself, the problem can be solved with some appropriate philosophical realism, analogous to that of the platonic archetypal ideas. It is important to note here that when Gdel shows that no axiomatic system with enough axioms -like
that of Arithmetic- can prove the true or false of each proposition expressed inside it, he actually shows that there is inherent uncertainty in Mathematics and therefore we cannot confine
ourselves only to the study of its clear and definite characteristics.
Weyl, finally, presents the consequences of these theorems, saying that the arithmetization method leads to the aspect that the natural numbers, along with their Arithmetic, consist
such a broad field, so that any formalized theory can be mapped inside it. This astonishing
property of the number, acknowledged by Pythagoras and Plato, is being used by Gdel for
34
Dimitris Gavalas
the meta-mathematical study of a given mathematical formalism. All these show that our
view about natural numbers is still located in initial stages.
After that we have to study the interesting work of Robertson (1995), who connects
Jungs view about number with these of Cantors and Gdels. Drawing on the initial concept
advanced by Pythagoras, i.e that reality is number, and Platos later theory, i.e. that a world of
perfect ideas exists which transcends the world we live in, the author sketches the scientific
advances made from the Renaissance through the 20th century. He explains Descartes Geometry, the Calculus of Newton and Leibniz, Cantors Theory of Infinite Sets, Freuds Theory of Personality, Jungs model of the psyche, and Gdels Incompleteness Theorems. Utilizing the above mentioned background material, Robertson then explains how Jung and
Gdel both posited that a Platonic world of ideas -archetypes- exist beyond physical reality
and the inner world of the psyche. And his well reasoned conclusion is that these archetypes
are Pythagoras simple counting numbers. This is a work for anyone interested in Mathematics, Psychology, Philosophy, and archetypes.
On Numbers Nature
35
crows can recognize one, two, three and many, few of us would argue they arrived at
these numeric relationships by counting per se. Instead there must be pattern recognition, a
primordial image, to use Jungs earlier formulation of symbol, which corresponds to the
smaller integers. In other words, we have an innate sense of what one and two and
three mean. Now, if we conceive numbers as having been discovered, and not merely invented as an instrument for counting, then on account of their mythological nature they belong to the realm of godlike human and animal figures and are just as archetypal as they are
(Jung, CW10).
As civilization developed, there was a need for ever larger numbers. This need puts a
strain on any system of separate and distinct symbols. Even among great mathematicians, it is
the rare genius for whom virtually all numbers come to possess true symbolic stature. One
such was Ramanujan, who recognized that number 1729 It is a very interesting number. It is
the smallest number expressible as the sum of two cubes in two different ways. [1729 =
123+13 = 103+93] (Hardy, 1992). For most of us, however, this archetypal pattern recognition
is unlikely to extend past the smaller counting numbers.
Since, at this stage, the recognition of number is the recognition of a primordial image or
pattern, there is as yet little if any distinction between Arithmetic and Geometry. As soon as
Arithmetic and Geometry split and go different directions, it becomes much less clear that
Jung is necessarily right in his guess that all Mathematics emerges from the smaller counting
numbers. Geometry by its various nature deals with continuous lines, figures and planes,
while Arithmetic develops out of ever grander extensions of the discrete counting numbers.
At the time when Jung was developing these ideas, he was corresponding with Pauli. Pauli,
inspired by Jung, was searching for a neutral language which could underlie both the physical and psychological worlds (Pauli, 1955; Card, 1991). Pauli recognized that the issue came
to a head when the development of Arithmetic reached the point where it was forced to deal
with infinite quantities. If, therefore, a more general concept of archetype is used today, then
it should be understood in such a way that included within it is the mathematical primal intuition which expresses itself, among other ways, in Arithmetic, in the idea of the infinite series
of integers, and in Geometry, in the idea of the continuum (Card, 1993). At that point, Jungs
speculation becomes identical with Cantors Continuum Hypothesis; i.e., are there any infinity that lie between the infinity of the integers and the infinity of the geometric continuum?
Cantors Continuum Hypothesis is the question: How many points are there on a straight
line in Euclidean space? An equivalent question is: How many different sets of integers do
there exist? This question, of course, could arise only after the concept of number had been
extended to infinite sets (Gdel, 1947).
Though Arithmetic and Geometry inhabit separate realms, it is inordinately productive
when either turns to the other for a new way of thinking about a problem. Back and forth goes
the cross-fertilization between the two fields. This is because at their extremes -dealing with
the discrete counting numbers and the geometric continuum respectively- Arithmetic and Geometry seem like very different fields. There is, however, a great fuzzy area where they overlap, since reality itself is more fuzzy than not. Similarly, though at their extremes mind and
matter seem totally distinct, the boundaries between the two are fuzzy. There is little blackand-white in the real world. Between the extremes there is a grey spectrum where everything
is matter of grade (Kosko, 1994).
The CH marks the point where the boundaries of Arithmetic and Geometry are very hazy
indeed. There is dispute that the power-set of the countable numbers is the same size as the
36
Dimitris Gavalas
continuum; the CH says that there is no infinity that lies between the two. Starting with the
small natural numbers, we build up ineluctably to the countable infinity of all integers; but
taking all the combinations of those numbers is a very different thing than merely accumulating. On the human level, we certainly understand how much more complex it is to deal with
relationships than with things. We can think of countable infinity as a natural infinity, as the
limit of what we encounter in dealing with the things of the world. The uncountable infinity
of the continuum is the limit of what we encounter dealing with the relationships in the world.
The higher infinities beyond the continuum are all power-sets of the continuum, hence relationships between relationships, etc. Though Cantor remained convinced that the CH was
true, others were less sure from the beginning. Cantors CH assumed the identifiability of two
concepts that were intrinsically different and of no comparable orders of magnitude. The two
ideas were inherently antithetical: The nature of the continuum, regarded as the collection of
all infinite sequences of rational numbers, was something totally different from the infinity of
natural numbers.
Gdel had already proved that any system at least as rich as Arithmetic contains undecidable mathematical truths; he guessed that the CH might be just such an undecidable proposition. There are -assuming the consistency of the axioms- a priori three possibilities for Cantors conjecture: It may be (i) demonstrable, (ii) disprovable, or (iii) undecidable. The third
alternative is the most likely. To seek a proof for it is, at present, perhaps the most promising
way of attacking the problem. One result along these lines has been obtained already, namely
that Cantors conjecture is not disprovable from the axioms of Set Theory, provided that these
axioms are consistent.
The result was given by Gdel by his own proof in 1940 that is, if a modified Set Theory,
which does not include the CH is consistent, then it will remain consistent if the CH is added
as an additional axiom. However, this was only half of what was needed to prove that the CH
was undecidable within Set Theory. In order to prove the other half, Gdel needed to show
that if a modified Set Theory, which does not include the CH is consistent, then it will still be
consistent if the CH is assumed to be false. Though Gdel made some progress toward a solution, he was never able to prove it, as it was simply too complex to be resolved with the
mathematical tools available at the time. Finally, in 1963, Cohen was able to prove the second
half of the problem, thus showing that within Set Theory, the CH was undecidable. So,
Gdels incompleteness proof had demonstrated that every logical system contains essentially
undecidable propositions. Now Gdel - Cohen had shown that the CH was undecidable
within Set Theory. Since by this time Mathematics and Set Theory were inseparable for most
mathematicians, this was a haunting proof.
According to Cohen (1963, 1964, and 1966) and Gdel (1958) we can present the evolution of this story as follows: Gdel had already conjectured that even if the CH was undecidable within Set Theory as then constituted, within some extended Set Theory it would
eventually be resolved in some way. The undecidability of CH from the axioms being assumed today can only mean that these axioms do not contain a complete description of the
reality.
Gdel was confident that Set Theory is an important positive step for Mathematics. He
believed that it necessarily describes a well-determined reality, perhaps the mathematical
reality which underlies the reality in which we actually exist -perhaps Jungs unus mundus; in
any case, some well-determined reality. Gdel is confident that the CH must be either true
or false within that particular reality. Since he and Cohen together proved that the CH is nei-
On Numbers Nature
37
ther true nor false, but undecidable within Set Theory as it is currently constituted, then Gdel
can only assume that is because the current set of axioms are insufficient to fully define that
reality; i.e., that there are further axioms yet to be discovered.
Whereas Gdels Incompleteness Theorems seemed to ring the death knell for the development of Mathematics, Gdel has faith that Mathematics is inexhaustible. He considered
that Set Theory is the right direction for Mathematics, and that within an extended Set Theory, the CH is resolvable, and finally that any axioms powerful enough to enable the CH to be
resolved will necessarily be powerful enough to lead Mathematics in new directions. So far,
Gdels view has not been justified. Sixty years have passed since 1947, and no extension of
Set Theory has yet been discovered in which the CH can be resolved. Perhaps it is truly an
undecidable proposition, or perhaps Mathematics is waiting for another Cantor, or Gdel.
While we wait, we have to know that both Gdel and Cohen feel that eventually the CH will
be resolved.
That is where things rest at this point. Jung guessed that the natural numbers are the primary archetype of order in the unus mundus, and that all Mathematics develops out of the
natural numbers. Cantor would have agreed with him. Jungs whole psychology developed
out of an attempt to deal with the problems presented by the fact that the world outside is
somehow contained within our minds/ brains, while at the same we and our minds/ brains are
obviously contained within the world. His Depth Psychology explored the world within, especially as it found expression in the dreams, myths, and other unconscious expressions of
human beings. At each level of the psyche, he discovered structure and order. As he went
deeper and deeper, it is only natural that eventually he arrived at a level where that structure
and order had little or no human qualities attached to it. That was the level of number as archetype. (Robertson, 1995).
38
Dimitris Gavalas
for finding representations of the unus mundus based upon the integer nature of the number
archetype is called into question.
After all, isnt the attempt to reduce the world to the archetypes of the small natural numbers much the same as the attempt of Russell - Whitehead to reduce Mathematics to Logic,
the attempt of physicists to reduce the physical world to first atoms, then subatomic particles,
then most recently to quarks? Isnt it more likely that the world is richer than we can ever
hope to comprehend? Jung thought that there was a unitary reality -the unus mundus- that
underlay both psyche and matter, and speculated that the primary archetypes of this unitary
reality were the simple counting numbers. In this case, each number is, itself, a true symbol:
undefinable and inexhaustible -a much less reductionistic stance than the hope that all reality
can be reduced to Logic. But even so, doesnt it seem unlikely that we will ever find any lowest level to reality? The Archetypal Hypothesis is a starting point to explore the magic and
wonder of the world, not an end point to circumscribe its possibilities.
This argument raises important issues for understanding the Archetypal Hypothesis and
its implications. If the number archetype is to be understood to be completely equivalent to
the natural numbers, then the evocation of Gdels and Cohens work on the CH is valid
without qualification. The Archetypal Hypothesis would then be seen to be a recycled version
of Pythagoreanism, brought to the dust by the undecidability of the CH, in much the same
way as the original dream of the Pythagoreans foundered with the discovery of the irrational
numbers. The crucial issue, then, is whether the number archetype is simply the natural numbers. Jung does not express himself clearly on this point, and even von Franz is not altogether
consistent in her discussion of the relationship of number archetype to the natural numbers.
The problem is the failure to distinguish between the concept of the archetype-as-such
and the representations of the archetype; the images and ideas that are the specific realizations
of the archetype, each pointing toward the existence of the abstract archetype-as-such but
none being strictly equivalent to it. In the context of number archetype, this problem emerges
as the failure to distinguish between the number archetype-as-such and a specific representation of the number archetype such as the natural numbers. Thus the number archetype is not
the natural numbers; the natural numbers are only one specific representation of the number
archetype. As with specific representations of any archetype, the natural numbers are symbols
with an unlimited potential for expression, but their properties do not exhaust all of the possibilities for representation implicit in the number archetype-as-such.
The application of the undecidability of the CH to one representation of the number archetype, namely the natural numbers, does not, in fact, lead to a conundrum for the Archetypal Hypothesis. Rather, this result is in concordance with the above mentioned fact about
representations of archetypes: No representation is a complete representation. Apart from
what can be expressed by any specific representation of an archetype, there are other aspects
of the archetype that are valid but unrepresented. Here, it seems, Jungs empirical findings
resonate with Gdels Incompleteness Theorems. From this perspective, the answer to the
question about the attempt to reduce the world only to the archetypes of the small natural
numbers much the same as the attempt of Russell - Whitehead to reduce Mathematics to
Logic, is simply no.
It is an important distinguishing feature of any prospective archetypal science that it entertains no dreams of a Final Theory and has no presumptions of being a Theory of Everything in the sense that contemporary Physics presently imagines. An archetypal science
would be, by its nature, a self-reflective science that is not only aware of its own epistemo-
On Numbers Nature
39
logical capacities and limitations but actually incorporates them -e.g. archetypes- in its representations of phenomena. Given these considerations, the question naturally arises: If natural
numbers are simply one representation of the number archetype, what other representations
might there be? Finding such representations would be a prerequisite for any future development of science from an archetypal perspective. Some hints in this direction can be found in
the work of von Franz, and nowadays of Robertson and Card.
Jung and Gdel, each one in his own way, try to open our mind to the other reality,
which exists in inner and outer world. These two views of the world, external and internal,
have common basis and are expressed by a common factor, which is number. We are still
very early in our understanding of the archetypal nature of reality. Platos aspect of an ideal
world is an early attempt at describing the archetypal nature of reality, and it lacks so much.
Platos ideal world lies, like other early views of the humans, totally separate from us and our
experience. Science proceeded by exploring the outer rather, not the inner world. Mathematics plays a role in that process; without Mathematics there is no science. Gdels Incompleteness Theorems demonstrated once and for all that Mathematics is bigger than Logic; so are
science and all human endeavors. But, if Logic is insufficient, perhaps Mathematics, as is
develops out of the simple archetypal counting numbers, is enough. Is it really so surprising
that the CH proves intractable?
40
Dimitris Gavalas
world is based on the exchange of information and on communication with it. Whenever we
are learning, we are sending and receiving transmissions, generating and absorbing information; we are communicating (Gavalas, 1999).
Finally, for Jung different numbers make up various kinds of patterns. Certain archetypes
are associated with some of the smaller numbers:
1.
2.
3.
4.
5.
monad: unity
dyad: opposition
triad: thesis-antithesis-synthesis
tetrad: balance of quaternity
quintad: a step further out.
Robertson (1989) sustains that as number evolved, so did the relationship between the
ego and the Self, which is, according to Jung, the totality of the human personality:
(i) Natural numbers coincided with the period of participation mystique, when man
could only experience himself through his projections on nature.
(ii) Zero appeared at the birth of the Christian era, as the ego began to emerge as a thing
in itself. As zero gradually led to the explicit formulation of infinity, the ego unsuccessfully tried to swallow the Self.
(iii) Infinity gave way to self-reference in the twentieth century, as order began to crumble into chaos everywhere around us. The ego, unable to swallow the Self, gave way
to despair. God was dead; chaos reigned.
But even chaos was revealed as possessing a self-referential order. The relationship between ego and Self is not one in which ego rules Self or Self rules ego. Rather, the Self is at
one and the same time both the goal of the ego, the process by which the ego attains that goal.
The ego is both the Selfs expression in the world of limits and the process of evolution of the
Self.
Sensing the Self as something irrational, as an indefinable existent, to which the ego
is neither opposed nor subjected, but merely attached, and about which it revolves much
as the earth revolves around the sun -thus we come to the goal of individuation. (Jung,
CW7).
Number, as the archetype of order, is in the process of finding a new symbol with which
to clothe itself. A new order is trying to emerge from chaos. When that happens, it will correspond to a new vision of the Self, as it did when natural numbers ruled, when zero emerged,
when infinity found concrete expression.
At the end of this Part we must underline the fact that the initial work of Jung and the
other of Jung - Pauli opened a completely new way for an essential consideration of numbers
nature. The work of these pioneers was continued by von Franz; today this way is followed
mainly by Card and Robertson and also by others (Gough & Shacklett, 1993). In the next Part
IV we present our own view which is closer to Mathematics and expresses the previous aspects in a mathematical way through the contemporary Category Theory.
On Numbers Nature
41
f
S
g Y.
T
h
42
Dimitris Gavalas
We also require that we can horizontally compose 2-morphisms as follows:
f
S
g
f
T
g
Z.
So we also demand:
(1) Given morphisms f, g: X Y and f', g': Y Z and 2-morphisms S: f g and T: f'
g', there is a 2-morphism ST: ff' gg', which we call the horizontal composite
of S and T.
(2) Horizontal composition is associative: (ST)U = S(TU).
(3) The identities for vertical composition are also the identities for horizontal composition. That is, given f, g: X Y and : f g, we have 11x T = T 11y = T.
Finally, we demand the exchange law relating horizontal and vertical composition:
(ST)(S'T') = (SS')(TT'). This makes the following 2-morphism unambiguous:
f
S
g
T
h
f
S
g
T
h
Z.
We can think of it either as the result of first doing two vertical composites, and then one
horizontal composite, or as the result of first doing two horizontal composites, and then one
vertical composite.
Like the archetype of category is the category of sets and functions, that is Set, so the archetype of 2-category is the category with objects the small categories and morphisms the
functors, that is Cat, where 2-morphisms are the natural transformations. Here it also holds:
The set of all natural transformations is the set of morphisms of two different categories supplied with two different compositions which satisfy the exchange law and the identity morphism is such for both compositions. In case of Cat the objects for horizontal composition are
categories, while for the vertical ones are functors. From all the above we see 2-category can
be considered as abstract two-dimensional space where the axioms tell us how we pose together 2-morphisms in these two-dimensions. So we can pose them horizontally, that is the
one next to the other, or vertically, the one above the other. Note that all is meant by archetype of category for Set is that this is a familiar category and that, if we start from Set and
various categories of structures built using sets, e.g. groups, rings, vector and topological
spaces, we can then abstract the notion of category and thus obtain Cat. In the same sense
Cat is the archetype of 2-category and so on.
On Numbers Nature
43
we take two elements a and b from a set S, and multiply them to get a new one M(a,b)=ab of
the set S. We can visualize this as follows:
X
S
M
X
S
where this triangular shape takes two inputs from the two slanted edges labelled S, and spits
out one output from the horizontal edge labelled S on the bottom. It is clear from the geometry here that M is something 2-dimensional, hence, a 2-morphism, and that S is 1dimensional, hence, a morphism from X to itself. Here X, being 0-dimensional, is an object.
We can take the dual diagram like this:
which illustrates more vividly how M is the process of two copies of S getting squashed
down into one copy. This sort of diagram is called a string diagram and it is literally the
Poincare dual of the earlier picture, meaning that stuff that was k-dimensional is now drawn
as (2-k)-dimensional. The 0-dimensional object X is now the 2-dimensional background.
The essence of multiplication can be described generally in a situation where we have a
2-category with an object X in it, a morphism s: X X and a 2-morphism M: ss s. We are
often interested in situations like this where the multiplication M is associative and there is a
multiplicative unit. The first means that the composite
1s M M
M1s M
sss ss s equals sss ss s,
where 1s: s s is the identity 2-morphism from s to itself.
44
Dimitris Gavalas
The second means that there is a 2-morphism I: 1X s for which
I1s M
s = 1Xs ss s
equals 1s, and so does
1 sI M
s = s1X ss s.
If we have a 2-category with stuff in it satisfying these rules, we say we have a Monad in
that 2-category.
As an example of a Monad we can consider the original example where s is a set and M
is a function. Then the 2-category has only one object X, the morphisms of this 2-category are
sets, the composing morphisms corresponds to taking the Cartesian product of sets and the 2morphisms of this 2-category are functions between sets. In this case the Monad is formulated
as follows: The multiplicative unit 1X corresponds to the one-element set 1, s is a set, the 2morphism I: 1X s is a function from the one-element set 1 to s, which picks out a special
element of s. The 2-morphism M: ss s is the multiplication operation and is associative
while the special element of s is the multiplicative unit that is, it serves as the left and right
identity for multiplication. So we have a set with an associative multiplication and a unit for
this multiplication. That is what is called a Monoid. So a Monoid is a special sort of Monad.
Finally, a 2-category with just one object is called a Monoidal category. For example, Set is a
Monoidal category where we can multiply objects, i.e. sets, with the Cartesian product.
If we consider the 2-category with just one object, forget the object and correspond the
morphisms to objects and the 2-morphisms to morphisms, then we have got a category where
we can compose/ multiply objects, because they were secretly morphisms from X to itself. So
we do this degradation:
2-morphisms morphisms
morphisms objects
object X we forget it.
This is a very important point for our view in the following.
Because a Monoidal category is a 2-category with one object, we can talk about Monads
in any Monoidal category. These are usually called Monoid Objects, because they are like a
Monoid living in the category in question. The category Cat having (small) categories as objects and functors as morphisms becomes a Monoidal category with the Cartesian product of
categories as the way to multiply objects and a Monoid Object in this is a Monoidal category.
A Monoid Object is defined in a Monoidal category, but a Monoidal category is itself a kind
of Monoid Object.
If a category is a Monoidal category with one object X, then the set hom(X, X), of all
morphisms from X to X, is a set with an associative binary product, namely composition, and
a unit element, namely 1. Conversely, if we have a Monoid S in the traditional sense, we can
easily cook up a category with one object X and hom(X, X) = S.
On Numbers Nature
45
We can see morphisms as paths between objects, 2-morphisms as paths between paths
and so on. We can think of morphism as a process which transforms or projects an object
into another. The neutral morphism corresponds to the process of doing nothing at all. We
can compose processes h and g, do h and then g, and get the product gh. Crucially, every
process g can be undone using its inverse g-1. We tend to think of this ability to undo any
process as a key aspect of symmetry and for a full understanding of symmetry we should
really study Monoids. So, a Monoid is like a group, but the symmetries no longer need be
invertible; a category is like a Monoid, but the symmetries no longer need to be composable.
In contrast to a set, which consists of a static collection of objects, a category consists not
only of objects but also of morphisms which can be viewed as processes transforming one
object into another. Similarly, in a 2-category, the 2-morphisms can be regarded as processes
between processes, and so on.
Coming to an end: A category with one object is a Monoid and the classical definition of
a Monoid is this: A set S with an associative binary product and a unit element 1 such that a1
= 1a = a for all a in S. Monoids abound in Mathematics and they are, in a sense, the most archetypal algebraic structures.
46
Dimitris Gavalas
oid R to Set, is to give a set X with an endomap t, <X, t>, for every real number t. We must
ensure, of course, that 0= 1 and s+t= st. We can think of X as the set of states of a system which, if it is in the state x at a certain time, then t units of time later it will be in the state
t(x) (Baez, 1996; Lawvere & Schanuel, 2005).
16. The Archetype of Number as Monoid and its Interpretation as the Set
of Numbers
There is only one archetype for number, which belongs to the existential subsoil of humans. One cannot refer to his own number archetype, but only to the one and only number
archetype. This is the principle according to which Mathematics -and not only- is formulated.
Man is carrier of this archetype and contains an image or idea or model in his non-conscious
mind and, perhaps, brain. This archetype is inaccessible and unmodified, but man can capture
its manifestations. These last ones and their consequences are the only things that we know,
since at bottom we do not know the nature of the archetype itself. This point is not a paradox
if we consider that neither for energy we know something, only its manifestations and its consequences. We simply can say that all these come from the region of hyper-personal factors
which lie not on the surface of the consciousness, but on the deepest ends of man. Because
this region is much older than man and is the presupposition of his life, we call it divine in
contrary to the human. Lets not forget that the initial meaning of Mathematics and especially
of number and of geometrical figures was divine and magical. Therefore, Mathematics as
such is psychogenic that is spontaneous psychic fact, product of non-conscious procedures.
This is independent on the fact that these first divine hints are elaborated and are used consciously by the human factor
Number is one of the most important archetypes and may be the womb of all the others. It
is an archetype of order which has become conscious. Wherever exists order also exists structure, which is expressed numerically or geometrically and therefore Mathematics comes in.
Hence the archetype of number is one but the imprints are many. The question is: Which one
of these many imprints of number -that is numbers as we know and use them- are really different between them? We said before that the natural numbers produce all known numbers
and the majority of Mathematics: N Z Q R C. But as we know not all natural
numbers are of the same kind. Instead, there are the prime and the composite natural numbers
and according to the Fundamental Theorem of Arithmetic every composite is analyzed
uniquely in a product of prime numbers. Therefore, the primes are adequate to produce all
natural numbers, which produce all the others and the biggest part, if not all, of Mathematics.
If we denote with P the set of all primes, then we have: N Z Q R C. This
means that the primes are the atoms of mathematics and play an analogous role with Chemistry elements: They produce all numbers.
Since the number archetype is unique, we can consider it as the one and only object of a
Monoidal category and to represent it as . All arrows in this category are endomaps of this
unique object. There are a lot of arrows in this category all arrows are from to , since is
the unique object. As arrows, we can consider all natural numbers and therefore 0, 1 etc. are
arrows from to . Thus, we can write:
On Numbers Nature
47
...
As an arrow composition, we can choose the multiplication of natural numbers, that is the
composition of two arrows/ numbers is their product nom=nm. Because there is only one object, every pair of arrows must be composible and indeed the composition/ multiplication satisfies this convention. If 1 is identical then must 1n = n = no1 for every n. Therefore must
be 1 = 1. Such a category is called Monoidal, if it contains just one element. Next, we can
interpret this category to the well-known and most familiar category of sets Set.
If we name this Monoidal category, with composition of arrows the multiplication,
then Set: N, the unique object of is interpreted as the set of natural numbers
and that is why every arrow in -a natural number- is interpreted as an arrow from the set of
naturals to itself:
fn: N N: x fn(x) = nx, with f1 = 1N and fnfm = fnm.
All these show that the objects correspond to objects, arrows correspond to arrows, the
composition holds and the identity corresponds to identity. Therefore holds the structure of
the category. Such a transportation of one category to another, which retails the structure, is
called functor. Of course a functor must retail domain and co-domain but especially here this
happens automatically, since all arrows have the same domain and co-domain.
The conventional paradigm of interpretation of a Monoidal category to the category of
sets Set is the following: The object of the Monoidal category is interpreted as the set of arrows of the Monoidal category and in this way we always take a functor from the Monoidal
category to the category of sets Set. Therefore, the object , which is the archetype of number, is interpreted as the set of the naturals N. This means that the imprints of the archetype
are the natural numbers.
But furthermore we can consider as arrows not natural numbers but rationals and to have
in this way the inverses that is invertible arrows. And even further we can consider as arrows
all real numbers and in the same way, as above, to interpret the object/ archetype as the set of
real numbers. In this way we take all numbers, from naturals to the reals. We can interpret the
archetype of number as the set of the reals. May be it is possible to consider as 2-morphisms
the complex numbers or any other allowed procedure between numbers:
48
Dimitris Gavalas
Archetypal Aspect
*: Archetype-as-such
1: Archetypal Images
2: Archetypal Ideas
3: Archetypal Effect
4: Projection to the outer World.
Correspondence to Mathematics
Mathematical Archetypes, especially
natural numbers and geometrical continuum
Intuitionism
Platonism
Formalism - Logicism
Applied Mathematics, Mathematics as
Science, Empiricism.
The figure, which comes from Jungs view, and the correspondence, which I think is
natural, show that the different views on Mathematics are just the different levels of realizing/
understanding archetypes and all together belong to the same wholeness. Therefore the different views are not necessary to be considered as competitive or as contradictions but as complementary; that depends on which level of the archetype one realizes according to ones nature and consciousness.
On Numbers Nature
49
Goodman (1979, 1990 and 1991) for instance and others (Atiyah et al., 1994; Jaffe &
Quinn, 1993), conceive and deal with level 4 that is the projection to the outer world. This
shows that they have not realized their projections and are not interested in finding from
where they come and what exactly they mean. Pythagoras instead is placed in the center that
is he works out the essence of archetype. Formalists and logicians are affected by archetypes
action, but do not examine the subject further and therefore they need no interpretations; the
syntactic part suffices for them and they do not search for the meaning, which in this way
remains hidden.
In my view, the course from the centre to the circumference, faces all aspects and illuminates all elements, while simultaneously unifies all philosophical views of Mathematics. Thus
a particular mathematical issue should be firstly reached by its center, the archetype, and
tracked till its applications and only then is it complete. For this reason I insist on the archetypal view of Mathematics, because all the others have been done in a way or another and up
to a point, while the archetypal view has been abandoned.
50
Dimitris Gavalas
ally both the one and the other, then what is the meaning of this double nature and
what exactly are they doing? Therefore, we pass from the either one or the other
to both the one and the other, which reminds us the dialectical synthesis, the Zen
Logic, but also the Fuzzy Logic (Kosko, 1994).
(vi) How is exactly been structuralized and formulated the object/ archetype from the arrows/ numbers which have double nature? With this procedure the object/ archetype is self-structured and self-formulated. Which exactly is the specific structure
and form that it takes?
(vii) Since we can, by the same model/ Monoidal category, produce all numbers and to
have in this way from a basic skeleton various imprints, then on the one hand we
vindicate mathematically the view about the archetype and on the other hand we
have infinite outcoming arrows, that is all numbers, therefore the maximum intension in one and the only object, that is the minimum extension and thats exactly
what Jung defines as psyche: It might be that the psyche should be understood as
unextended intensity. Intensification at the expense of extension. Psyche = highest
intensity in the smallest space. But this exactly shows that the Pythagoreans,
Plato, Xenokrates (: Psyche is automotive number), Jung are right sustaining that
number is a pre-existing element of the world, archetype, qualitative, worlds
structuring and formulating procedure, model of order etc.
(viii) The provision of the object with endomaps makes it a dynamical system. What
happens with such a dynamical system, where the object is the archetype, endomaps are numbers and there are 2-morphisms that are procedures of second grade?
If we consider the above then we reach to the conclusion that the number archetype can
be represented as a Monoidal category, where the object/ archetype is interpreted, to the archetypal category Set, as the set of all numbers. There are abeyances: How shall we define
numbers as procedures, which are the individual differences of these procedures and how
shall we define the 2-procedures as procedures between procedures?
EPILOGUE
The above discussion shows that a different view on number is mathematically and philosophically feasible. This view brings out the other side of the number, that is the dynamic
and the psychic. Indeed, number is presented as a vivid qualitative reality, which we must
reach -except all the others- and through the inner experience. Number is not just only for
use but something else too, the nature of which we must discover. It is a universal principle,
with divine existence: Because number is universal it is also divine and vice versa. The
scientific attitude and the zeitgeist, favoring the sensual things, capture and limit us mostly in
the senses. Thus they do not allow us to deal with principles and archetypes investigation.
However, the different aspect on number would alter Mathematics to that it was in the past: A
discipline which deserves to be investigated beyond utilitarianism.
The realization of this aspect has impacts not only to the scientific encounter of number,
but also to the didactic methodology. In parallel to the traditional aspect on number as a multitude of objects and a means of numbering, we must teach appropriately the aspect of the
On Numbers Nature
51
dynamic procedure and the archetypal psychic factor. Indeed, it is likely this aspect to be
closer to students nature and mans generally, than the prevalent one.
The methods of Gdel and Cohen intend to show that the Continuum Hypothesis (CH)
does not have answer inside Set Theory and its extensions. The same holds for the Axiom of
Choice as well for the Axiom of the Infinite. But the above three propositions express the
foundational principles for the sets, which are true in the classical frame, but are obviously
different from the principles the other simpler axioms express; it is understandable why the
former cannot be proven by the latter only with Logic. The Continuum Hypothesis has the
texture of a typical mathematical problem, which should be solved with some proof, but it
seems that the appropriately enlarged consciousness is missing in order to discover the congruent axioms.
A lot have been said about the independence of CH on the known axioms of Set Theory
and many have appealed it in order to sustain that there is no objective reality behind the
typical axiomatic outcomes of the discipline. But with Gdels method of numerization, the
problems of proof existence are translated into austere technical conjectures on numbers.
There are such conjectures, as CH, that are independent on all generally accepted axioms of
Mathematics, but we do not deny the objective reality of natural numbers because of it.
Such propositions are of the form: If ZFC is consistent, then T (where T is some powerful
extension of ZFC which implies the consistency of ZFC) is consistent.
But from Goedels Second Incompleteness Theorem, it is implied that such propositions
are independent on ZFC and there are examples of such propositions of which the truth is
controversial. Of course there is no lack of important problems that do not admit solution in
ZFC, but CH is the most basic and important of all these. Since it has not yet been decided
whether CH is true or not, then if we consider all set as true/ real, may be we can convince
ourselves that CH can be true or false. Then we must find a new axiom adequate enough to
answer to the relative question. And since such an axiom has not been found it remains to our
free will to accept or reject CH. The expansion of the initial limitations, as well as of our consciousness will contribute to some answers, according to my view. The Hypothesis of Archetypes and the consideration of number as archetype, contribute indeed towards this direction.
According to Jung we must discern between the archetype-as-such -being dynamically
present in every structure- and the manifested archetype -which becomes cognizable and
comes in the realm of consciousness. The manifested archetype appears as image, which its
form can vary and adjust to the environment as a way of action, procedure, stance, idea, belief, experience etc. All these, if are activated under certain circumstances, are emerged by
their non-conscious up to now situation and become visible in a way. Thus, the archetype can
manifest not just in a static form but with a dynamic procedure; in reality all typical human
manifestations of life, biological, psychic, spiritual stand on an archetypal basis.
We can correspond the archetype-as-such, its static form, to being and the manifested
archetype, its dynamic form, to becoming. Then, according to what we said above the first
correlates to Cantorian Mathematics, while the second to non-Cantorian Mathematics. Therefore, the essence of Mathematics is at Cantorian Mathematics, while its presence to nonCantorian ones. In the first case we find a clear and lucid level of reality while in the second
case a situation chaotic, fuzzy and vague. It is obvious that while mathematicians go deeper
and deeper into situations of enlarged knowledge and consciousness they will bring to light
bigger and bigger parts of the number archetype which is the basis of Mathematics, as we
52
Dimitris Gavalas
saw. So, the core of Mathematics is given to man in a natural way as archetype and is the best
for the human nature and its environment.
The continuous expanding of consciousness discovers new properties of number and of
Mathematics. Finally though, it seems that a central part of this core will never become conscious to man, but will remain in the non-conscious realm of the non-perceptual; in the opposite case man would possess the whole knowledge, something superhuman. Until then man
can study with the aid of his means the presence of archetypes and number, conceiving only
shreds of its essence, just like Cantor, Gdel and Jung did, despite Mac Lanes allegation that
all these are just a glorious fantasy. It is obvious that without the essence, the thing itself,
neither presence, nor manifestation, nor expression exists, since in order to be shown the
change of presence is needed the steadiness of the essence. The adoption of a complementarity and relativity principle, as far the absolute and local Mathematics concerns, as Bell (1986)
calls it, seems necessary if we wish a holistic encounter of the subject.
REFERENCES
Arendt, H. (1958). The Human Condition. Univ. of Chicago Press, Chicago, Ill.
Atiyah, M. et al. (1994). Responses to Jaffe, A. & Quinn, F.: Theoretical Mathematics: Towards a Cultural Synthesis of Mathematics and Theoretical Physics. Bulletin of the
AMS, 30(2).
Baez, J. (1996). This Weeks Finds in Mathematical Physics. (Week 74, 80, 89). URL: http://
math.ucr.edu/home/baez/week*.html.
Bell, J. L. (1986). From Absolute to Local Mathematics. Synthese, 69, 409-426.
Benacerraf, P. (1965). What Numbers Could Not Be. Philosophical Review, 74, 47-73.
Bernays, P. (1950/ 1976). Mathematische Existenz und Widerspruchsfreiheit. In
Abhandlungen zur Philosophie der Mathematik. Wissenschaftliche Buchgesellschaft,
Darmstadt.
Boolos, G. (1986). Saving Frege from Contradiction. Proceedings of the Aristotelian Society,
87, 137-151.
Boolos, G. (1987). The Consistency of Freges Foundations of Arithmetic. In Thomson, J. J.
(ed.), On Being and Saying. MIT Press, Cambridge, MA, pp. 3-20.
Campbell, J. I. D. (Ed.) (2005). Handbook of Mathematical Cognition. Psychology Press, An
Imprint of Taylor and Francis.
Cantlon, J. F., Brannon, E. M., Carter, E. J. & Pelphrey, K. A. (2006). Functional imaging of
numerical processing in adults and 4-y-old children. PLoS Biol, 4(5), 125.
Card, C. R. (1991). The Archetypal View of C.G. Jung and W. Pauli. Psychological Perspectives, 24, 19-33 & 25, 52-69. (Los Angeles: C. G. Jung Institute).
Card, C. R. (1993). The Archetypal Hypothesis of W. Pauli and C.G. Jung: Origins, Development and Implications. In K. V. Laurikainen and C. Montonen, eds., Proceedings of
the Symposium on the Foundations of Modern Physics - 1992 Helsinki, Finland (pp.
139-151). World Scientific Publishing Co, Singapore.
Card, C. R. (1995). A New Archetypal Science. Psychological Perspectives, 31, 62-64.
On Numbers Nature
53
Card, C. R. (1996). The Emergence of Archetypes in Present-Day Science and its Significance
for a Contemporary Philosophy of Nature. Konigshausen & Neumann, Wurzburg, Germany.
Card, C. R. (2000). The Emergence of Archetypes in Present-day Science and their Significance for a Contemporary Philosophy of Nature. In B. Goertzel, A. Coombs & M. Germine (eds.). Mind in Time. Hampton Press, Creskoll, N.J.
Cohen, E. D. (1975). C. G. Jung and the Scientific Attitude. Philosophical Library, NY.
Cohen, P. J. (1963). The Independence of the Continuum Hypothesis I. Nat. Acad. Scien.
USA, 50, 1143-1148.
Cohen, P. J. (1964). The Independence of the Continuum Hypothesis II. Nat. Acad. Scien.
USA, 51, 105-110.
Cohen, P. J. (1966). Set Theory and the Continuum Hypothesis. W. A. Benjamin, Inc, NY.
Conway, J. H. (1976). On Numbers and Games. Academic Press, London.
Dantzing, T. (1954). Number and the Language of Science. MacMillan Co, NY.
Dedekind, R. (1888/ 1963). The Nature and Meaning of Numbers. In R. Dedekind, Essays on
the Theory of Numbers (trans. W. Beman). Dover, N.Y.
Dehaene, S. (1997a). The Number Sense. Oxford University Press, NY.
Dehaene, S. (1997b).The American Pi versus the French Pi?
www.edge.org/discourse/hersh_number.html
Dehaene, S. (1997c). What Are Numbers, Really? A Cerebral Basis for Number Sense
www.edge.org/3rd_culture/dehaene/index.html
Dehaene, S. (1999). The Number Sense: How the Mind Creates Mathematics. Penguin Books,
London.
Dehaene, S. (2001). Prcis of the Number Sense. Mind & Language, 16 (1), 1636.
Dehaene, S. (2003). The Neural Basis of the WeberFechner Law: A Logarithmic Mental
Number Line. Trends in Cognitive Sciences, 7(4), 145-147.
Dehaene, S., Molko, N., Cohen, L. & Wilson, A. J. (2004). Arithmetic and the Brain. Current
Opinion in Neurobiology, 14(2), 218-224.
Dummett, M. (1991). Frege: Philosophy of Mathematics. Duckworth, London.
Ernest, P. (1995). The Philosophy of Mathematics Education. Falmer Press, London.
Eves, H. (1983). Great Moments in Mathematics: After 1650. MAA, Washington, DC.
Ewald, W. B. (ed.) (1996). From Kant to Hilbert: A Source Book in the Foundations of
Mathematics. Clarendon Press, Oxford.
Fischer, M. H. & Rottmann, J. (2005). Do negative numbers have a place on the mental number line? Psychology Science, 47(1).
Franz, M.-L. von (1974). Number and Time. Rider, London.
Franz, M.-L. von (1980). On Divination and Synchronicity: The Psychology of Meaningful
Chance. Inner City Books, Toronto.
Franz M.-L. von (1992). Psyche and Matter. Shambhala, Boston & London.
Frege, G. (1884/ 1980). The Foundations of Arithmetic: A Logico-Mathematical Enquiry into
the Concept of Number. [trans. J. L. Austin]. Blackwell, Oxford.
Frege, G. (1893-1903/ 1967). Basic Laws of Arithmetic. [trans. M. Furth]. University of California Press, Berkeley, CA.
Gavalas, D. (1999). A Four-sided View of Function. FLM, 19(2), 38-41.
Gbel, S., Walsh, V. & Rushworth, M. F. S. (2001). The Mental Number Line and the Human Angular Gyrus. NeuroImage, 14(6), 1278-1289.
54
Dimitris Gavalas
Gdel, K. (1931). ber Formal Unentscheidbare Stze der Principia Mathematica und
Verwandter Systeme. Monatshefte fr Mathematik und Physik, 38, 173-198.
Gdel, K. (1958). The Consistency of the AC and of the GCH. Princeton University Press,
Princeton, NJ.
Gdel, K. (1947). What is Cantors Continuum Problem? American Mathematical Monthly,
54(9), 515-525.
Goodman, N. D. (1979). Mathematics as an Objective Science. American Mathematical
Monthly, 86(7), 540-551.
Goodman, N. D. (1990). Mathematics as Natural Science. The Journal of Symbolic Logic,
55(1), 182-193.
Goodman, N. D. (1991). Modernazing the Philosophy of Mathematics. Synthese, 88, 119-126.
Gough, W. C. & Shacklett, R. L. (1993). Science of Connectiveness. Part I: Modelling a
Greater Unity. Subtle Energies, 4(1), 57-76.
Hardy, G. H. (1992). A Mathematicians Apology. Cambridge University Press, GB.
Heck, R. (1993). The Development of Arithmetic in Freges Grundgesetze der Arithmetik.
Journal of Symbolic Logic, 58(2), 579-600.
Heijenoort, J. van (1967). From Frege to Gdel: A Source Book in Mathematical Logic,
18791931. Harvard University Press, Cambridge, MA.
Heinze, R. (1965). Xenokrates: Darstellung der Lehre und Sammlung der Fragmente. Georg
Olms Verlagsbuchhandlung, Hildesheim.
Hersh, R. (1997). What Kind of Thing Is a Number? A Talk with Reuben Hersh.
www.edge.org/3rd_culture/hersh/hersh_p1.html
Hilbert, D. (1900). On the Number-Concept. In Foundations of Geometry. Teubner, Leipzig
and Berlin.
Hill, S. R. (1992). Concordia: The Roots of European Thought. Gerald Duckworth, London.
Hofstadter, D. R. (1982). Analogies and Metaphors to Explain Gdels Theorem. Two -Year
College Mathematics Journal, March, 98-114.
Iamblichus (1922). Theologoumena Arithmeticae. Edidit Victorius de Falco. (Bibliotheca
Scriptorum Grecorum et Romanorum Teubneriana). Teubner, Leipzig.
Jaffe, A. & Quinn, F. (1993). Theoretical Mathematics: Towards a Cultural Synthesis of
Mathematics and Theoretical Physics. Bulletin of the AMS, 29(1).
Jung, C. G. (1957-1977). Collected Works. (CW). Princeton University Press, Princeton, NJ.
(Bollingen Series XX), 20 vols.
Jung, C. G. & Pauli, W. (1955). The Interpretation of Nature and the Psyche. Pantheon
Books, NY.
Kosko, B. (1994). Fuzzy Thinking: The New Science of Fuzzy Logic. Harper Collins Publishers, London.
Lakoff, G. & Nez, R. E. (2000). Where Mathematics Comes from: How the Embodied
Mind Brings Mathematics Into Being. Basic Books.
Lawvere, F. W. & Schanuel, S. H. (2005). Conceptual Mathematics: A First Introduction to
Categories. Cambridge University Press, Cambridge, UK.
Mac Lane, S. (1986). Mathematics: Form and Function. Springer-Verlag, NY.
Mac Lane, S. & Moerdijk, I. (1992). Sheaves in Geometry and Logic: A First Introduction to
Topos Theory. Springer-Verlag, NY.
Maddy, P. (1992). Realism in Mathematics. Clarendon Press, Oxford, GB.
McLarty, C. (1994). Numbers Can Be Just What They Have To. Nos, 27, 487-98.
On Numbers Nature
55
Meier, C. A. (1992). W. Pauli und C.G. Jung: Ein Briefwechsel. Springer-Verlag, Berlin.
Meier, C. A. (ed.) (2001). Atom and Archetype: The Pauli/ Jung Letters, 1932-1958. Preface
by Beverley Zabriskie. Princeton University Press, Princeton, N.J.
Nagel, E. & Newmann, J. R. (1973). Gdels Proof. New York University Press, NY.
Nagy, M. (1991). Philosophical Issues in the Psychology of C.G. Jung. SUNY Press, Albany.
Nelson, E. (1977). Internal Set Theory: A New Approach to Nonstandard Analysis. Bulletin
of the AMS, 83(6), 1165-1198.
Nelson, E. (1988). The Syntax of Nonstandard Analysis. Annals of Pure Appl. Logic, 38(2),
123-134.
O Meara, D. J. (1990). Pythagoras Revived. Oxford Scholarship Monographs, GB.
Pauli, W. (1955). The Influence of Archetypal Ideas on the Scientific Theories of Kepler. In
C. G. Jung and Wolfgang Pauli, The Interpretation of Nature and the Psyche. Pantheon
Books, NY.
Peat, F. D. (1987). Synchronicity: The Bridge between Matter and Mind. Bantam, NY.
Potter, M. (1998). Routledge Encyclopaedia of Philosophy. Routledge, London.
Priest, G. (1998). Routledge Encyclopaedia of Philosophy. Routledge, London.
Principia Cybernetica. On line: pespmc1.vub.ac.be
Ramachandran, V. S. & Blakeslee, S. (1998). Phantoms in the Brain: Probing the Mysteries
of the Human Mind. William Morrow, NY.
Resnik, M. (1981). Mathematics as a Science of Patterns: Ontology and Reference. Nos, 15,
529-50.
Resnik, M. (1982). Mathematics as a Science of Patterns: Epistemology. Nos, 16, 95-105.
Robertson, R. (1995). Jungian Archetypes: Jung, Gdel and the History of Archetypes. Nicolas-Hay Publishers, York Beach, Maine.
Robertson, R. (1989). The Evolution of Number: The Archetype of Order.
www.secamlocal.ex.ac.uk/~mwatkins/isoc/jungianNT.htm
Rucker, R. (1988). Mind Tools: The Mathematics of Information. Penguin Books, NY.
Shapiro, S. (1983). Mathematics and Reality. Philosophy of Science, 50, 523-48.
Shapiro, S. (1989). Logic, Ontology, Mathematical Practice. Synthese, 79.
Stevens, A. (1982). Archetypes: A Natural History of the Self. Routledge and Kegan Paul,
London
Uspensky, V. A. ( 1987). Gdels Incompleteness Theorem. Mir Publishers, Moscow.
Vopenka, P. (1979). Mathematics in the Alternative Set Theory. Teubner, Leipzig.
Waerden, B. L. van der (1975). Science Awakening . Kluwer Academic Publishers B. V.
Warner, R. & Szubka, T. (Eds.) (1995). The Mind-Body Problem: A Guide to the Current
Debate. Blackwell, Cambridge, USA.
Waterfield, R. (1988a). The Theology of Arithmetic: On the Mystical, Mathematical and
Cosmological Symbolism of the First Ten Numbers. Attributed to Iamblichus. Phanes
Press.
Waterfield, R. (1988b). Emendations of [Iamblichus], Theologoumena Arithmeticae (De
Falco). The Classical Quarterly, New Series, 38(1), 215-227.
Weyl, H. (1927/ 1949). Philosophy of Mathematics and Natural Science. Princeton University Press, Princeton, NJ.
Wittgenstein, L. (1974). Philosophical Investigations. Blackwell, Oxford, GB.
Wright, C. (1983). Freges Conception of Numbers as Objects. Aberdeen University Press,
Aberdeen.
56
Dimitris Gavalas
Zalta, E. (1998). Freges Logic, Theorem and Foundations of Arithmetic. Stanford Encyclopaedia of Philosophy. plato.stanford.edu/entries/frege-logic/Q0.html.
Zalta, E. (1999). Natural Numbers and Natural Cardinals as Abstract Objects: A Partial Reconstruction of Freges Grundgesetze in Object Theory. Journal of Philosophical Logic,
28(6), 619-660.
Chapter 2
ABSTRACT
As will be seen, the mathematical apparatus of the fuzzy theory of fuzzy sets provides a natural basis for the theory of the possibility as well described [1]. Viewed in this
perspective, a fuzzy restriction may be interpreted as a possibility distribution with its
membership function playing the role of possibility distribution function. This principle
will be described in this chapter.
INTRODUCTION
In traditional designs, the optimization problem is stated in precise mathematical terms.
However, in many real world problems, the design data, objective function and constraints are
stated in vague and linguistic terms. It appears that it is more reasonable to have a transition
state from absolute permission to absolute non-permission. This implies that the constraint is
to be stated involving vague and imprecise information. In the literature several applications
of the fuzzy logic in optimization have been reported. [2, 3, 4 and 5].
A historical review about fuzzy mathematical programming points to Bellman and Zadeh
[5] in a first category treating decision-making problem under fuzzy goals and constraints for
first time. The fuzzy goals and constraints represent the flexibility of the target values of objective functions and the elasticity of constraints. From this point of view, this type of fuzzy
mathematical programming is called the flexible programming. The second category in fuzzy
mathematical programming treats ambiguous coefficients of objective functions and con*
E-mail: criverol@eng.uwi.tt
58
C. Riverol
straints but does not treat fuzzy goals and constraints. Dubois and Prade [6] treated systems of
linear equations with ambiguous coefficients suggesting the possible application to fuzzy
mathematical programming from the first time. A remarkable development was done by
Kuzmin [7]. He introduced four inequality indexes between fuzzy numbers based on the possibility theory into mathematical programming problems with fuzzy coefficients. Since the
fuzzy coefficients can be regarded as possibility distributions on coefficient values, this type
of fuzzy mathematical programming is usually called the possibilistic programming
In fact, using possibilistic optimization approach, a solution can be achieved that provides
a maximum degree of overall satisfaction [8, 9 and 10] . To determine an optimal solution,
decision problems may be formulated as a fuzzy decision model, particularly when the available data are known exactly though varying within a tolerance limit. The coefficients of some
constraints may be fuzzy numbers and the original fuzzy problem is transferred into a crisp
satisfactory model [11]. In this paper, a Fuzzy Linear Programming (FLP) model subjected to
some linear fuzzy constraints [10, 11 and 12] as well as some crisp constraints, have been
developed and transferred into a crisp model.
59
the nature of decision making in the presence of fuzzy/possibilistic uncertainties are quite
different in semantics and optimization procedures since fuzzy optimization optimizes over
sets of numbers and possibility optimizes over sets of distributions.
A possibilistic linear function value cannot be determined uniquely since its coefficients
are ambiguous, i.e, non-deterministic [16]. Thus, the objective, maximizing or minimizing a
possibilistic function and the constraint that a possibilistic linear function value is not greater
than a certain value do not specifically make sense. To make them clear; consider the following equations:
A ( B) = sup min( A (r ), B (r ))
N A ( B) = inf max(1 A (r ), B (r ))
(1)
where B is the membership function of the fuzzy set B. A (B ) evaluates to what extent it is possible that the possibilistic variable, , restricted by the possibility distribution A
is in the fuzzy set B. On the other hand, NA(B) evaluates to what extent it is certain that the
possibilistic variable restricted by the possibility distribution A is in the fuzzy set B.
Let be a possibilistic variable. In context to the above example, let B = (, g ] , i.e.,
B be a crisp (non-fuzzy) set of real numbers, which is not greater than g. Then we obtain the
following indexes by possibility and necessity measures defined by:
(2)
(3)
Pos( g ) and Nes( g ) show the possibility and certainty degrees to what extent
is not greater than g. Those indexes using a membership triangular function as example are
depicted in Figure 1.
Similarly, letting B = [ g ,+ ) , we obtain the following two indices:
(4)
(5)
Pos( g ) and Nes( g ) show the possibility and certainty degrees to what extent
is not smaller than g. Those indexes are depicted in Figure 2. Thus we can get the possibility and certainty degrees to what extent a possibilistic linear function value is not greater
(smaller) than a given real number.
60
C. Riverol
g.
61
g.
62
C. Riverol
414-552 kPa where the ethane is pyrolyzed to the primary products of hydrogen, methane and
ethylene, along with a mixture of smaller amounts of C3 to C5 hydrocarbons. The effluent
leaves the furnace at 350-450 kPa and 833-972K. The furnace effluent is cooled in a transfer
line exchanger where the steam is recovery. Seven equations to describe the pyrolysis of ethane:
C2 H 6 C2 H 4 + H 2
(6)
C 2 H 4 + 2 H 2 2CH 4
(7)
(8)
C 2 H 4 2C + 2 H 2
(9)
C2 H 4 C2 H 2 + H 2
(10)
(11)
C 2 H 4 0.333C6 H 6 + H 2
(12)
For developing the model, the necessity and possibilistic measures indicated the equations (2 and (3). The model consists in a nlinear objective function and linear constraints. The
final model is as follow:
Min C i x i
n
(13)
Where C are the costs. The major costs used in this model are:
x2
FC ( x 900)
p
3
Cost of furnace: C F = C FB
63
Nec a i xi bi
(a )x + (a
Pos aij xi bi
(a )x + (1 )(a
ai xi bi
(14)
ai xi bi
(15)
Where is the level or degree of optimism for the satisfaction of the constraint.
Here ai and bi are triangular fuzzy numbers: 0 / ai / ai and 0 / bi / bi crisps and
[0 1]
with =0.0, 0.25, 0.50, 0.75 and 1.00 is used (these values were selected arbitrarily). Any values between [0 1] can be used. The values of a and b can be found in the Tables 1 and 2.
Table 1. ai fuzzy intervals
Minimum
Average
Maximum
Ethane Conversion
(x1)
0.55
0.59
0.62
Steam/hydrocarbon
ratio (x2)
0.45
0.52
0.67
Inlet temperature
(x3)
833
910
972
Inlet pressure
(x4)
414
490
522
Table 2. bi values
Variable
Ethane Conversion (x1)
Value
1.00
0.8
980 K
455 kPa
Since the furnace has to be thermally efficient to be economical, the optimum combination of variables will tend to balance in the total cost. In Table 3 is shown the values of the
decision variables to different degree of optimism. The optimum values were obtained when
the degree of optimism is equal to 1.0, where: the conversion is equal to 0.61, the
steam/hydrocarbon ratio is equal to 0.61, the inlet temperature is 865K and the inlet pressure
is 445 kPa.
64
C. Riverol
NC2 H 4 * N H 2 * P
N C 2 H 6 * N * 4.99 10 7
is below 0.65, the composition of the effluent gas is more according to our filed data and the
heat flow was below 14200 kJ/m2K.
It is worth noting that the result can change if another fuzzy function is used (S-shape or
Gaussian). We used triangular fuzzy function because this function adjusted satisfactory to
our data. Moreover, the objective function is independent of the average used because the
possibility and necessity measures are satisfied of the same manner.
Table 3. Composition of the effluent gas at different degrees of optimism and
operating conditions
Component/
H2
CH4
C2H2
C2H4
C2H6
C3H6
C3H8
C4
C5
0.00
35.6
5.2
0.21
33.3
23.8
1.2
0.19
0.45
1.15
0.25
34.8
5.2
0.15
32.8
23.8
0.9
0.19
0.45
1.18
0.50
35.3
4.9
0.16
33.1
24.6
0.9
0.18
0.49
1.18
0.75
34.7
4.8
0.16
32.6
23.7
0.91
0.18
0.45
1.17
1.00
35.0
5.2
0.15
33
23.6
0.91
0.19
0.44
1.13
CONCLUSION
Real world problems are not usually so easily formulated as mathematical models or
fuzzy models. Sometimes qualitative constraints and/or objectives are almost impossible to
represent in mathematical forms. The fuzzy solutions have not yet been investigated considerably. In this chapter depicts as a fuzzy programming can be useful in the formulation of
problems of any branch of the engineering, especially in relations to the roles which these
concepts play in natural languages in order to simulate the remarkable human ability to attain
imprecisely defined goals in a fuzzy environment.
REFERENCES
[1]
[2]
[15]
[16]
[17]
65
Chapter 3
ABSTRACT
This work proposes a new consensus scheme for group decision making, which allows one to obtain a consistent collective opinion, from information provided by each expert in terms of multigranular fuzzy estimates. It is based on a linguistic hierarchical
model with multigranular sets of linguistic terms, and the choice of the most suitable set
is a prerogative of each expert. From the human viewpoint, using such model is advantageous, since it permits each expert to utilize linguistic terms that reflect more adequately
the uncertainty level intrinsic to his evaluation. From the operational viewpoint, the advantage of using such model lies in the fact that it allows one to express the linguistic information in a unique domain, without information losses, during the discussion process.
Such consensus scheme is applied in the analysis of a multicriteria decision problem,
generated with the use of the Balanced Scorecard methodology for enterprise strategy
planning. Three techniques for multicriteria analysis, based on fuzzy preference relation
modeling, are considered. They permit the evaluation, comparison, selection, prioritization, and/or ordering of alternatives with the use of both quantitative and qualitative estimates. With the availability of different techniques, the most appropriate one can be chosen, considering possible sources of information and its uncertainty.
P. Bernardes: patib@pucminas.br
P. Ekel: ekel@pucminas.br
*R. Parreiras: roberta.parreiras@terra.com.br
68
1. INTRODUCTION
Multiperson multicriteria decision making involves many complex and conflicting aspects intrinsic to human individuality and human nature. For instance, when a team of experts
takes part in the decision process, it is expected that their opinions disagree. Frequently, each
member of the group has different information at hand and partially shares the goals of the
other members. Thus, a satisfactory solution is the one that is the most acceptable by the
group as a whole, as a unanimously best solution almost never exists.
Besides, diverse types of uncertainty are often encountered in a group decision process.
The main uncertainty factors are related to the decision-makers (DM) role; the individual
judgments concerning the importance of each criterion and the preferences for alternatives
[1]. Fuzzy set theory might provide the needed flexibility to adequately deal with such uncertainty factors [1-3]. Particularly, in the multiperson multicriteria decision analysis, the use of
linguistic terms has been considered a realistic way to express the subjectivity and uncertainty
intrinsic to human preferences [4,5].
Each linguistic estimate is characterized by both a label (syntactic value) and a meaning
(semantic value). The label can be a word or sentence from a linguistic term set. The meaning
is a fuzzy set defined in a universe of discourse. When characterizing an object, the linguistic
term set adopted to express this information should have more or less terms, in accordance
with the uncertainty degree of the DM perception. The DM can make mistakes if he is enforced to make more precise judgments than he is capable. On the other hand, a substantial
loss of information may happen if the DM is enforced to make less precise judgments. In
other words, the granularity of uncertainty (i.e., the size of the linguistic term set utilized to
express the information) is a relevant parameter from the linguistic model and is intimately
related to the validity of using this model [4,5].
In this context, a methodology for solving multiperson multicriteria decision problem in a
fuzzy environment, with multigranular linguistic term sets, is introduced. It consists in a consensus scheme, based on a fuzzy aggregation model where the linguistic term sets are structured as a linguistic hierarchy [4]. The advantage of using such hierarchical model lies in the
fact that it permits the multigranular linguistic information to be expressed in a unified linguistic domain without loss of information [4].
The term consensus scheme is utilized here to denote a dynamic and iterative process,
where the involved experts discuss a multicriteria decision problem, under the supervision of
a moderator. All experts are invited to evaluate the alternatives, taking into account each criterion, on the basis of linguistic terms, organized as a linguistic hierarchy of linguistic terms.
The choice of the most adequate set to express the preferences is a prerogative of each DM.
At each cycle of the discussion process, the most discordant member of the group is identified, with the use of an index that reflects the discordance level among the experts, and invited to update his opinion.
The proposed consensus scheme has some positive aspects: it involves simple calculus; it
is intuitive, flexible and easy to use. Furthermore, it admits a computational component for
executing supervision functions that are usually delegated to a human moderator. In order to
demonstrate its usefulness, the consensus scheme is utilized in order to solve an enterprise
strategy planning problem, generated with the use of the Balanced Scorecard methodology
[6]. The multicriteria analysis is performed on the basis of thee different procedures described
69
in [7,8]. These procedures have been successfully applied in diverse areas such as: power engineering [9], management [10] (including group decision problems [11]), and naval engineering [12]. It should be emphasized that the possibility to obtain different solutions on the
basis of each approach is to be considered natural. The most appropriate procedure should be
chosen, considering possible sources of information and its uncertainty.
The set of alternatives X = {x1 , x2 ,..., xn } is finite, discrete and contains two or
more alternatives.
The set of criteria C = {c1 , c2 ,..., cm } (according to which the alternatives are evalu-
ated and compared) contains two or more criteria of qualitative or quantitative nature.
The team of experts involved in the decision process, E = {e1 , e2 ,..., eq } , contains
~y
rion is represented as Fk ( xi ) .
All experts are supposed to give their preferences on the basis of linguistic term sets
from the same linguistic hierarchy.
3. LINGUISTIC HIERARCHY
In the group decision context, each professional involved has his own perception of the
problem. Hence, each DM may feel more comfortable using a different linguistic term set to
express his preferences. Besides, frequently, the criteria, which are to be taken into account in
the process of decision making, are reflected by data of very different nature (for instance,
"comfort of operation", "flexibility of development", etc.). As a consequence, each DM may
prefer to utilize a different linguistic term set for each criterion. It is also common to meet, in
practice, circumstances where, when considering a single criterion, a DM chooses a linguistic
term set to evaluate one alternative and another linguistic term set (for instance, with lower
granularity) to evaluate other. In this context, the proposed consensus scheme provides sets of
linguistic terms with different sizes, organized as a linguistic hierarchy. The choice of the
most satisfactory linguistic term set is always a prerogative of each DM.
A linguistic hierarchy consists in a set of levels, being each level a linguistic term set
with different granularity from the remaining levels of the hierarchy [4]. It must be constructed on the basis of the following rules:
70
the modal points of the membership functions of each level must be preserved in the
following level;
the transition between successive levels must be smooth. Each new linguistic term is
added between pairs of terms from the previous level. A graphical representation of a
linguistic hierarchy of three levels is shown in Figure 1.
l , i = round(b),
(b) = i
a = b i.
(1)
The inverse function that provides the value of b associated with a 2-tuple is given by
1 (li , a) = i + a = b .
(2)
Assume that t is an index that specifies the level of the hierarchy and that n(t) is the
granularity of the linguistic term set of level t. Given a linguistic hierarchy, the transformation
t
t'
function TFt ' from a label li in level t to a label l j in level t ' can be defined as:
(3)
71
In order to exemplify the use of (3), consider the linguistic hierarchy shown in Figure 1.
3
The transformation from a label l1 in level 3 to a label l j in level 1 is carried out as:
1 (l13 ,0)(3 1)
(1 + 0)2 = (0.25) = (l 1 ,0.25) .
=
TF32 (l13 ,0) =
9 1
8
It is worth mentioning that, in this chapter, we deal with hierarchies whose linguistic term
sets have an odd value for their respective granularity and whose membership functions are
trapezoidal-shaped, symmetrical and uniformly distributed in the interval [0,10]. The central
label represents the indifference concept.
ual estimates. All operations are performed in terms of the parameters b y , y=1,...,q, already
translated to the same level t from the linguistic hierarchy. It may be interesting to translate
all opinions to that level t of the hierarchy, which was used by the majority of the specialists,
in order to maintain the uncertainty level intrinsic to most of the judgments.
Given the distance (which can be considered a discordance measure) between the opinions of the yth expert and of the zth expert, calculated on the basis of the parameter b:
d yz =| byt bzt | ,
each weight Cy, y {1,..., q} is calculated as follows:
(4)
72
Cy =
n(t ) d yz
.
wz
z =1 z y
n(t )
q
(5)
In (5), the parameter wz is the importance weight associated with the opinion of ez, satisq
fying
w
y =1
= 1 . A human moderator must specify these weights, taking into account the
experience or knowledge of each expert: higher weights should be associated with the opinions of those expets who have deeper knowledge on the problem. As in [14,15], the influence
of ey in determining the collective estimate is higher when ey agrees with the experts whose
importance weights wz, z {1,2,..., q} z y are higher.
The parameter bc associated with the collective estimate is determined by the weighted
sum of individual estimates, on the basis of the parameter b as follows:
q
b = C z bz .
c
(6)
z =1
Cy =
Cy
C
z =1
It is interesting to observe in (5) that lower values of dyz correspond to higher values of
Cy. Thus, it can be said that the proposed aggregation model emphasizes the more concordant
opinions. Finally, the pair (li,a) associated with bc can be obtained by using Equation (1).
4. CONSENSUS SCHEME
Usually, in an organization, the decisions require multiple perspectives of different experts, as a unique person may not have enough knowledge on the problem to solve it alone.
Naturally, each expert may have different information at hand and a distinct subjective perception of the problem (which results in different opinions and preferences). In this way, the
group should aim at achieving a satisfactory solution, rather than the best solution, as it hardly
exists in practice. Classically, the term consensus is defined as a unanimous concordance
among all involved individuals. But, in practice, such definition is unsuitable for three main
reasons [4]:
73
In view of that, a concept of consensus level, denoted index of soft consensus, was proposed [19]. It allows evaluating not only crisp values: 1 for full and unanimous agreement and
0 for nonexistence of agreement, but also intermediate values between 0 and 1, corresponding
to partial agreement among all experts. Inspired on this key idea, several researchers have
developed consensus schemes (see [1,13,17-19], for instance).
The proposed consensus scheme has some positive aspects. It is simple, has intuitive appeal and admits a computational component for executing functions that are usually delegated
to a human moderator. Such component corresponds to a procedure that regulates the discussion process, supported by the discordance and consensus measures described next. It should
be emphasized that such measures must be computed after the fuzzy estimates given by the
experts are translated to the same level t of the hierarchy.
The discordance level between each expert ey, y {1,..., q} and the collective opinion is
given by the normalized distance:
dy =
| by b c |
n(t )
(7)
The consensus level is measured with the use of the following equation:
q
G=
y =1
n(t ) d y
q
(8)
The whole discussion process can be interrupted when any of the following conditions
are fulfilled:
The procedure that implements the guidance system for the discussion process is shown
next. It is assumed that elast is a vector utilized to store the index of the expert requested to
update his opinion, at each cycle; maxcycle stores the maximum number of cycles and must
be specified by a human moderator; minconsensus stores the minimum acceptable level of
consensus.
Guidance Procedure
Step 1) Initialize cycle=1, elast(cycle)=1 and ask the moderator to specify the value of the
input parameter minconsesus.
Step 2) Collect the opinion of each specialist.
Step 3) Identify the hierarchy level used by most of the specialists and make the needed data
translations to this level.
Step 4) Calculate the collective opinion.
74
Step 5) Calculate the discordance level for each specialist and the consensus level achieved
by the group.
Step 6) If the maximum number of iterations or the minimum consensus level is achieved, go
to Step 10. If none condition is satisfied, go to Step 7.
Step 7) Identify the most discordant expert and verify, in vector elast, if he has been the most
discordant expert for the last two cycles. If it is true, repeat Step 7 for the second most
discordant expert and so on (in order to avoid to the same expert to be excessively requested).
Step 8) Add 1 to the value of variable cycle; store the index of the expert selected in Step 7 in
elast(cycle) and invite him to update his opinion.
Step 9) Collect the opinion of the selected expert and go to Step 3.
Step 10) Interrupt the procedure. The output data is the fuzzy estimate indicated by the index
c
i=round( b ).
these matrices, on the basis of fuzzy or linguistic estimates Fk ( X i ) , specified by the special-
Rk ( X j , X i ) =
sup
(9)
sup
(10)
X i , X j X
Fk ( X i ) Fk ( X j )
X i , X j X
F k ( X j ) F k ( X i )
75
if the kth criterion is associated with maximization. If the kth criterion is associated with
minimization, then (9) and (10) are written for Fk ( X i ) Fk ( X j ) and Fk ( X j ) Fk ( X i ) ,
respectively.
The nonstrict fuzzy preference relation Rk can be represented by a strict fuzzy preference relation Pk and an indifference relation I k : Rk = Pk I k . The strict preference relation Pk is constituted by all pairs of alternatives that satisfy the conditions: ( X i , X j ) Rk
and ( X j , X i ) Rk . If ( X i , X j ) Pk , it can be said that Xi is strictly better than Xj (or Xi
dominates Xj). The indifference relation, on the other hand, is constituted by all pairs of alternatives that simultaneously satisfy the conditions: ( X i , X j ) Rk and ( X j , X i ) Rk . If
( ( X i , X j ) ( Rk )
is equivalent to
Pk ( X i , X j ) = max{ Rk ( X i , X j ) Rk ( X j , X i ), 0} .
(11)
The use of (11) permits one to carry out the choice of alternatives. In particular, as
Pk ( X j , X i ) describes the set of all alternatives X i that are strictly dominated by X j , its
compliment Pk ( X j , X i ) corresponds to the set of alternatives that are not dominated by
other alternatives from X . Therefore, in order to meet the set of alternatives from X that
are not dominated by any other alternative, it suffices to obtain the intersection of all
nd
R k ( X i ) = inf {1 Pk ( X j , X i )} = 1 sup Pk ( X j , X i ) ,
X j X
(12)
X j X
(13)
76
nd
nd
nd
are actually nonfuzzy nondominated and can be considered as the nonfuzzy solution for the
choice problem.
Expressions (11)-(13) may be used to solve choice or ranking problems not only with a
single criterion, but also with multiple criteria. Having at hand nonstrict preference relations
for each criterion, one possible procedure for solving multicriteria problems consists in obtaining a global relation through the intersection of these relations:
G ( X i , X j ) = min{ R1 ( X i , X j ),..., Rm ( X i , X j )} .
(14)
In this case, Equations (11)-(13) can be applied, taking into account the global relation
(14). The resulting fuzzy set of nondominated alternatives fulfills the role of a Pareto set. This
set can be contracted, in a subsequent analysis, where the importance of each relation Rk ,
k=1,,m is differentiated through their weighted aggregation:
m
T ( X i , X j ) = k Rk ( X i , X j ) .
(15)
k =1
In (15), the weights (or importance factors) of each criterion must satisfy the conditions:
k > 0 , k=1,,m;
k =1
the membership function T ( X i ) of the set of nondominated alternatives, following a procedure similar to the one described above for the global relation G ( X i , X j ) , which involves Equations (11)-(13). Finally, the nondominance level can be obtained by performing
nd
nd
(16)
(17)
X i X
The second procedure has a lexicographic character. It consists in a step-by-step introduction of criteria for comparing alternatives. In this case, a sequence X1, X2,, Xm, such that
nd
Rk ( X j ) = infk 1{1 Pk ( X j , X i )} = 1 sup Pk ( X j , X i ) , k = 1,..., m ,
X i X
X i X k 1
(18)
77
(19)
X j X k 1
In the third procedure, the use of (12) permits one to construct the membership functions
of the set of nondominated alternatives for each fuzzy preference relation. The membership
nd
functions Rk ( X i ) , k=1,,m play a role identical to membership functions replacing objective functions Fk ( X ) , k=1,,m in analyzing < X , M > models [7]. Therefore, in order to
obtain X
nd
, it is possible to construct:
nd ( X i ) = min nd
Rk ( X i ) .
1 k m
(20)
(21)
It should be mentioned that the use of (21) does not require the normalization of
k ,
6. APPLICATION EXAMPLE
The enterprise's board of directors, which includes five members (e1,,e5), is to plan the
development of large projects (strategy initiatives) for the following five years. Four possible
projects (X1, X2, X3, and X4) have been marked. It is necessary to compare these projects to
select the most important of them, as well as order them from the point of view of their importance, taking into account four criteria (categories) suggested by the Balanced Scorecard
methodology (it should be noted that all of them are of the maximization type):
c1) financial perspective,
c2) the customer satisfaction,
c3) internal business process perspective,
c4) learning and growth perspective.
First, the specialists are asked to give their opinion relative to each project in terms of
fuzzy estimates, using the linguistic variables from the linguistic hierarchy shown in Figure 1.
The semantic values (trapezoidal fuzzy sets) corresponding to the labels from this hierarchy
are given in Table 1. The professionals involved are considered of the same importance, except for e1, whose opinions are judged more important. Therefore, the parameters wz are set
as: w1=0.3 and wz=0.175, z=2,,5. The parameter minconsensus is specified as 0.85 by the
moderator. It is interesting to observe that the proposed consensus scheme allows the discussion process to be divided into several sections (more specifically m n sections), being each
78
section related to a specific alternative and a specific criterion. Only the sections regarding
the criterion c1 and alternative X1 are exposed here.
At the first cycle, as shown in Table 2, the consensus level is lower than the threshold parameter minconsensus specified by the moderator. In this way, as the expert e5 is the most
discordant one, he is invited to update his opinion. The data concerning the second cycle is
shown in Table 3. As it can be seen, the expert e5 made only a small change in his evaluation
and remained as the most discordant member of the group. Consequently, he is invited to review his opinion again.
Table 1. Fuzzy numbers associated with the linguistic terms of the linguistic hierarchy
Level
t=1
t=2
t=3
Granularity
3
Label
Fuzzy number
(0, 0, 0.5, 5)
1
0
l11
l21
l02
l12
(0, 2, 3, 5)
l 22
l32
(5, 7, 8, 10)
l 42
l03
l13
l23
(1.25, 2, 3, 3.75)
l33
l43
l53
l63
(6.25, 7, 8, 8.75)
l73
l83
e2
e3
e4
e5
2
0
3
2
l13
3
4
2
3
0.16
0.18
Opinion
Discordance
Consensus level
0.27
0.79
0.05
0.40
Group
2.42
79
e2
e3
e4
e5
2
0
3
2
l13
3
4
3
6
0.16
0.18
Opinion
Discordance
Consensus level
0.27
0.79
0.04
Group
2.42
0.40
Table 4 presents the data collected at the third cycle of the discussion process. Although
e5 remained as the most discordant expert, as he had been already invited twice to review his
opinion, now e1 is invited (he is the second most discordant expert). It can be seen in Table 5
that, at the fourth cycle, the consensus level finally achieves a satisfactory value. Therefore,
the procedure is interrupted and the output estimate is given by (2.74) = (l33 ,0.26) .
Table 4. Fuzzy estimates given by each expert at cycle=3
e1
e2
e3
e4
e5
2
0
3
2
l13
3
4
3
5
0.15
0.19
Opinion
Discordance
Consensus level
0.26
0.82
0.03
Group
2.31
0.30
e2
e3
e4
e5
2
1
3
2
l13
3
4
3
5
0.19
0.14
Opinion
Discordance
Consensus level
0.08
0.85
0.08
Group
2.74
0.25
c2
c3
c4
3
3
2
3
2
4
l12
l 42
l63
l32
l73
l33
l 23
l 43
l13
l53
l73
l 42
X1
X2
l32
X3
X4
The collective opinions related to each alternative, obtained with the use of the consensus
scheme, are exposed in Table 6 and illustrated in Figures 2-5. Having calculated the collective
estimates, the following comparison matrices, corresponding to the collective nonstrict fuzzy
preference relations, are obtained for each criterion, using (9) and (10):
80
1
1
R1 =
1
1
0.63
1
1 0.91 1 ,
1
1
R2 =
0
1
1 1
0
0
0 1
0.91 0
1
0.45
R3 =
0
0.91
1 1
1 1
1 1 ,
1 0
1 1
1
0.45
0
1 0
1 1 0.83 ,
1 1
1
0.63 .
R4 =
1 0.45
0 1 0
1
0
1 1 1
1
1
1 1
81
82
The strict preference relations Pk, k=1,,4 can be obtained by applying (11) to each nonstrict preference relation Rk:
0
0
1
0
P1 =
1 0.09
0
0
0
0
0
0
1
0
0.37
1
, P2 =
0
1
0
0
0 0.55
0
0
P3 =
0
0
0 0.17
1 0.09
0
0
0
1
1
0
0
0.55
, P4 =
0.55
0
0
0
0
1
0
0.37
1
1
0
0
0
0
1 0.09
1
1
,
0
0
1
0
0
0
.
0
Let us consider the application of the first procedure for analyzing <X, R> models. The
aggregation of R1, R2, R3, and R4 into R, using (14), results in
1
0.45
R=
0
0
0
0
1 0.91 0.63
0 1
0
0
0
1
(22)
The strict fuzzy preference relation is derived from (22), using Equation (11):
0
0.45
P=
0
0
0
0
0 0.91 0.63
.
0
0
0
0
0
0
(23)
nd
Rk
= [0.55 1 0.09 0.37] . Thus, according to the first procedure for analyzing multic-
nd
R1
level
of
each
alternative
is
calculated
applying
(18)
to
P1 :
83
0 0.09
P2 =
.
0
0
The nondominance level of X1 and X4 is given by: R2 = [1 0.91]. Therefore, the use
nd
nd
0.91 1 0] ,
R1 = [0
nd
0] ,
R 2 = [0.63 1 0
nd
0 0.91]
R3 = [1 0.45
and
nd
0.63 0 1] . The global nondominance level of each alternative is obtained on
R4 = [0
the basis of (20):
nd = [0 0.45 0 0] .
Hence, according to the third procedure, the alternatives X1, X3, and X4 are undistinguishable and we have X 2 ; X 1 ~ X 3 ~ X 4 .
CONCLUSION
The present work introduced a consensus scheme for analyzing decision problems, which
allows aggregating the opinions of multiple experts into a collective opinion. Each expert is
invited to evaluate the alternatives in terms of multi-granular linguistic terms that are organized as a linguistic hierarchy structure. The proposed consensus scheme has some positive
aspects: it has an intuitive appeal and involves simple calculus; it admits a computational
component for regulating the discussion process; it can be coupled to different procedures for
analyzing multicriteria problems. However, it is important to mention that loss of information
happens at the final step of the proposed consensus scheme, when the output data is generated
(more specifically, when the a parameter, which reflects the difference of information between bc and its nearest integer value, is eliminated).
In order to demonstrate the usefulness of the presented consensus scheme, three different
decision procedures based on analyzing <X, R> models are utilized for solving a hypothetical
enterprise strategy planning problem, generated with the use of the Balanced Scorecard methodology, by a group of experts.
ACKNOWLEDGEMENTS
This research is supported by the National Council for Scientific and Technological Development of Brazil (CNPq) - grant 302406/2005-0 and the State of Minas Gerais Research
Foundation (FAPEMIG) - grant TEC 00140/07.
84
REFERENCES
[1]
[2]
[3]
[4]
[5]
J. Lu, G. Zhang, D. Ruan, and F. Wu, Multi-objective Group Decision Making: Methods, Software and Applications with Fuzzy Set Techniques, Imperial College Press,
London, 2007.
H. J. Zimmermann, Fuzzy Set Theory and Its Application, Kluwer Academic, Boston,
1990.
W. Pedrycz and F. Gomide, An Introduction to Fuzzy Sets: Analysis and Design, MIT
Press, Cambridge, 1998.
F. Herrera and L. Matnez, A model based on linguistic 2-tuples for dealing with multigranular hierarchical linguistic contexts in multi-expert decision-making, IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics, vol. 31, 2001, pp. 227234.
F. Herrera and E. Herrera-Viedma, Linguistic decision analysis: steps for solving decision problems under linguistic information, Fuzzy Sets and Systems, vol. 115, 2000, pp.
67-82.
[9]
[10]
[11]
[12]
[13]
[14]
[15]
P. Ya. Ekel and F. H. Schuffner Neto, Algorithms of discrete optimization and their
application to problems with fuzzy coefficients, Information Sciences, vol. 176, 2006,
pp. 2846-2868.
P. Ya. Ekel, M. Menezes, and F. Schuffner Neto, Decision making in fuzzy environment and its application to power engineering problems, Nonlinear Analysis: Hybrid
Systems, vol. 1, 2007, pp. 527-536.
R. C. Berredo, P. Ya. Ekel, E. A. Galperin, and A. S. Sant'anna, Fuzzy preference modeling and its management applications, in Proceedings of the International Conference
on Industrial Logistics, Montevideo, 2005, pp. 41-50.
P. Bernardes, P. Ekel, J. Kotlarewski, and R. Parreiras, Fuzzy set based multicriteria
Decision making and its applications, in Progress on Nonlinear Analysis, Nova Science
Publisher, Hauppauge, 2008, pp. 247-272.
R. C. Botter and P. Ya. Ekel, Fuzzy preference relations and their naval engineering
applications, in Proceedings of the XIX Congress of the Panamerican Institute of Naval
Engineering, Guayaquil, 2005, Paper 7-8.
E. Herrera-Viedma, F. Herrera, F. Chiclana, A consensus model for multiperson decision making with different preference structures, IEEE Transactions on Systems, Man
and Cybernetics Part A: Systems and Humans, vol. 32, 2002, pp. 394-402.
H. M. Hsu and C.T. Chen, Aggregation of fuzzy opinions under group decision making,
Fuzzy Sets and Systems, vol. 79, 1996, pp. 279-285.
C. Lu, J. Lan, and Z. Wang, Aggregation of fuzzy opinions under group decisionmaking based on similarity and distance, Journal of Systems Science and Complexity,
vol. 19, 2006, pp. 63-71.
85
[16] Z. Xu, Group decision making based on multiple types of linguistic preference relations, Information Sciences, vol. 178, 2008, pp. 452-467.
[17] H. S. Lee, Optimal consensus of fuzzy opinions under group decision making environment, Fuzzy Sets and Systems, vol. 132, 2002, pp. 303315.
[18] D. Ben-Arieh and Z. Chen, Linguistic-labels aggregation and consensus measure for
autocratic decision making using group recommendations, IEEE Transactions on Systems, Man and Cybernetics - Part A: Systems and Humans, vol. 36, 2006, pp. 558-568.
[19] J. Kacprzyk and M. Fedrizzi, A soft measure of consensus in the setting of partial
(fuzzy) preferences, European Journal of Operational Research, vol. 34, 1988, pp. 316325.
[20] J. Fodor, and M. Roubens, Fuzzy Preference Modelling and Multicriteria Decision
Support, Kluwer Publishers, Boston, 1994.
[21] S. A. Orlovski, Decision making with a fuzzy preference relation, Fuzzy Sets and Systems, vol. 1, 1978, pp. 155-167.
Chapter 4
K. Balasubramanian
Center for Image Processing and Integrated Computing,
University of California Davis, Livermore, CA, USA
Chemistry and Applied Material Science Directorate, Lawrence Livermore National
Laboratory, University of California, Livermore, CA, USA
Glenn T. Seaborg Center, Lawrence Berkeley Laboratory, University of California,
Berkeley, CA, USA
INTRODUCTION
This chapter applies combinatorial and group-theoretical relationships to the study of periodicity in atomic and molecular spectroscopy. The relationship between combinatorics and
both atomic and molecular energy levels must be intimate since the energy levels arise from
the combinatorics of the electronic or nuclear spin configurations or the rotational or vibrational energy levels of molecules. Over the years we have done considerable work on the use
of combinatorial and group-theoretical methods for molecular spectroscopy [115]. The role
of group theory [140] is evident since the classification of electronic and molecular levels
has to be made according to the irreducible representations of the molecular symmetry group
of the molecule under consideration. Combinatorics plays a vital role in the enumeration of
electronic, nuclear, rotational and vibrational energy levels and wave functions. As can be
seen from other chapters in this book, the whole Periodic Table of the elements has a mathematical group-theoretical basis since the electronic shells have their origin in group theory.
Indeed, this concept can even be generalized to other particles beyond electrons such as bosons or other fermions that exhibit more spin configurations than just the bi-spin orientations
of electrons.
A version of this chapter was also published in The Mathematics of the Periodic Table, edited by D.H. Rouvray
and R.B. King published by Nova Science Publishers, Inc. It was submitted for appropriate modifications in an
effort to encourage wider dissemination of research.
88
K. Balasubramanian
It has been shown that Einsteins special theory of relativity is quite important for classifying the energy levels of very heavy atoms and molecules that contain very heavy atoms
[4148]. This is because to keep balance with the increased electrostatic attraction in heavier
nuclei having a large number of protons, the core electrons of such heavy atoms must move
with considerably faster average speeds. We have shown, for example, that the averaged
speed of the 1s electron of heavier atoms such as gold is about 60% of the speed of light.
Consequently, ordinary quantum mechanics does not hold, and one needs to invoke relativistic quantum mechanics to deal with such heavy atoms and with molecules containing very
heavy atoms. We have defined relativistic effects as the difference in the observable properties of electrons as a consequence of using the correct speed of light compared to the classical
infinite speed.
Mathematically, the introduction of relativity results in a double group symmetry owing
to the spin-orbit coupling term [41], which is a relativistic term in the Hamiltonian. This is a
natural symmetry consequence of the LS spin-orbit operator, which changes sign upon rotation by 360. Thus, the periodicity of the identity operation, which is normally envisaged as a
rotation through 360, is no longer the identity operation of the group. This is illustrated in
Figure 1 with a Mbius strip, which exemplifies the double group symmetry. As one completes a 360 rotation along the Mbius surface there is a sign change since one goes from the
inside of the surface to the outside. This requires the introduction of a new operation R in the
normal point group of a molecule that corresponds to the rotation by 360 which is not equal
to E, the identity operation. Hence we have to make use of the double group and doublevalued representations in both atomic and molecular spectroscopy.
Figure 1. A Mbius strip exemplifying the double group relativistic periodicity. The introduction of spin-orbit
coupling into the relativistic Hamiltonian changes the periodicity of the normal point group symmetry into a
double group symmetry, as rotation through 360 is not the identity operation. Note that the Mbius strip
changes sign in this operation. Generalization of this to other complex phases results in Berrys phase, where
rotation through 360 may yield exp(2i/n), thus resulting in other kinds of periodicity.
89
The double group consists of twice the number of operations as the normal point group
but is not a simple direct product of the normal point group and another group. This is a consequence of the fact that only some of the conjugacy classes of the normal point group generate new conjugacy classes upon multiplication by the operation R. The other conjugacy
classes, which are called two-sided operations, such as the C2 rotations, double in order instead of generating new classes. This is because such operations when multiplied by R become equivalent to the operation, and thus the new operations belong to the same conjugacy
class as the corresponding old operations. This feature complicates double group theory and
the resulting periodicity of the double group. A characteristic feature is the generation of
even-dimensional double-valued representations that characterize half-integral quantum numbers. We shall discuss this in one of the ensuing sections.
In this chapter we shall consider the mathematical basis of atomic periodicity and spectroscopy with the use of group theory and combinatorics. We shall also consider the combinatorics of unitary groups and Young diagrams and their connections to the electronic spin functions. We shall also discuss molecular periodicity by considering the combinatorial basis of
molecular electronic states. We describe the double groups and the periodicity arising from
the classification of states in the double group. We expound on the combinatorics and periodicity pertinent to the rotational levels, nuclear spin functions, and rovibronic levels of molecules and give some examples.
90
K. Balasubramanian
tions have certain periodicities and patterns as enumerated by the Schur functions of the
symmetric groups Sn. The representation theory of the symmetric group is well known
[17, 20, 50], and we will not repeat it here.
The irreducible representations of Sn may be characterized by Young diagrams for the
various partitions of the integer n, denoted by [n]. The states of many particles (including
bosons and fermions) that possess multiple spin orientations can be represented by generalized Young Tableaus (GYTs). For example, Figure 2 shows all of the possible GYTs for the
partitions of six occupied by six particles that have three spin orientations (for example, a
spin-1 particle such as the bosonic deuterium nucleus) with the possibility that two have the
first kind of spin orientation, two have second kind and the last two particles have the third
kind. We have denoted this [122232] shape as shown in Figure 2.
1
2 3
2 3
1
3
2 2
1 1
2
3
2 3
2 2
1 1
2 3
1 1
1
3
Figure 2. Generalized Young Tableaus (GYTs) for the partition of six for a spin 1 boson (e.g., deuterium)
corresponding to the spin distribution of two particles with the first spin orientation, two with the second
orientation, and two with the third or [122232] shape.
As can be seen from Figure 2, the GYTs have numbers in any column in strictly ascending order while the numbers in any row must be in non-decreasing order. These tableaus represent the nuclear spin functions that transform according to the particular irreducible representation that the diagram represents. It is interesting to note that for a spin-1 particle such
GYTs can have at the most three rows and, likewise for electrons, which are spin 12 particles,
the GYTs can have at the most two rows. In general for a spin-j particle there can be at most
only 2j + 1 rows in the GYTs.
91
The enumeration of the GYTs for the various shapes of the spin distributions is a fundamental problem that is common to electronic and nuclear structures. In the context of manyelectron spin functions, the graphical unitary group approach requires the enumeration of
Gelfand states which are the GYTs containing two rows. The results also have some interesting periodicity trends in the mathematical sense. These GYTs and the associated spin multiplets and spin states can be enumerated by polynomials called the Schur functions of the
symmetric group Sn. The Schur function corresponding to a partition of n is denoted by {}
and is defined in the following way:
1
{} = n!
(g)s1b s2 b snbn
1
(1)
gG
where (g) is value of the character for g in the group G = Sn corresponding to the irreducible representation [] of the group Sn. To illustrate this, the Schur function corresponding to
the partition 4 + 1 + 1 is given by the Schur function, {6;4,1,1}, shown below:
{6;4,1,1} =
1
120
(2)
The Schur function is the generator for the GYTs, and is obtained by replacing every sk in
the Schur function or S-function by ik. The coefficient of a typical term 1a1 2a1 mam in
i
the generating function thus obtained yields the number of GYTs with the shape [1a12a1mam
]. The GYT generators are so powerful that they also enumerate the atomic states when applied to electronic spin functions which are GYTs with only two rows.
As an illustration of GYT generation, let us consider the partition 2 + 1 for three particles.
Let the particle under consideration be a spin-1 boson, which has three spin orientations that
we depict symbolically as 1, 2 and 3. The S-function in this case is given as:
1
(3)
(4)
The above generating function thus obtained from the S-function generates all of the
GYTs shown below in Figure 3 for all possible spin distributions or shapes for the partition 2
+ 1.
The enumeration technique can be applied to GYTs of any shape belonging to any particle with any spin shape and spin distribution. The method is not restricted to just spin 1 or
spin 12 particles.
92
K. Balasubramanian
2 2
1 2
Figure 3. All possible GYTs corresponding to the partition 2 + 1 as enumerated by the S-function
{1,2,3;2,1}.
We can use the above method to generate all of the possible spin states for a manyelectron system or all of the possible atomic spectral energy levels for a given open-shell
electronic configuration. First, we illustrate the method for obtaining all of the possible electronic spin states. The GYTs for electrons may contain at most two rows since there are only
two possible distinct spin orientations for an electron ( and ) and thus there cannot be more
than two rows. Accordingly, only certain partitions are allowed for an electron. This means
that the GYTs can be formed only by the integers 1 and 2. Each spin distribution or spin
shape then contains representations that are sums of the GYTs with the appropriate shape. For
example for a system of six electrons with five spins up and one spin down there are exactly
two GYTs as shown in Figure 4.
2
Figure 4. The GYTs for six electrons with five spin ups and one spin down.
Figure 5. The many-electron spin multiplets for an even number of electrons; there are exactly N cells and at
most two rows for the spin functions.
The [1a12a1] GYTs enumerate states with a total spin quantum number
Mz = (a1 a2)/2. Consequently, once the GYTs are sorted out according to their total Mz val-
93
ues we obtain the spin multiplets for the many-electron systems. A neat set of periodic spin
multiplets are obtained for such many-electronic systems. These are shown in Figures 5 and
6, respectively, for even and odd numbers of electrons. This important result was made possible by use of the periodic S-functions..
The method of S-functions is powerful and general in that it can be applied to more than
electrons. Thus, the same method can be applied to other particles that have integral spins
such as the deuterium nuclear spin functions or to the cases with multinomial spin distributions. In such cases the diagrams become more complex with many more rows depending on
the particles. For a spin 1 particle the diagrams have three rows at most. For a spin j particle
the diagrams will have up to (2j + 1) rows yielding an array of complex spin multiplets.
Next we demonstrate the periodic power of the S-function for enumerating the possible
electronic states of an atom [16] which are well known as atomic term symbols in atomic
spectroscopy. The method is completely analogous to generating the GYTs and manyelectron spin multiplets demonstrated above. The only difference is that we obtain a generating function for the different ML projections and spin projections and the total function must
comply with the Pauli Exclusion Principle, as electrons are fermions. The method can be applied from simple cases, e. g., main group open-shells such as p2, p3, to more complex lanthanides and actinides that have fm open-shell f-electrons (Table 1). For example, consider the
most complex half-filled 5f7 shells. The possible electronic states sorted according to the total
spin and total angular momentum in compliance with Paulis Principle are given by:
2
S(2), 2P(5), 2D(7), 2F(10), 2G(10), 2H(9), 2I(9), 2J(7), 2K(4),2M(2), 2N, 2O
S(2), 4P(2), 4D(6), 4F(5), 4G(7), 4H(5), 4I(5), 4J(3), 4K(3),4M, 4N
6 6
S, P, 6D, 6F, 6G, 6H, 6I
8
S
4
Table 1. All possible atomic term symbols for all actinides and lanthanides.
Shell
f1/f13
f2/f12
f3/f11
f4/f10
f5/f9
f6/f8
f7
States
F
1 1 1 1 3 3 3
S D G I P F H
2 2
P D(2) 2F(2) 2G(2) 2H(2) 2I 2J 2K 4S 4D 4F 4G 4I
1
S(2), 1D(4), 1F(1), 1G(4), 1H(2), 1I(3), 1J, 1K(2), 1M,
3
P(3) 3D(2) 3F(4) 3G(3) 3H(4) 3I(2) 3J(2) 3K 3L
5 5 5 5 5
S D F G I
2
P(4), 2D(5), 2F(7), 2G(6), 2H(7), 2I(5), 2J(5), 2K(3),2L(2), 2M 2N
4 4
S P(2) 4D(3) 4F(4) 4G(4) 4H(3) 4I(3) 4J(2) 4K 4L
6 6 6
P F H
1
S(4), 1P. 1D(6), 1F(4), 1G(8), 1H(4), 1I(7), 1J(3), 1K(4), 1L (2), 1M(2), 1O
3
P(6) 3D(5) 3F(9) 3G(7) 3H(9) 3I(6) 3J(6) 3K(3) 3L(3) 3M 3N
5 5 5
S P D(3) 5F(2) 5G(3) 5H(2) 5I(2) 5J 5K
7
F
2
S(2), 2P(5), 2D(7), 2F(10), 2G(10), 2H(9), 2I(9), 2J(7), 2K(5) 2L(4),2M(2),
2
N, 2O
4
S(2), 4P(2), 4D(6), 4F(5), 4G(7), 4H(5), 4I(5), 4J(3), 4K(3),4M, 4N
6 6
S, P, 6D, 6F, 6G, 6H, 6I
8
S
2
94
K. Balasubramanian
Figure 6. The many-electron spin multiplets for an odd number of electrons; there are exactly N cells and at
most two rows for the spin functions.
The mathematical aspect of periodicity in atomic states is dependent on the orbital angular momentum of the electrons and spins as exemplified by the S-function generator used
above for the generation of atomic term symbols.
Yet another aspects of periodicity involves the molecular electronic states. The electronic
configurations themselves consist of two parts, namely the spin part that was generated using
the S-functions and space types that can also be generated using multinomial generators. In
certain cases, as shown by the author, the orbital degeneracy can bring out additional symmetry. A space type can be imagined as a distribution of electrons in boxes such that a permutation of electrons within a box does not generate a new space type and the boxes themselves
can be permuted if the orbitals are degenerate. Such groups are called wreath product groups.
Balasubramanian [7] used this group theory combined with combinatorial multinomial generating functions to generate electronic space types. This can be illustrated for the benzene delocalized orbital electrons. The periodic generating function for the number of space types
of an n-orbital electronic configuration is given by:
F = (1 + w + w2)n
(5)
where the coefficient of wm gives the number of space types with m electrons distributed
among these n orbitals. For the case of benzene with six electrons distributed among six
orbitals we seek the coefficient of w6 with n = 6 in the above generating function. This is
given by:
6
6
6
1 + 3 + 2 2 2 + 4 1 1 = 141
(6)
These 141 space types of benzene enumerated here are divided into equivalence classes
of space types according to the symmetry equivalence from the wreath product groups in-
95
duced by orbital degeneracy. As is well known, the six orbitals of benzene are divided into
1 + 2 + 2 + 1 equivalence classes of orbitals. Thus, switching of the orbitals in the second and
third set leads to equivalences, and the electrons can themselves be switched in each orbital.
The result is a direct product of wreath product groups as shown below:
S2 S2[S2] S2[S2] S2
(7)
The cycle index polynomial of the totally symmetric representation of the above group
generates the equivalence classes of the space types from the well-known Plya Theorem [1,
5260]. Consequently, the cycle index and the generating functions for the case of benzene
are as follows.
P=
F=
{ (s
1 4
8 1
(8)
1 2
{2 (1 + w + w2)2}
28
(9)
The coefficient of w6 in the above generating function can be seen to be 58, which suggests that for benzene 141 space types are divided into 58 equivalence classes. Table 2 gives
the number of equivalence classes of the space types for the various atoms that exhibit
equivalence among the p orbitals.
Table 2. Equivalence classes of the space types for the electronic
configurations of atoms that have degenerate p orbitals.
System
He
Li
Be
B
C
N
O
F
Equivalence Classes
17
42
86
148
223
295
349
368
In summary, we have shown that the electronic configurations of molecules and atoms
can be simplified using the mathematical periodicity of the spin functions and space types.
The former case was accomplished using the S-functions of the symmetric permutation
groups Sn while the latter case was simplified using the wreath product configuration symmetry groups.
96
K. Balasubramanian
We shall start with an application of permutational periodic structure in molecular spectroscopy. Indeed, the rotational energy levels of a molecule themselves have periodicities
based on their point groups. We illustrate this with an icosahedral cluster, namely N20 [37]
and C60 [2933] systems. Consider the highly energetic regular dodecahedral N20 cluster [37],
which exhibits icosahedral symmetry analogous to that in the fullerene C20. Since 14N is a
spin 1 particle it exhibits an interesting generating function and nuclear spin species distribu-
97
tion. The generalized character cycle indices for all of the irreducible representations for the
N20 cluster with Ih symmetry are shown in Table 3. These were constructed using the orbit
structures of permutations as demonstrated in Figure 7.
The cycle indices for the various irreducible representations were obtained by multiplying the periodic orbit structures of each permutation by the corresponding character values.
Note that the resulting polynomials are the same for the T1g and T2g representations and likewise the T1u and T2u representations since the orbit structures multiplied by their character
values become identical owing to accidental degeneracy. We have used our generalization [1,
56, 56] of Plyas Theorem for all characters to seek generating functions for the nuclear
spin species of 14N. Note that since the 14N nucleus is a spin 1 particle, we replace every xk in
the cycle index in Table 3 by k + k + k where the symbols , and stand for 1, 0 and 1
spin projections of the spin 1 14N nucleus.
The resulting generating functions for the nuclear spin functions are shown in Table 4.
The generating functions shown in Table 4 have two parts, one consisting of coefficients and
the other of the trinomial ijk. We do not show k since k = 20 i + j) and it can thus be deduced from the values of i and j. To illustrate how the generating functions in Table 4 are obtained, let us consider the T1g or the T2g representation. From Table 3 we obtain the GCCI for
this representation and we make the substitution given by
GFx = PGx (xk k + k + k)
(10)
(11)
98
K. Balasubramanian
Table 3. The GCCIs for the dodecahedral N20 cluster.
N20
Order
Ag
Au
T1g=T2g
T1u=T2u
Gg
Gu
Hg
Hu
120
1
1
1
3
3
4
4
5
5
54
24
1
1
1
2
1
2
1
1
0
0
1236
20
1
1
0
0
1
1
1
1
210
15
1
1
1
1
0
0
1
1
210
1
1
1
3
3
4
4
5
5
102
24
1
1
1
2
1
2
1
1
0
0
263
20
1
1
0
0
1
1
1
1
1428
15
1
1
1
1
0
0
1
1
99
The coefficients thus enumerated in Table 4 can be sorted according to their total MF values where the term l has the projection 1, m has the projection 0, and v has the projection +1.
Thus the term ijk in Table 4 represents a total nuclear spin quantum number MF of (i + k).
When these coefficients are sorted according to their total MF values, they separate into nuclear spin multiplets with MF values ranging typically from I, I+1, I+2,.0,.I2, I1, I.
Such a multiplet would represent a nuclear spin multiplet with a multiplicity of 2I + 1. In this
way for each irreducible representation the nuclear spin multiplets are separated according to
their multiplicities and the results are shown in Table 5 for N20.
Table 4. Generating functions for the dodecahedral N20 cluster.
100
K. Balasubramanian
Table 4. (Continued)
As can be seen from Table 5, the frequencies of the spin multiplets corresponding to the g
and u representations differ even for the singlet spin states. For example, the 1Ag state has a
frequency of 113035 while the 1Au state has a frequency of 112444. There is a similar difference in the triplet state and most of the spin multiplets. This means that the parity can be contrasted even in low spin nuclear states. The corresponding rovibronic levels will also be populated with appreciable differences in the populations. From the nuclear spin multiplets we can
also obtain the total nuclear spin statistical weights by the use of the Pauli Principle. Since
14
N nuclei are bosons, the overall wavefunction, which is a product of the rovibronic wavefunction and nuclear spin function, must be symmetric or must transform as the Ag irreducible
representation. The frequency of each representation is obtained by adding the product of
2S + 1 and the frequency. The results are shown as a footnote in Table 5. On the basis of this,
the frequencies shown in this footnote are themselves the nuclear spin statistical weights for
N20 (see Figure 8).
101
102
K. Balasubramanian
Other irreducible representations have similar spectra comparable to that in Figure 8, except that the intensities of the peaks vary. The Ag representation is particularly important as it
gives the number of lines in multiple quantum NMR spectra. The frequencies of other irreducible representations determine the intensities of the lines in the spectra. The multiple quantum NMR spectra usually contain structural information for the (n 2) quantum as this value
exhibits dipolar couplings that contrast the structure. For the present case n 2 corresponds to
the spin multiplet 2S + 1 = 37. These multiplets have the frequencies 5, 2, 2, 7, 11, 1, 5, 5, 6,
for the Ag, T1g, T2g, Gg, Hg, Au, T1u, T2u, Gu, and Hu representations, respectively. Thus, the
dodecahedral N20 cluster exhibits interesting mathematical periodicity in spectroscopic terms.
Next we consider the C60 cluster [2933] as another example that demonstrates mathematical periodicity and its applications. The GCCIs of C60 are constructed analogously to
those of N20 discussed above. The fact that C60 has 60 vertices would of course divide the
permutation of 60 vertices into various periodic orbits. The nuclear spin species thus obtained
using the GCCIs are shown in Table 6. As seen from Table 6, the frequencies grow astronomically as expected. This is because of the combinatorial explosion of the coefficients in
the generating functions even though these functions are binomials. The binomial expansion
is due to the fact that 13C60 is comprised of 13C nuclei, which exhibit only two spin orientations, as they are spin 12 particles. The same is true of C60H60, as protons are spin 12 particles
and 12C has no nuclear spin.
Again a major contrast is that the g and u representations have different frequencies due
to the difference in the periodicity of the permutation multiplied by the character value for
these representations. This feature manifests itself as contrasting frequencies for the g and u
irreducible representations. We note that earlier work had an error in the spin statistical
weights of C60 [31] primarily owing to the arithmetical precision but this was subsequently
corrected [30, 32]. The relative differences between the g and u parities are especially significant for high-spin nuclear multiplets. For example, for the 2S + 1 = 57 spin multiplet of 13C6,
the frequencies of the Ag, T1g, T2g, Gg, Hg, Au, T1u, T2u, Gu, and Hu representations are
22, 36, 36, 58, 80, 14, 42, 42, 56, and 70, respectively. Similarly for 2S + 1 = 55 the frequency of the Ag representation is 280 while it is 260 for Au. Consequently, the contrast in the
g and u spin populations can be seen experimentally if high-spin nuclear states can be excited.
Table 6. Nuclear spin multiplets for 13C60 or C60H60.
Frequency of the irreducible representation Ag: 9607679885269312
Spin multiplets and their frequencies for Ag:
2S+1
Frequency 2S+1
1
31791575566072 3
7
150988619146706 9
13
105558807981090 15
19
31605175642230 21
25
4481735502630 27
31
298734989924 33
37
8805633300 39
43
101874363 45
49
372752 51
55
280 57
61
1
Frequency 2S+1
Frequency
89413728633564 5
13095954950748
149756091280506 11
13219208028055
76925432220000 17
5141513084676
17892025439775 23
933143835273
1980110898945 29
80345370985
101492436960 35
3139590568
2227563126 41
50512570
18110340 47
280174
41528 53
388
22 59
Frequency 2S+1
127166221937640 3
603954521378374 9
422235171614265 15
126420706329465 21
17926930052010 27
1194939619444 33
35221977930 39
407483337 45
1486916 51
1084 57
0
Frequency 2S+1
Frequency
357654979723731 5
52383811353475
599024288311326 11
52876834683423
307701740558940 17
20566048261230
71568077929785 23
3732575392371
7920443232495 29
321380974795
405967908600 35
12558346548
8910198522 41
202036737
72414711 47
1120460
165779 53
1512
58 59
Frequency 2S+1
158957797411208 3
754943140441100 9
527793979532265 15
158025881932935 21
22408665535200 27
1493674601616 33
44027608785 39
509357130 45
1859568 51
1354 57
0
Frequency 2S+1
Frequency
447068708357295 5
65479766312622
748780379591832 11
66096042717787
384627172778940 17
25707561349782
89460103369560 23
4665719229588
9900554131440 29
401726346555
507460345560 35
15697937361
11137761648 41
252549365
90525051 47
1400644
207307 53
1902
80 59
103
104
K. Balasubramanian
Table 6. (Continued)
Frequency of the irreducible representation Au: 9607678793631424
Spin multiplets and their frequencies for Au:
2S+1
Frequency 2S+1
1
31791571643468 3
7
150988613640506 9
13
105558798039270 15
19
31605170531130 21
25
4481732871390 27
31
298734348764 33
37
8805495420 39
43
101861196 45
49
371694 51
55
260 57
61
0
Frequency 2S+1
Frequency
89413727296344 5
13095954114986
149756080818726 11
13219207292373
76925425313100 17
5141512318638
17892020535870 23
933143526111
1980109351620 29
80345252581
101491992360 35
3139568730
2227502850 41
50509098
18103410 47
279955
41266 53
377
14 59
Frequency 2S+1
127166211596396 3
603954529362364 9
422235165847980 15
126420708332460 21
17926929098160 27
1194939755164 33
35221938330 39
407485164 45
1486642 51
1086 57
0
Frequency 2S+1
Frequency
357654989418576 5
52383810383991
599024280327336 11
52876835260051
307701744200760 17
20566047897048
71568075926790 23
3732575487756
7920443622690 29
321380935775
405967772880 35
12558350508
8910208020 41
202035787
72412884 47
1120487
165808 53
1509
56 59
105
Table 6. (Continued)
Frequency of the irreducible representation Hu: 48038395577718272
Spin multiplets and their frequencies for Hu
2S+1
1
7
13
19
25
31
37
43
49
55
61
Frequency 2S+1
158957783147612 3
754943142918890 9
527793963824370 15
158025878824830 21
22408661950230 27
1493674096176 33
44027431350 39
509345790 45
1858246 51
1336 57
Frequency 2S+1
Frequency
447068716714920 5
65479764507375
748780361146062 11
66096042558712
384627169513860 17
25707560219562
89460096462660 23
4665719015799
9900552974310 29
401726189132
507459765240 35
15697919478
11137710870 41
252544942
90516294 47
1400452
207074 53
1887
70 59
0
Table 7 shows the correlation of the rotational levels for C60 from J = 0 to 30 with the
corresponding weights only in the rotational subgroup I. Note that for purposes of comparing
with experimental results one must use the nuclear spin frequencies given in Table 6, but the
statistical weights in Table 7 in factored form yield the orders of magnitude. All levels in Table 7 are of g symmetry since the J states can correlate into g levels.
(1) The irreducible representations for J > 31 are given by q[A + 3T1 + 3T2 +4G + 5H] +
(r), where q is the quotient obtained by dividing J by 30 and r is the remainder. (r) is the
set of irreducible representations spanned by J = r listed in this Table (see text for further discussion). Note that since nuclear spin statistical weights are the same for g and u symmetries,
we do not show g or u.
(2) f = 19 215 358 678 900 736 for C60H60;
f = 706 519 304 586 988 199 183 738 259 for C60D60.
Each correlation in Table 7 was obtained using the mathematical method of subduction.
As can be seen from Table 7, we have a very interesting periodicity among rotational levels.
The correlations for the rotational levels with J > 31 have a periodic relation to the levels with
J < 30. This is another mathematical manifestation of periodicity. The relations for all J > 30
are as follows:
D(J)Ih = q(D(30)Ih A) + (D(r) Ih), q = [J/30], r = J 30[J/30]
(12)
where the function within square brackets is the greatest integer contained in the brackets and
thus q and r are quotients and remainders obtained by dividing J by 30. The term D(30) stands
for the subduced representations for J = 30 that are displayed in Table 7. To illustrate this, the
J = 195 rotational level contains the following representations:
D(195)Ih = 6(Ag + 3T1g + 3T2g + 4Gg + 5Hg) + (Ag + 2T1g + 2T2g + 2Gg + 2Hg) 7Ag +
20T1g + 20T2g + 26Gg + 32Hg
(13)
106
K. Balasubramanian
Table 7. Correlations of the rotational levels of C60: the nuclear spin statistical
weights J = 0 to 30
The above concept of the periodicity of the rotational levels of C60 is illustrated in Figure
9.
It is worthy of note that the nuclear spin statistical weights of the rotational levels vary
approximately as (2J + 1) due to large nuclear spin statistical weights.
107
J=0
J=1
J=30
*
*
* .
*
*
J=2
.J=3
Figure 9. Periodicity of the rotational levels of buckminsterfullerene, C60.
108
K. Balasubramanian
states all correlate only into double-valued representations, which are all even dimensional.
As a result, the representation corresponding to 12 is a degenerate two-dimensional irreducible representation. The quartet state with s = 32 is also four-fold degenerate and s = 52 is
likewise the six-fold degenerate I representation in the double group. The first case which
splits into two irreducible representations is the s = 72 case. The periodicity is reduced in the
double-valued representation to half as s = 312 is related to s = 12 by periodicity. All higher
s values are obtained using a periodic relation as shown in Table 9.
Table 8. Character table for the Ih2 double group.
109
110
K. Balasubramanian
Table 9. Periodic correlation table for the half-integral states of the Ih2 double group.
s
1
3
5
7
9
2
2
2
2
2
11
2
13
2
15
2
17
2
19
2
21
2
23
2
25
2
27
2
29
2
31
2
Irreducible Representationsa
E1g(1 2)
Gg(3 2)
Ig(5 2)
E2g(7 2) + Ig(5 2)
Gg(3 2) + Ig(5 2)
E1g(1 2) + Gg(3 2) + Ig(5 2)
E1g(1 2) + Gg(3 2) + Ig (5 2) + E2g(7 2)
Gg (3 2) + 2 Ig(5 2)
Gg(3 2) + 2 Ig(5 2) + E2g(7 2)
E1g(1 2) + Gg(3 2) + 2 Ig(5 2)+ E2g(7 2)
E1g(1 2) + 2 Gg(3 2) + 2 Ig(5 2)
E1g(1 2) + 2 Gg(3 2) + 2 Ig(5 2) + E2g(7 2)
E1g(1 2) + Gg(3 2) + 3 Ig(5 2) + E2g(7 2)
2 Gg(3 2) + 3 Ig(5 2) + E2g(7 2)
E1g(1 2) + 2 Gg(3 2) + 3 Ig(5 2) + E2g(7 2)
2 E1g(1 2) + 2 Gg(3 2) + 3 Ig(5 2) + E2g(7 2)
We have also collected the correlation tables [42] for the octahedral double group Oh2 in
Table 10, the correlation table for the Td2 in Table 11, and the correlation table for the D6h2
in Table 12. These correlation tables all demonstrate interesting mathematical periodicity for
the rotational or rovibronic levels. The octahedral integral rotational levels exhibit a period of
12 analogous to that for the tetrahedral group. However, the half-integral spin states or
rovibronic states exhibit a period of six both in the octahedral and tetrahedral double groups.
The D6h2 double group exhibits a different periodic trend as seen from Table 12. The
periodicity of six is same for both the half-valued and integral representations. Thus, the
periodicity trends exhibited by the double groups are quite interesting. These correlation
tables are quite valuable in obtaining the rovibronic levels of molecules with both an odd and
even number of electrons. It is important to obtain the overall rovibronic correlation as
opposed to individual rotational correlations owing to the fact that the total wavefunction may
become a half-integral representation, especially for systems with an odd number of electrons.
Furthermore, for molecules containing very heavy atoms spin-orbit effects become quite
significant, and thus the coupling of the spin with orbital angular momentum splits the
electronic states into spin-orbit states. The exact manner in which these states are split by
spin-orbit coupling is given by the double group correlation tables shown here.
111
Table 10. Periodic correlation table for the half-integral states of the Oh2 double group.
Irreducible Representations in the Oh2 Groupa
A1g
T1g
Eg + T2g
A2g + T1g + T2g
A1g + Eg + T1g + T2g
Eg + 2T1g + T2 + T2g
s
0
1
2
3
4
5
6
2
E1g(12)
Gg(32)
E2g(52) + Gg(32)
E1g(12) + E2g(52) + Gg(32)
E1g(12) + 2 Gg(32)
E1g(12) + E2g(52) + 2 Gg(32)
E1g(12) + E2g(52) + 2 Gg(32) + terms of s but interchange E1g(12) with E2g(52)
2n {(E1g(12) + E2g(52) + 2 Gg(32)} + terms for s
2
2
7
2
9
2
11
2
6 + s
12n + s
5
Terms for other integral s values are found using the formula:
D(12n+s) = Ds + n(A1g + A2g + 2 Eg + 3 T1g + 3 T2g), s < 12.
Table 11. Periodic correlation table for the half-integral states of the Td2 group.
s
0
1
2
3
4
5
6
Irreducible Representationsa
A1
T1
E + T2
A2 + T1 + T2
A1 + E + T1 + T2
E + 2 T1 + T2
A1 + A2 + E + T1 + 2 T2
7
8
9
10
11
12
13
14
15
1
2
3
2
5
2
7
2
9
2
11
2
6 + s
2n + s
A2 + E + 2 T1 + 2 T2
A1 + 2E + 2 T1 + 2 T2
A1 + A2 + E + 3 T1 + 2 T2
A1 + A2 + 2E + 2 T1 + 3 T2
A2 + 2E + 3 T1 + 3 T2
2 A1 + A2 + 2 E + 3 T1 + 3 T2
A1 + A2 + 2 E + 4 T1 + 3 T2
A1 + A2 + 3 E + 3 T1 + 4 T1
A1 + 2 A2 + 2 E + 4 T1 + 4 T1
E1/2
G3/2
G3/2 + E5/2
E1/2 + G3/2 + E5/2
E1/2 + 2 G3/2
E1/2 + E5/2+ 2 G3/2
E1/2 + E5/2 + 2 G3/2 + terms for s, but interchange E1/2 and E5/2
2n(E1/2 + E5/2)
112
K. Balasubramanian
The concept of periodicity can be extended to cases beyond the double groups. Such
cases would involve Berrys phase where a rotation through 360 would yield a complex
number, exp(2i/n), for an integer n > 2. The symmetry exhibited by such systems could be
quite intriguing. It is hoped that this chapter will stimulate future investigations into Berrys
phase.
Table 12. Periodic correlation table for the half-integral
states of the D6h2 double group
s
0
1
2
3
4
5
6
1
2
2
5
2
7
2
9
2
11
2
3
6n + s
Irreducible Representationsa
A1g
A2g + E1g
A1g + E1g + E2g
A2g + B1g + B2g + E1g + E2g
A1g + B1g + B2g + E1g + 2 E2g
A2g + B1g + B2g + 2 E1g + 2 E2g
2 A1g + A2g + B1g + B2g + 2 E1g + 2 E2g
E1g(12)
E1g(12) + E3g(32)
E1g(12) + E2g(52) + E3g(32)
E1g(12) + 2 E2g(52) + E3g(32)
E1g(12) + 2 E2g(52) + 2 E3g(32)
2 E1g(12) + 2 E2g(52) + 2 E3g(32)
6n{E1g(12) + E2g(52) + E3g(32)} + terms of s, s < 6
ACKNOWLEDGEMENT
This research was performed under the auspices of the US Department of Energy by the
University of California, LLNL under contract number W-7405-Eng-48 while the work at UC
Davis was supported by the National Science Foundation.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
113
114
K. Balasubramanian
[41] K. Balasubramanian, Relativistic Effects in Chemistry, Part B: Applications, Wileyinterscience, New York, NY, p. 527, 1997.
[42] K. Balasubramanian, Relativistic Effects in Chemistry, Part A: Theory and Techniques,
Wiley-Interscience, New York, NY, p. 301, 1997.
[43] K. S. Pitzer, Accts. Chem. Res., 12, 271 (1979).
[44] P. Pyykk and J. P. Desclaux, Accts. Chem. Res., 12, 276 (1979).
[45] P. Pyykk, Adv. Quant. Chem., ll, 353 (1978).
[46] K. Balasubramanian, J. Phys. Chem., 93, 6585 (1989).
[47] P. Pyykk Ed. Proceedings of the Symposium on Relativistic Effects in Quantum
Chemistry; Int. J. Quantum Chem., 25 (1984).
[48] P. Pyykk, Relativistic Theory of Atoms and Molecules, Springer Verlag: Berlin and
New York, Part I 1986 Part II 1993, Part 3 2000. For comprehensive list of references
up to 2002 see http://www.csc.fi/rtam/.
[49] J. Paldus, Theoretical Chemistry: Advances and Perspectives, H. Eyring and D. J. Henderson, Eds, Academic Press, New York, NY, 1976
[50] X. Y. Liu and Balasubramanian, J. Comput. Chem., 10, 417 (1989).
[51] K. Balasubramanian, Chem. Phys. Lett., 260, 476 (1996).
[52] G. Plya, Acta Math, 68, 145 (1937)
[53] K. Balasubramanian, Theor. Chim. Acta, 53,129 (1979)
[54] G. Plya and R.C. Read, Combinatorial Enumeration of Groups, Graphs, and Chemical
Compounds, Springer, New York, NY, 1987.
[55] J. H. Redfield, Amer. J. Math. 49, 433 (1927).
[56] K. Balasubramanian, J. Math. Chem. 14, 113 (1993).
[57] D. H. Rouvray, Chem. Soc. Rev. 3, 355 (1974).
[58] D. H. Rouvray, Endeavour, 34, 28 (1975)
[59] A.T. Balaban, Chemical Applications of Graph Theory, Academic Press, New York,
NY, 1976.
[60] R. Read, in Graph Theory and Applications, Y. Alavi et al. eds., Lecture Notes in
Mathematics, 303, 243 (1972) Springer, 1972.
Chapter 5
Abstract
The back and forth characterization of equivalence of interpretations for finitary
(and some infinitary) second-order languages introduced in Weaver and Penev [2005]
is applied to obtain a condition necessary and sufficient for an attribute of an interpretation to be definable in that interpretation by a second-order formula (either finitary
or infinitary). This condition is applied to obtain some reduction theorems for the
second-order theories of those infinite interpretations having pairing functions that are
definable by two simple classes of second-order formulas.
1.
Introduction
Weaver and Penev ([2005]) extended the Frasse back and forth characterization of elementary equivalence to interpretations in the standard semantics of those second-order
languages without functional variables whose non-logical vocabulary is finite and excludes
functional constants. This characterization fails when the non-logical vocabulary is infinite.
However, there is a class of infinitary second-order languages for which the characterization
holds even when the non-logical vocabulary is infinite. Weaver and Penev presented several
applications of this characterization for both classes of languages. Another application is
presented here: a necessary and sufficient condition for definability in an interpretation.
K is a set of non-logical constants, excluding functional constants. When K is finite,
LK is the (finitary) second-order language without functional variables whose non-logical
116
George Weaver
117
(1)
118
George Weaver
i. for all SA there is S0B such that
~ 0,
~ t vm m 1...mt B~bS~ 0S 0R~0 ...R
~ R
~2...R
A~aSS
0 1
2
t
ii. for all S0 B there is SA such that
~ 0;
~ t vm m 1...m B~bS~ 0S 0R~0 ...R
~ R
~2...R
A~aSS
t
t
0 1
2
(c) for all j, 2jt, if mj 6=0, then
i. for all RAj there is R0 Bj such that
~ 0 R0 ...R
~ 0,
~ t vm ...m 1...mt B~bS~0 ...R
~ R
~j R...R
A~aS...
t
0
j
j
ii. for all R0 Bj there is RAj such that
~ 0 R0 ...R
~ 0.
~ t vm ...m 1...m B~bS~0 ...R
~ R
~j R...R
A~aS...
t
t
0
j
j
2.
It was observed in Weaver and Penev [2005] (page 502) that every sentence has a logically
equivalent distributive normal form. Here similar reasoning is used to show that every
formula that is satisfied in A is equivalent in A to a formula in a similar normal form. We
proceed by recalling Lemma 2.2 of Weaver and Penev [2005] (page 502).
Lemma 2.1. Assume that A is an interpretation of type K, t2, m0 ,...,mt are non~ t is a sequence in A. Then, there is
~ R~2 ...R
negative integers and that ~aS
~R
~2...R
~ t]
[A, m0...mt, ~aS
a formula in LK of quantifier rank (m0 ,...,mt ) such that for all B of type K and all
~ 0 , a sequence in B, if the sequences are similar, then the following are equiv~0 ...R
~bS~ 0R
t
2
alent:
119
~0,
~0 ...R
~R
~2...R
~ t vm ...mt B~bS~ 0R
1. A~aS
t
0
2
~ 0 satisfies [A, m0...mt, ~aS
~R
~2...R
~ t] in B.
2. ~bS~ 0R~02 ...R
t
~R
~2...R
~ t], when
There are only finitely many formulas of the form [A, m0...mt, ~aS
K is finite. Even if K is infinite, they can be constructed in such a way that
~ 0 ] are identical iff A~aS
~0 ...R
~R
~2...R
~ t] and [B, m0...mt, ~bS~0 R
~R
~2...R
~t
[A, m0...mt, ~aS
t
2
0
0
~
~
~ R~2 ...R
~ t is empty, then [A, m0...mt, ~aS
~R
~2...R
~ t] is a senvm0 ...mt B~bS~ 0R2 ...Rt. If ~aS
tence of quantifier rank (m0 ,...,mt ). [A, m0 ...mt ] is that sentence. It follows from
Lemma 2.1 that B is a model of [A, m0 ...mt ] (B |= [A, m0 ...mt ] )iff A vm0 ...mt B.
LK [m0 ...mt ] in the set of formulas in L K that contain no more than m 0 individual variables,
no more than m1 set variables and no more than m t relational variables of degree t. A and
B are equivalent in L K iff for all , a sentence in LK , A |= iff B |= . And they are
m0 ...mt equivalent iff for all , a sentence in LK [m0 ...mt ], A |= iff B |= . It follows
from Lemma 2.1 of Weaver and Penev [2005] that if A vm0 ...mt B, then A and B are
m0 ...mt equivalent. The following is then immediate from Lemma 2.1 above.
Theorem 2.1. A and B are m0 ...mt equivalent iff A vm0 ...mt B.
It follows from Theorem 2.1 that if is a subset of a cumulative domain of A that is
definable in A, then there are m0 ,...,mt such that is closed under vm0 ...mt in A. Suppose
that (X) defines in A. Let (m0 ,...,mt ) be the quantifier rank of this formula. is closed
under vm0 ...mt in A. Suppose that a and that Aa vm0 ...mt Ab. Let be the result of
replacing every free occurrence of X in (X) by a constant of the same grammatical category not in K. This sentence is of quantifier rank (m 0 ,...,mt ) and Aa |= . By supposition,
Aa and Ab are m0 ...mt equivalent. Thus, Ab |= and A |= (X)[b]. Hence, b . Similar
reasoning establishes that if is a subset of the direct product of cumulative domains in A,
then there are m0 ,...,mt such that is closed under vm0 ...mt in A.
Let (X) be a formula of quantifier rank (m 0 ,...,mt ) that is satisfied in A.
H((X), A, m0...mt)
is
{[A, m0...mt, a]|for all a such that A |= (X)[a]}.
Notice that A |= X((X) H((X), A, m0...mt)). Suppose that A |= (X)[a]. Then
[A, m0...mt, a] is a disjunct in H((X), A, m0...mt) and a satisfies the disjunction in
A. Suppose that a satisfies the disjunction in A. Thus, by Lemma 2.1, there is b in the
appropriate cumulative domain of A such that A |= (X)[b] and Aavm0 ...mt Ab. As (X)
is of quantifier rank (m 0 ,...,mt ), A |= (X)[a].
Let D be a cumulative domain of A and a and b be members of D. a is m0 ...mt equivalent
to b in A iff Aavm0 ...mt Ab. This relation is an equivalence relation on D and the cells in
the partition on D induced by this relation consist of those members of D satisfying [A,
m0 ...mt , a] for aD. Thus, the subsets of D that are definable in A are the union of some of
the cells in the partition induced by m 0 ...mt equivalence, for appropriate m 0 ,...,mt .
120
George Weaver
Let (X1 ...Xn ) be a formula of quantifier rank (m 0 ,...,mt ) that is satisfied in A. If all
of the variables are of the same degree, or all first order variables in X 1...Xn occur before
set or relational variables, all set variables occur before all relational variables, and for all
n2, all n-ary variables occur before all variables of higher degree, then we can proceed as
above. For in these cases, if (a1,...,an ) satisfies (X1...Xn ) in A, then a1...an is a sequence
in A and [A, m0...mt, a1...an ] can be formed. Now, suppose that this condition does not
hold. Let D 1,..., Dn be cumulative domains of A. There is g, a permutation on {1, ..., n},
such that for all (a1 ,...,an )D1 ...Dn , ag(1)...ag(n) is a sequence in A.
H((X1...Xn), A, m0...mt)
is
{[A, m0...mt, ag(1)...ag(n)]|for all a1,...,an such that A |= (X1...Xn)[a1...an ]}
The reasoning above and the observation that Aa1...an vm0 ...mt
Aag(1)...ag(n) vm0 ...mt Abg(1)...bg(n) establish the following.
Ab1...bn iff
3.
121
In this section it is shown that closure under vm0 ...mt is a necessary and sufficient condition
for definability in an interpretation.
Theorem 3.1. Assume that D and D 1,...,Dn are cumulative domains of A, D, and
that D1 ...Dn . Then,
1. if there is t 2 and non-negative integers m 0 ,...,mt such that is closed under
vm0 ...mt in A, then is definable in A;
2. if there is t 2 and non-negative integers m 0 ,...,mt such that is closed under
vm0 ...mt in A, then is definable in A.
Proof. Suppose that is a subset of D and that is closed under vm0 ...mt . Let =
{[A, m0 ,...,mt ,a] |a }. By construction, is finite, when K is. Without loss of
generality, X1 is the one and only variable occurring free in each member of . Let (X1 )
be the disjunction of the members of . Let aD. It suffices to show that a iff A |=
(X1 )[a]. Suppose that a . A |= [A, m0 ,...,mt ,a][a]. Thus, A |= (X1 )[a]. Suppose
that A |= (X1 )[a]. Thus, there is b such that Aa vm0 ...mt Ab. By supposition, a .
Suppose that D1 ...Dn and is closed under vm0 ...mt . Let =
{[A, m0 ,...,mt ,ag(1)...ag(n) ] |(ag(1), ..., ag(n) ) }, where g is a permutation on {1,...,n}
and ag(1)...ag(n) is a sequence in A. Let Xg(1),...,Xg(n) be the variables occurring free
in each member of . Let (Xg(1)...Xg(n) ) be the disjunction of the members of .
Let g ={(ag(1),...,ag(n) )| (a1,...,an ) }. g is closed under vm0 ...mt . By reasoning as
above, (Xg(1)...Xg(n) ) defines g in A. It suffices to show that there is (X1 ...Xn ) of
the same quantifier rank as (Xg(1)...Xg(n) ) such that for all (a1 ,...,an ) in D1 ...Dn ,
A |= (X1 ...Xn )[a1 ,...,an ] iff A |= (Xg(1)...Xg(n) )[ag(1)...ag(n) ]. For i between 1 and n,
the formula (Xi ) is defined as follows. If X i is an individual variable, (Xi ) is Xi =Xi .
If Xi is a set variable and m 0 is non-zero, then (Xi ) is y (Xi (y)Xi (y)), where y is an
individual variable occurring bound in (Xg(1)...Xg(n) ). If m0 =0, then K contains an individual constant, k, and (Xi ) is (Xi (k)Xi (k)). If Xi is a relational variable, (Xi ) is
defined analogously. (X1 ...Xn ) is (X1 )&...&(Xn )&(Xg(1)...Xg(n) ).
Even stronger results can be obtained when A is infinite. The following is essentially
Theorem 2.8 (page 504) of Weaver and Penev [2005].
Lemma 3.1. Assume that A and B are infinite interpretations of type K, t2, and
m0 ,...,mt are non-negative integers. Then, Avm0 ...mt B, if A
vmax{5,m0 +(t1)}(Pt mi )2B.
i=1
It follows from Lemma 3.1 that if A and B are infinite interpretations of type K, and
for all m0 , m1 , Avm0 m1 2 B, then A and B are equivalent in L K . Stronger versions of this
particular consequence of Lemma 3.1 are obtained below.
Corollary 3.1. Assume that A is an infinite interpretation of type K, D, D 1 ,..., Dn are
cumulative domains of A, D, and that D1 ...Dn . Then,
122
George Weaver
1. is definable in A iff there are m0 and m1 such that is closed under vm0 m1 2 in A;
and
2. is definable in A iff there are m0 and m1 such that is closed under vm0 m1 2 in A.
It follows from Corollary 3.1 and the proof of Theorem 3.1 that if or is definable
in infinite interpretation A, then there is a formula defining (or ) that contains no more
than 2 bound binary relational variables and no bound relational variables of degree greater
than 2. Note that Theorem 3.1 also yields a characterization of first-order definability in
an interpretation (closure under vm0 00) and of monadic second-order definability in an
interpretation (closure under vm0 m1 0 ).
4.
123
Proof. Suppose that A vm0 +n...mt B and that An is closed under vm0 ...mt in A.
Let be {(b1,...bn )| a1,...,an such that (a1 ,...,an ) and Aa1...an vm0 ...mt Bb1 ...bn }.
Suppose that (b1,...,bn ) and that Bb1 ...bn vm0 ...mt Bd1 ...dn . By construction, there are
a1,...,an such that (a1 ,...,an ) and Aa1 ...an vm0 ...mt Bb1 ...bn . By supposition, there are
c1 ,...,cn such that Ac1 ...cn vm0 ...mt Bd1 ...dn . Therefore, Ac1...cn vm0 ...mt Aa1...an . Hence,
(c1 ,...,cn ) . By construction, (d 1 ,...,dn ) . Thus, is closed under vm0 ...mt in B.
Notice that a1...an is a sequence in A and that b1...bn is a sequence in B. is definable
in A by
{[A, m0...mt, a1...an]|(a1, ..., an) }.
Further, is definable in B by
{[B, m0...mt, b1...bn]|(b1, ..., bn) }.
[B, m0 ...mt , b1 ...bn ] and [A, m0 ...mt , a1...an ] are identical, if Aa1...an vm0 ...mt
Bb1 ...bn . Thus, by construction of , the above disjunctions are identical.
Lemma 4.3. Assume that A is infinte and that 1 and 2 are binary relations on A.
Then,
1. if 1 is closed under vm0 m1 m2 in A and 2 is closed under vn0 n1 n2 in A, then 1+2
is closed under vt0 t1 t2 in A, where for i between 0 and 2, t i is the largest of m i and
ni ;
2. if 1+2 is a pairing function on A and closed under vm0 m1 m2 in A, then both 1 and
2 are closed under vm0 +1m1 m2 in A.
Proof. Suppose that (a,b,c) 1 +2 and that Aabcvt0 t1 t2 Adeh. (c,a) 1 and (c,b)
2. By the choice of ti , Aacvm0 m1 m2 Adh, and Abcvn0 n1 n2 Aeh. Thus, Acavm0 m1 m2 Ahd,
and Acbvn0 n1 n2 Ahe. By supposition, (h,d) 1 and (h,e) 2. Hence, (d,e,h) 1+2.
Suppose that 1+2 is a pairing function on A and closed under vm0 m1 m2 in A. Suppose that (c,a) 1 and that Aca vm0 +1m1 m2 Ac0a0 . By supposition, there is b such that
(a,b,c) 1 +2. Thus, there is b0 such that Acab vm0 m1 m2 Ac0a0 b0 . Therefore, Aabc
vm0 m1 m2 Aa0b0 c0 and (a0 ,b0 ,c0 ) 1 +2. Hence, (c0 ,a0 ) 1 . Similar reasoning shows that
2 is closed under vm0 +1m1 m2 .
The following establishes one important consequence of the definability of pairing functions by formulas having fewer than two binary relational variables.
Theorem 4.1. Assume that A is an infinite interpretation of type K and that is a
pairing function on A. Then,
1. if is closed under vm0 m1 0 in A, then for all B, if for all n0, n1, A vn0 n1 0 B, then
A and B are equivalent in L K ; and
2. if is closed under vm0 m1 1 in A, then for all B, if for all n0, n1, A vn0 n1 1 B, then
A and B are equivalent in L K .
124
George Weaver
Proof. Assume that A is infinite and that is a pairing function on A. Suppose that
is closed under vm0 m1 0 and that for all n 0 , n1 A vn0 n1 0 B. There are 1 and 2, binary
relations on A, such that =1+2. By Lemma 4.2, both of these relations are closed under
vm0 +1m1 0 . Let B be an interpretation of type K. Suppose that for all n 0, n1 , A vn0 n1 0B.
By Lemma 4.2, there are 1 and 2, binary relations on B such that both relations are closed
under vm0 +1m1 0 in B. Further, there are 1 (x1 x2) and 2(x1 x2 ), formulas of quantifier
rank (m0 +1,m1,0), such that 1 (x1 x2) defines 1 in A and 1 in B and 2 (x1x2 ) defines 2
in A and 2 in B. There is a sentence, , in LK [(m0 +6)m10] such that C|= iff {(c,a)|
C|= 1 (x1x2 )[ca]}+ {(c,b)| C|= 2 (x1 x2)[cb]} is a pairing function on C. Thus, 1 +2 is
a pairing function on B. Hence, B is infinite and Lemma 4.1 can be applied to A12 and
B12 . It suffices to show that for all n 0, n1, that A12vn0 n1 0 B12 . Let T be the set of
~ a sequence in A, and all ~bS~ 0, a sequence in B, if ~aS
~ and
all (n0 , n1 ) such that for all ~aS,
~bS~ 0 are similar and A~aSv
~ n +(m +1)(n +m )0B~bS~ 0, then A12~aSv
~ n n 0 B12~bS~ 0. If T
0 1
0
0
1
1
includes all ordered pairs of non-negative integers, then A12 and B12 are equivalent
and so are A and B.
~ (m +1)m 0B~bS~ 0. It
Reasoning proceeds by showing that (0, 0) T. Suppose that A~aSv
0
1
0 []. By supposition, A~
~
~
~
~
~
a
S[]B
b
S~0 []. Let
b
S
suffices to show that A12~aS[]B
1 2
~ Let b and b0 be
a and a0 be members of A that are denoted by individual constants in A~aS.
0
~
~
those members of B denoted in BbS by the same individual constants. It suffices to show
that (a, a0) 1 iff (b, b0 ) 1 and that (a, a0) 2 iff (b, b0 ) 2. Suppose that (a, a0 ) 1 .
Recall that 1 (x1 ,x2) defines 1 in A and 1 in B. Further, this formula is of quantifier rank
(m0 +1,m1 ,0). (a, a0 ) satisfies the formula in A. By supposition, (b, b 0) satisfies the formula
in B. Hence, (b, b0 ) 1. The reasoning in the other direction is analogous. Similar
reasoning shows that (a, a 0) 2 iff (b, b0) 2. Therefore, (0, 0 )T.
Suppose that if n 06=0, then (n0-1, n1 )T; and that if n 1 6=0, then (n0, n1 -1)T. Reasoning
~ n +(m +1)(n +m )0
proceeds by showing that (n 0, n1)T. Suppose A~aSv
0
0
1
1
~ n n 0 B12~bS~ 0. Suppose that n 0 6=0 and that
B~bS~ 0. It suffices to show that A12~aSv
0 1
~ (n 1)+(m +1)(n +m )0
aA. By supposition, there is bB such that A~aaSv
0
0
1
1
~ (n 1)n 0B1 2~bbS~ 0. Reasoning in the same way,
B~bbS~ 0. Since (n0-1, n1 )T, A12~aaSv
0
1
~ (n 1)n 0
it can be shown that given bB there is aA such that A12~aaSv
0
1
B12~bbS~ 0. Suppose that n 1 6=0 and that SA. As above there is S0 B such that
~
~ n +(m +1)(n 1)+m 0 B~bbS~ 0S0 . (n0, n1-1)T. Hence, A12~aSSv
A~aSSv
n0 (n1 1)0
0
0
1
1
0
0
0
~
B12~bS~ S . In the same way, given S B there is SA such that A12~aSS
0
0
0
~
~
~
~
~
vn0 (n1 1)0 B12 bS S . Therefore, A12~aSvn0 n1 0 B12bS , and (n0, n1)T. Thus, T is
N2 and A and B are equivalent.
Suppose that is closed under vm0 m1 1. Reasoning proceeds as above, except that
1 (x1,x2 ) and 2 (x1,x2 ) are of quantifier rank (m0 ,m1 ,1) and (n0 , n1)T iff for all
~ and ~bS~ 0 are similar and
~ a sequence in A, and all ~bS~ 0, a sequence in B, if ~aS
~aS,
~ n n 0 B12~bS~ 0.
~ n +(m +1)(n +m )1B~bS~ 0, then A12~aSv
A~aSv
0 1
0
0
1
1
The reasoning for Theorem 4.1 together with Lemma 4.1 provide reduction results that
are used below. Assume that A and B are infinite interpretations of the same type, is a
pairing function on A and 1+ 2 is a pairing function on B. Then,
1. if is closed under vm0 m1 0 in A, then A12vn0 n1 2B1 2, if A
125
126
George Weaver
5.
Conclusion
References
[1] J. R. B
uchi, On a Decision Method in Restricted Second Order Arithmetic, Logic,
Methodology and the Philosophy of Science , edited by E. Nagel, P. Suppes, A. Tarski,
Stanford University Press, Stanford California (1962), 1-11.
[2] Y. Gurevich, Monadic Second-Order Theories, Model-Theoretic Logics, edited by J.
Barwise and S. Feferman, Springer-Verlag, Berlin (1985), 479-506.
[3] R. M. Robinson, Restricted Set-Theoretical Definitions in Arithmetic, Proceedings of
the American Mathematical Society , 9 (1958), 238-242.
127
Chapter 6
1.
Elemental Concepts
1.1.
Equivalence Relations
130
The quotient set, denoted A/ , is the set of all the equivalence classes of A, that is, A/ =
[a] | a A .
Definition 1.3. Let A be a set. A partition of A is a family of subsets, named parts, that are
disjoint by pairs and whose union is A.
Obviously the quotient set A/ is a partition of A. Conversely, if a partition P is given
on A, we can define an equivalence relation on A as x y iff there exists a part of P which
contains both x and y. Equivalence relation and partition are thus essentially the same
notion.
1.2. Groups
The idea of operating the elements of a set arises in a natural way. Thus, for example, with
numbers it is possible to add, to multiply, etc; with sets it is possible to join, to meet, etc.
Binary operations are the keystone of the algebraic structures studied in abstract algebra 1 .
Definition 1.4. A magma is a pair (A, ) where A is a set and is a binary operation on
A, that is, a function : A A A.
Binary operations are often written using infix notation such as a b, a + b, a b or a b
rather than by functional notation of the form f (a, b). Sometimes they are even written just
by juxtaposition: ab.
Example 1.5. The sum of natural numbers is a binary operation. Nevertheless the subtraction of natural elements is not a binary operation because for example if we consider
2, 3 N it verifies that 2 3 = 1 6 N.
The binary operations on a set A, do not have to verify any property in particular.
However, the fact that these binary operations verify certain properties is going to play a
very outstanding role.
Definition 1.6. Let be a binary operation on a set A. It is said that:
1. is associative if it satisfies that a (b c) = (a b) c for all a, b, c A.
2. is commutative if it satisfies that a b = b a for all a, b A
3. e A is an identity element or neutral element for if it satisfies that ae = ea = a
for all a A.
4. a0 A is an inverse element of a A if it satisfies that a a0 = a0 a = e being
e A the identity element.
Many binary operations of interest in the algebraic environment are commutative or
associative. Many of them also have identity elements and inverse elements.
Typical examples of associative and commutative binary operations are the addition
(+) and multiplication () of numbers. The product of matrixes and the composition of
functions are associative but not commutative. The subtraction () and the division (/) of
numbers are neither associative nor commutative.
The following result is an immediate consequence of the definition.
1
All basic results about algebra can be found in several algebra books like [5].
131
132
n
n
am+n = am an
and
(am )n = amn .
Ha = {h a | h H}
When the number of left cosets of H is finite, then it coincides with the number of right
cosets of H. This number is named index of H in G and is represented by the symbol
[G : H].
Definition 1.14. Let G be a finite group, |G| denotes the number of elements in G and is
named order of G. If G is not finite we say that it has infinite order. The order of an element
a in a group G is the order of the cyclic subgroup hai.
Usually, when | hai | is finite, the order of a is defined as the minor positive integer n
such that an = 1. In this case, both definitions are equivalent.
Now, we highlight an important result which is interesting for the rest of the development:
Theorem 1.15 (Lagranges Theorem). Let G be a finite group. Then
|G| = [G : H]|H|
Corollary 1.16. The order of every subgroup H of a finite group G divides the order of G.
133
Quotient group. We will use a kind of groups that are known as quotient groups owing to
the support set is a quotient set. There exists a type of subgroups, named normal subgroups,
which allow to define an equivalence relation compatible with the operation and so they
induce an operation in the quotient set.
Definition 1.17. Let G be a group and H a subgroup of G. We say that H is a normal
subgroup if it satisfies that aH = Ha, for all a G.
Given a group G and a normal subgroup H of G, the relation
a H b a b1 H
(1)
is an equivalence relation, the equivalence class are the cosets and G/H denotes the quotient
set.
Lemma 1.18. Let G be a group and H a normal subgroup of G. Then (G/H, ) is a group
where is the derived operation, that is, [a] [b] = [a b] for all [a], [b] G/H.
Homomorphism of groups. Now, we are going to give the definition of homomorphism 2 ,
that is, a map from one algebraic structure to another of the same type that preserves all the
relevant properties.
Definition 1.19. Let (A, 1 ) and (B, 2 ) be groups. An homomorphism is a map f : A B
such that f (a 1 b) = f (a) 2 f (b) for all a, b A.
An homomorphism is named monomorphism, epimorphism or isomorphism if it is injective, surjective or bijective, respectively.
Definition 1.20. Let f : (A, 1 ) (B, 2 ) be a group homomorphism. We define the
kernel of f as
ker(f ) = {x A | f (x) = eB }
Theorem 1.21. Let f : (A, 1 ) (B, 2 ) be a group homomorphism. Then ker(f ) is a
normal subgroup of A and f (A) is a subgroup of B.
Usually, f (A) is named image group.
Theorem 1.22. Let f : (A, 1 ) (B, 2 ) be a group homomorphism. Then, the quotient
group A/ker(f ) and the image group f (A) are isomorphic groups.
The word homomorphism comes from the Greek language: homo meaning same and morphos meaning
shape.
134
One can therefore point to the essential difference between a permutation and a set:
the elements of a permutation are arranged in a specified order. Given the set A =
{a1, a2, . . . , an } an arrangement ai1 , ai2 , . . . , ain can be seen as a bijection in A, i.e.
7 ai1
a1
a2
7 ai2
..
.
or more compact
a1
ai1
a2
ai2
...
...
an
ain
an 7 ain
In a nutshell, given a finite set A 6= , a permutation is a bijection from A onto itself. We
will denote by SA the set of all permutations of A, and by , , . . . the elements of SA .
Using that the composition of bijections is also a bijection is easy to check that SA is a
group. It is usual the multiplicative notation for this group. So
=
These groups depend only of the number of elements of A, because if |A| = |B| then SA is
isomorphic to SB . Therefore,
Definition 1.23. Given a positive integer n, the symmetric group Sn is the group of the
permutations of a set with n elements.
From now on, we will consider the group Sn defined over the set A = {1, 2, . . ., n}.
1 2 3 4 5
1 2 3 4 5
Example 1.24. Given =
and =
in S5, then
1 3 2 4 5
2 3 1 5 4
we have that:
1 2 3 4 5
=
3 2 1 5 4
Example 1.25. The element of S3 are:
1 2 3
1 =
0 =
1 2 3
1 2 3
2 =
1 =
1 3 2
1 2 3
3 1 2
1 2 3
3 2 1
2 =
3 =
1 2 3
2 3 1
1 2 3
2 1 3
0
1
2
1
2
3
0 1
0 1
1 2
2 0
1 2
2 3
3 1
2
2
0
1
3
1
2
1
1
3
2
0
2
1
2
2
1
3
1
0
2
3
3
2
1
2
1
0
135
1 2 3 4 5
5 4 3 1 2
If the objects are denoted by a single letter or digit, commas are also dispensed with,
and we have a notation such as (1 5 2 4).
Any unitary cycle obviously represent the identity permutation. A cycle formed by
two elements is named transposition. Two cycles are disjoint if they move different
elements, that is, if they act over different elements. In this case, the product commutes.
Notice that in general, the product of cycles is not necessarily a cycle. For example, in
S7 the product of the cycles (2 4 6) and (3 1) is not a cycle:
(2 4 6)(3 1) =
1 2 3 4 5 6 7
1 4 3 6 5 2 7
1 2 3 4 5
3 2 1 4 5
1
=
3
6 7
6 7
2 3 4 5 6 7
4 1 6 5 2 7
Theorem 1.26. Every permutation is a cycle or a product of disjoint cycles. Moreover this
factorization is unique up to the order of the factors.
Example 1.27. In S5 we have
1 2 3 4 5 6
4 3 5 1 2 6
= (1 4)(2 3 5) = (2 3 5)(1 4)
1 2 3 4 5 6
4 3 5 1 2 6
136
2.
As the application : G SA defined in the previous theorem is a group homomorphism, from Theorem 1.21 we have that ker() is a normal subgroup of G.
Using Proposition 1 we consider the equivalence relation in G defined as:
g ker() h
if and only if
g h1 ker()
Each equivalence class defined by this relation is formed by the elements of G generating
the same permutation. From Lemma 1.18 the quotient set G/ ker() is a group and from
Theorem 1.22 we have that G/ ker() and Im() are isomorphic, that is, the group of the
elements of G generating different permutations and the group of permutations generated
by the elements of G are isomorphic. For this reason, we will denote G the group of
permutations generated by the elements of G.
137
2.2. Orbits
Definition 2.5. Given a set A and a group G that acts over A, we define the orbit of an
element x A as:
Ax = {y A | y = g(x) being g G}
The concept of orbit arises in a natural way if we consider the following equivalence
relation in A:
x y if and only if g G | y = g(x)
It is easy to prove that the equivalence classes defined by this relation are the orbits. As an
immediate consequence we have that the set of orbits give us a partition of the set A. The
quotient set, that is, the set of the orbits is denoted A/G.
Example 2.6. Let us consider a square whose vertexes can be colored with two different
colors. Table 1 shows the 16 different colorations that can be obtained.
Table 1. 2-colorations of a square.
C1
|
|
C2
|
|
C6
|
|
C10
|
|
C12
|
|
C16
C3
|
|
C7
|
|
C11
|
|
C13
C4
|
|
C8
C14
C5
|
|
C9
C15
A = {C1 , . . . , C16} is the set of colorations and G is the group of rotations and reflections acting over the elements of A, that is, G = {0 , 1, 2, 3, r1, r2, r3, r4} where i
138
139
Corollary 2.14. Given a set A and a group G that acts over A, if y = g(x) then gen(y) =
gGx.
According to the previous corollary, the left coset of Gx in G for a generator is the set
of generators.
Theorem 2.15. Let us consider a set A, a group G that acts over A and the set G/Gx of
the left cosets of Gx in G. The application : G/Gx Ax given by (gGx) = g(x) is a
bijection.
Proof. From Theorem 2.13, for any y A, we have that |gen(y)| = |Gx| and using
Lagranges Theorem 1.15, |G/Gx| = |Ax|. The map is surjective because y Ax
y = g(x) with g G and this means that y = (gGx). Hence is a bijection.
Definition 2.16. Given a set A and a group G that acts over A we define the set of invariant
elements for g G as:
Ag = {x A | g(x) = x}
1 X g
|A |
|G|
gG
gen(y)
yAi
|gen(y)|.
yAi
If we do this for all the orbits and we have in mind that the set of orbits is a partition of
A, using Theorem 2.13 we have that:
k X
X
i=1 yAi
|Gx |
(2)
xA
|Ag | =
gG
|Gx|
xA
1 X g
|A |.
|G|
gG
(3)
140
x1 1 x2 2 . . . xnn
1
ZG (x1, . . . , xn )
|G|
It is possible than several permutations in the group have the same structure of cycles.
The following theorem allows us to calculate the number of permutations in the group with
the same structure.
Theorem 2.19. Given a group of permutations G SA the number of permutations in the
group with the same structure of cycles than = x1 1 x2 2 xnn is:
n!
k
k=1 k k !
Qn
The following examples show the utility of knowing the structure of cycles of the permutations in a group.
Example 2.20. Let us consider the squares whose vertexes (we begin with the left upper vertex and we continue in the clock sense) are 1, 2, 3 and 4. We also consider
the group of rotations and reflections (rigid movements) acting over the set of vertexes,
G = {0, 1, 2, 3, r1, r2, r3, r4}, as they were denoted in Example 2.6. It is obvious that
every rigid movement is a permutation of the set of vertexes.
The following table shows the decomposition in cycles of the elements of the group of
permutations G.
2
|
3
1
|
2
4
|
1
3
|
4
3
|
2
1
|
4
2
|
1
4
|
3
0 =
1 =
2 =
3 =
r1 =
r2 =
r3 =
r4 =
1 2 3 4
1 2 3 4
1 2 3 4
2 3 4 1
1 2 3 4
3 4 1 2
1 2 3 4
4 1 2 3
1 2 3 4
4 3 2 1
1 2 3 4
2 1 4 3
1 2 3 4
3 2 1 4
1 2 3 4
1 4 3 2
141
= (1)(2)(3)(4) = x41
= (1234) = x14
= (13)(24) = x22
= (1432) = x14
= (14)(23) = x22
= (12)(34) = x22
Decomposition
x41
x14
x22
x21x12
Invariant colorations
k4
k
k2
k3
By using the Theorem of Burnside(2.17) the number of non equivalent colorations for
142
The decomposition in cycles also allows us to see which colorations are invariants for
k
X
cai where k is the
a permutation. The inventory of invariant coloration for a cycle xa is
i=1
number of colors and ci are the different colors. Moreover, the inventory of invariant coloration for a permutation is the product of the inventories for the cycles of this permutation.
Let us suppose k = 2, being A and B the colors.
The following table shows the inventory of invariant colorations for the permutations
of the group G.
Permutation
Inventory
4
4
0
(A + B) = A + 4A3B + 6A2B 2 + 4AB 3 + B 4
1, 3
A4 + B 4
2 , r1, r2
(A2 + B 2 )2 = A4 + 2A2 B 2 + B 4
2
2
r3, r4
(A + B) (A + B 2 ) = A4 + 2A3B + 2A2 B 2 + 2AB 3 + B 4
The coefficients of the inventory show as they are the invariant colorations. So the term
cA B b means that there exist c invariants colorations with a vertexes colored in A and b
vertexes colored in B.
Now, let us suppose k = 3, being A, B and C the colors. The following table shows the
inventory of invariant colorations for the permutations in the group G in this case.
a
Permutation
0
3
2 , r1, r2
r3, r4
Inventory
(A + B + C)4 = A4 + B 4 + C 4 +
+4(A3 B + A3 C + AB 3 + B 3 C + AC 3 + BC 3 )+
+6(A2 B 2 + A2 C 2 + B 2 C 2 ) + 12(A2BC + AB 2 C + ABC 2 )
A4 + B 4 + C 4
2
2
2
2
4
(A + B + C ) = A + B 4 + C 4 + 2(A2B 2 + A2 C 2 + B 2 C 2 )
(A + B + C)2 (A2 + B 2 + C 2 ) = A4 + B 4 + C 4 +
+2(A2B 2 + A2 C 2 + B 2 C 2 )+
3
+2(A B + A3 C + AB 3 + B 3 C + AC 3 + BC 3 )+
+2(A2BC + AB 2 C + ABC 2 )
Example 2.21. Let us consider a regular polygon with n vertexes and the action of n
rotations and n reflections. Moreover, we will suppose that the n vertexes of the polygon
can be colored with k different colors.
143
n
2
xni
n
kni
ni
x1n
Another rotations
x22
x11x2 2
x21x2 2
k2
n1
n+1
2
n+2
2
n2
2(ni)
n
2i
n
144
Decomposition
x51
x15
x11 x22
Decomposition
x61
x16
x23
x32
x21 x22
x32
145
orbit if one of them can be obtained beginning with the other by means of a rotation or a
reflection. It is obvious that all the colorations in an orbit have, for each color, the same
number of vertexes. For example, all the colorations in the orbit O2 have 1 vertex colored
in a color and 3 vertexes colored in the other color. The reciprocal is not true. For example,
the colorations in both orbits O3 and O4 have 2 vertexes colored in a color and 2 vertexes
colored in the other color. The question is: How many non equivalent colorations (that is,
orbits) there exist with the same number of vertexes for each color? The following result
give us a general procedure to answer to this question.
Theorem 2.23 (Polyas Theorem). Given a group of permutations G Sn , a finite set
K = {c1, . . . , cm} and the set of functions F = {f : {1, . . . , n} K}, we consider the
equivalence relation R in F given by:
f g if and only if G | g = f
Then the number of non equivalent applications such that:
|f 1 (c1)| = k1 , |f 1(c2)| = k2, . . . , |f 1(cm )| = km
is the coefficient of ck11 ck22 . . . ckmm in the polynomial
1
ZG
|G|
m
X
i=1
ci ,
m
X
i=1
c2i , . . . ,
m
X
cni
i=1
Example 2.24. We consider the set of colorations in Example 2.6 and we name A and B
the colors. How many non equivalent colorations there exist with k1 vertexes colored in A
and k2 vertexes colored in B?
Obviously, there are only five possibilities for k1 and k2. The condition is k1 + k2 = 4,
so the cases are: (k1, k2) = (4, 0), (k1, k2) = (3, 0), (k1, k2) = (2, 2), (k1, k2) = (1, 3)
and (k1, k2) = (0, 4).
We use Polyas Theorem with G = {0 , 1, 2, 3, r1, r2, r3, r4}, K = {A, B}. The
number of non equivalent colorations with |f 1 (A)| = k1 and |f 1 (B)| = k2 is the
coefficient of Ak1 B k2 in the polynomial 4
1
[(A + B)4 + 2(A + B)2 (A2 + B 2 ) + 3(A2 + B 2 )2 + 2(A4 + B 4 )]
8
It is easy to check that:
The number of non equivalent coloration with the 4 vertexes colored in A, that is,
the coefficient os A4 is 1. Because of the symmetry, the number of non equivalent
colorations with the 4 vertexes colored in B is 1.
The number of non equivalent colorations with 3 vertexes colored in A and 1 vertex
colored in B, that is, the coefficient of A3 B es 1. Because of the symmetry, the number of non equivalent colorations with 1 vertex colored in A and 3 vertexes colored
in B is 1.
4
3x22
As we saw in Example 2.20, in this case the generating function is ZG (x1 , x2 , x3 , x4 ) = x41 + 2x21 x12 +
+ 2x14
146
The number of non equivalent colorations with 2 vertexes colored in A and 2 vertexes
colored in B is 2.
Example 2.25. A curious example of Polyas enumeration method appear in [11] in which
it is possible to determine the number of equivalence classes of musical objects.
3.
147
A non-zero element a of a ring R is a left zero divisor if there exists a non-zero b such
that ab = 0. Similarly, right zero divisors are defined. That is, a non-zero element a such
that there exists a non-zero b with ba = 0.
An element that is both a left and a right zero divisor is simply named a zero divisor.
Proposition 3.4. A non-zero element in a ring R is regular or simplifiable for if and only
if it is not a zero divisor.
A ring without zero divisor elements is named integral ring and a unitary ring without zero divisor elements is named integral domain. Therefore, in an integral ring, the
simplification rule holds.
Example 3.5. An example of a zero divisor in the ring of 2 2 matrices is the matrix
1 0
0 0
because for instance
1 0
0 0
0 0
0 1
0 0
0 0
In general, in the ring of nn matrices over some integral domain, the zero divisors are
precisely the nonzero matrices with determinant zero, that is the nonzero singular matrices.
Given a unitary ring (R, +, ), the subset R of the invertible elements is closed for the
multiplication and, therefore, (R, ) is a group. This group is known as the multiplicative
group of R.
Example 3.6. The set A = {0, 1, 2, 3, 4, 5} with the two following operations is an unitary
ring.8 In this ring, 2, 3 and 4 are zero divisor and the multiplicative group is ({1, 5}, ).
+
0
1
2
3
4
5
0
0
1
2
3
4
5
1
1
2
3
4
5
0
2
2
3
4
5
0
1
3
3
4
5
0
1
2
4
4
5
0
1
2
3
5
5
0
1
2
3
4
0
1
2
3
4
5
0
0
0
0
0
0
0
1
0
1
2
3
4
5
2
0
2
4
0
2
4
3
0
3
0
3
0
3
4
0
4
2
0
4
2
5
0
5
4
3
2
1
This ring is known as the ring of residual classes module 6, usually denoted Z6 , and will be formally
introduced in Example 3.11
148
149
p(x) = a0 + a1 x + + am x
m
X
ai xi
i=0
where the coefficients a0, a1, . . . , am are elements of R, m is a natural number and, if
m > 0, am 6= 0. We say that m is the degree of this polynomial and write (p(x)) = m.
Two polynomials are considered to be equal if the coefficients of each power of x are
equal.
Hereinafter, if no confusion arises we will write p to denote a polynomial p(x).
Polynomials in R can be added by simply adding the corresponding coefficients and
multiplied using the distributive law and the rules xa = ax, for all element a R, and
xk xl = xk+l for all natural numbers k and l.
Every polynomial p = a0 + a1 x + + am xm in a ring R define a function (not
necessarily homomorphism) f : A A with f (a) = a0 +a1 a+ +am am . The elements
that belong to f 1 (0) are named roots (or zeros) of p(x). That is, r R is a root of p if
a0 + a1 r + am rm = 0.
It is easy to prove that the set of polynomials with coefficients in a ring R with the
addition and the multiplication is also a ring. This ring is named the polynomial ring over
R and is denoted by R[x]. Formally, the addition operation is defined as follows:
max{m,n}
m
n
ai + bi , 0 i min{m, n};
X
X
X
ai xi +
bi xi =
ci xi where ci =
, m < i n;
bi
i=0
i=0
i=0
, n < i m.
ai
and the multiplication operation is defined as follows:
m
X
i=0
ai xi
n
X
i=0
bixi =
m+n
X
i=0
r+s=i
ar bs
xi
150
Hence, K = K {0}.
For example, R[x] is not a field.
151
0
1
x
1+x
0
1
x
1+x
0
0
0
0
0
1
x
1+x
0
x
1+x
1
0 1+x
1
x
The previous theorems are consequence of the work of the French mathematician Evariste Galois (1811
1832) about the non-existence of formulae to solve general polynomials equations with degree greater to 4.
152
2
3
1
4
3
2
4
1
4
1
3
2
a
b
d
c
b
c
a
d
d
a
c
b
c
d
b
a
1 3 2
2 1 3
3 2 1
153
1 2 3
2 3 1
3 1 2
Example 3.32. For every n 2 the table of addition for Zn is a Latin square. Observe
that these tables fit to definition 3.31 when we replace all 0 by n.
A Latin square is said to be normalized if its first row is in natural order. For example,
the first Latin square above is normalized because its first row is 1, 2, 3, 4. We can normalize
any Latin square permuting the name of the symbols conveniently. For example, the second
Latin square showed above is not normalized, but permuting c and d we obtain the next
normalized Latin square:
a b c d
b d a c
c a d b
d c b a
In general, if we permute the rows, permute the columns, and permute the names of
the symbols of a Latin square, we obtain a new Latin square said to be isotopic to the first.
Isotopism is an equivalence relation, so the set of all Latin squares is divided into subsets,
named isotopy classes.
3.3.1. Orthogonal Array Representation
Every entry of a Latin square can be written as a triplet (r, c, s), where r is the row, c is
the column, and s is the symbol. Then we obtain a set of n2 triplets named the orthogonal
array representation of the square. For example, the orthogonal array representation of the
first Latin square displayed above is
T = {(1, 1, 1), (1, 2, 2), (1, 3, 3), (1, 4, 4), (2, 1, 4), (2, 2, 3), (2, 3, 2), (2, 4, 1),
(3, 1, 2), (3, 2, 1), (3, 3, 4), (3, 4, 3), (4, 1, 3), (4, 2, 4), (4, 3, 1), (4, 4, 2)}
The definition of Latin square can be written in terms of orthogonal arrays as n2 triplets
of the form (r, c, s), where 1 r, c, s n and all of the possible pairs (r, c), (r, s) and
(c, s) are different.
The orthogonal array representation shows that rows, columns and symbols play similar
roles, as will be made clear below.
If we systematically reorder the three items in each triplet, another orthogonal array
(and, thus, another Latin square) is obtained. For example, we can replace each triplet
(r, c, s) by (c, r, s) which corresponds to the transposed square (reflecting about its main
diagonal), or we could replace each triplet (r, c, s) by (c, s, r), which is a more complicated
operation. Altogether there are 6 possibilities including the identity, giving us six Latin
squares (not necessary different) named the conjugates of the original square.
154
Example 3.33. The normalized Latin square defined by the orthogonal array
{(1, 1, 1), (1, 2, 2), (1, 3, 3), (2, 1, 3), (2, 2, 1), (2, 3, 2), (3, 1, 2), (3, 2, 3), (3, 3, 1)}
defines a conjugates class with 3 elements that appear in figure 2
Finally, we can combine these two equivalence operations: two Latin squares are said to
be paratopic if one of them is isotopic to a conjugate of the other. This is again an equivalence relation, with the equivalence classes named species, or paratopy classes. Each
specie contains up to 6 isotopy classes.
Numbers of Latin squares. In [20] we can see the number of Latin squares (or rectangles) depending on the numbers of rows (or rows and columns). Computations have been
made until 10 10 squares and estimated for squares with n = 11, 12, 13, 14, 15.
Example 3.34. Complete Sudoku puzzles are 9 9 Latin squares, with an additional constraint: they are divided in nine 3 sub-squares and each one of them contains the nine symbols. The name Sudoku is the Japanese abbreviation of Suji wa dokushin ni kagiru,
meaning the digits must occur only once
Vehicles
1 2 3
3 1 2
2 3 1
155
Schedule
Turn 1: (1, 1) (2, 2) (3, 3)
Turn 2: (2, 3) (3, 1) (1, 2)
Turn 3: (3, 2) (1, 3) (2, 1)
Definition 3.36. Two n n Latin squares, T1 = (aij ) and T2 = (bij ), are orthogonal if
and only if the n2 ordered pairs (aij , bij ) are all different. We say that T1, T2, . . . , Tk are
mutually orthogonal if and only if any two squares Tr , Ts are orthogonal.
It is easy to prove that the orthogonality of T1 and T2 is equivalent to the orthogonality of
the normalized squares T1 and T2 . Therefore, from now on, we will talk about normalized
Latin squares.
We saw above the confirmed Eulers conjecture about there not exist mutually orthogonal 66 Latin square. Euler also conjectured that this problem could not be solved for nn
Latin squares when n 2 (mod 4). But, nevertheless, in 1960 works of Bose, Shrikhande
and Parker proved that this conjecture is false (see [23], [3]), and interest shifted to finding
how many pairs of mutually orthogonal Latin squares there are for a given n.
Theorem 3.37. For n Z+ , n > 2, the number of nn Latin squares mutually orthogonal
is at most n 1.
Proof. Let be T1, T2, . . ., Tm mutually orthogonal and normalized Latin squares. We represent Tk = (akij ). So, ak1j = j for k = 1, 2, . . .m. Now, ak21 6= 1 and different for all
k = 1, . . . , m, since, on the contrary, they would not be orthogonal. This proves than m is
smaller than n.
In general, it is difficult to construct orthogonal Latin squares. But when the order is a
power of prime number, finite fields give us a method to obtain the maximum number of
mutually orthogonal Latin squares.
Theorem 3.38. Let be n > 2 and n = pm , where p is a prime number. Then there are n 1
mutually orthogonal Latin squares.
Proof. Consider the only finite field F(n) = {c1, c2, . . . , cn } (Galoiss field), where c1 = 1
and cn = 0. For k = 1, 2, . . . , n 1, we define the square Tk = (akij ) being akij = ck ci + cj .
Then, we can prove:
1. Each Tk is a Latin square. All elements in the same row are different.
akir = akis ck ci + cr = ck ci + cs cr = cs r = s
All elements in the same column are different.
akrj = aksj ck cr + cj = ck cs + cj ck cr = ck cs
and, as ck has inverse, then cr = cs r = s.
156
2. When k 6= k0 , then Tk , Tk0 are mutually orthogonal. Suppose (akij , akij ) = (akrs , akrs)
then
ck ci + cj = ck cr + cs
ck0 ci + cj = ck0 cr + cs
and reducing, (ck ck0 )ci = (ck ck0 )cr . Hence, as ck 6= ck0 , we have ci = cr and
hence i = r. Using this with any of the previous equations, we obtain that cj = cs
and j = s.
According to the previous results we can normalize these Latin squares.
Example 3.39. For n = 5, using the Galoiss field F(5) = Z5 = {1, 2, 3, 4, 0}, and the
above theorem, we obtain the following four squares:
2
3
4
0
1
3
4
0
1
2
4
0
1
2
3
0
1
2
3
4
1
2
3
4
0
3
0
2
4
1
4
1
3
0
2
0
2
4
1
3
1
3
0
2
4
2
4
1
3
0
4
2
0
3
1
0
3
1
4
2
1
4
2
0
3
2
0
3
1
4
3
1
4
2
0
0
4
3
2
1
1
0
4
3
2
2
1
0
4
3
3
2
1
0
4
4
3
2
1
0
3
4
5
1
2
4
5
1
2
3
5
1
2
3
4
1
3
5
2
4
2
4
1
3
5
3
5
2
4
1
4
1
3
5
2
5
2
4
1
3
1
4
2
5
3
2
5
3
1
4
3
1
4
2
5
4
2
5
3
1
5
3
1
4
2
1
5
4
3
2
2
1
5
4
3
3
2
1
5
4
4
3
2
1
5
5
4
3
2
1
normalizing,
1
2
3
4
5
2
3
4
5
1
Example 3.40. With the Galoiss field F(4) = {1, x, x + 1, 0}, we obtain three mutually
orthogonal squares. The first of them is:
0
x+1
x
1
x+1
0
1
x
x
1
0
x+1
1
x
x+1
0
To construct a pair of orthogonal Latin squares of any odd order, we can use the group
Z2m+1 . Let T1 = (i + j) be the addition table for the integers modulo n = 2m + 1 and
let T2 = (2i + j), entries taken modulo n. But the number of mutually orthogonal Latin
squares can be less than n 1.
Magic squares. We are going to finish by applying some kind of orthogonal Latin
squares, those n n squares which contain all numbers from 1 to n (or equivalently, 0
to n 1) in such all rows, columns, and both diagonals. Those squares are also magic, and
by juxtaposing produce new magic squares.
157
Example 3.41. The other two Latin (and magic) squares that are let to calculate in the
previous example 3.40 are
x+1
0
1
x
x
1
0
x+1
0
x+1
x
1
1
x
x+1
0
and
x
1
0
x+1
0
x+1
x
1
x+1
0
1
x
1
x
x+1
0
4.
A finite geometry is any geometric system that has only a finite number of points. These
geometries were introduced by Gino Fano ([10]) at final XIX century. The usual Euclidean
geometry is not finite, because any line contains infinitely many points, in fact the same
number of points as there are in the real line R. A finite geometry can be any finite dimension, but for ours proposes we will describe only classic 2-dimensional (or plane) finite
geometries.
In this section, mainly we present two kinds of finite plane geometry: affine and projective. In an affine geometry, the normal sense of parallel lines applies. In a projective plane,
by contrast, any two lines intersect at a unique point, and so parallel lines do not exist. Both
geometries may be described by fairly simple axioms.
158
P1
P2
P4
P3
Observe that the affine plane of order 2 could be seen like the complete graph K4 .
159
The line that contains P0 , P1 is the unique one. Suppose P0 , P1 ra,b and P0 , P1
rc,d (other situations similar),
=
ax0 + b
=
cx0 + d
y0
=
ax1 + b
=
cx1 + d
y1
y1 y0 = a(x1 x0 ) = c(x1 x0)
Therefore a = c and hence b = d.
AP2 Lemma 4.3 stays that there are n points P1 , P2, . . . , Pn in r. If P is not in r, we
consider n lines r1, r2, . . . , rn determinate by P and Pi . But lemma 4.3 says also
that P is in n + 1 lines, then exists a line r0 different all ri and therefore r0 r = .
AP3 The four points (0, 0), (0, 1), (1, 0) and (1, 1) verify whatever three are not collinear.
That proves the theorem.
Example 4.5. Affine plane of order 2 defined by F(2) = Z2 = {0, 1} has 4 points P1 =
(0, 0), P2 = (0, 1), P1 = (1, 0) and P1 = (1, 1) and 6 lines. Figure 7 in Example 4.2
represents this plane.
We say that lines r and r0 are parallel if either r = r0 or else r r0 = . The relation
be parallel to is an equivalence relation, this takes us the following definition.
Definition 4.6 (Parallel classes). Given AP (n) of order n we can define a partition in R
of n + 1 classes which contain mutually parallel lines.
Every class is represented by any line in the class, for example, vertical lines class is
[r0].
Example 4.7. Following figure represents all parallel classes in the affine plane of order 3.
2
[r0]
[r0,0]
[r1,0]
[r2,0]
160
Definition 4.8. We name projective plane to a pair (P 0 , R0), where P 0 is a nonempty set
whose elements are named points, and R0 is a nonempty collection of subsets of P 0 whose
elements are named lines, such that:
PP1 Given any two distinct points, there is exactly one line that contains both points.
PP2 The intersection of any two distinct lines contains exactly one point.
PP3 There exists a set of four points, no three of which belong to the same line.
The natural way to build a projective plane is through affine plane. We considerer
AP (n) = (P, R) and redefine this points in the projective plane like P F(n) F(n)
{0, 1} in this way:
P = {(x, y, 1) | x F, y F}
(4)
Moreover, every parallel class defines a new point at infinity in projective plane in
this way:
The vertical lines class [r0] defines the point (0, 1, 0).
The parallel class [ra,0] defines the point (1, a, 0)
Then the n2 points in P according to (4) and the n + 1 points at infinitydefine the
n2 + n + 1 points in projective 13 plane.
P 0 = P {(0, 1, 0)} {(1, a, 0) | a F}
The lines in R together the line at infinityr form the projective lines in R0 , in other
words, R0 is formed by following lines:
Line at infinity r = {(x, y, 0) P 0 }, also represented by z = 0.
Vertical lines ra = {(az, y, z) P 0 }, also represented by x = az.
The rest of lines ra,b = {(x, ax + bz, z) P 0 }, also represented by y = ax + bz.
Theorem 4.9. If F(n) is a field with n = pq elements, then there exists a projective plane
(named projective plane of order n) with n2 + n + 1 points and n2 + n + 1 lines.
Example 4.10. The smallest projective plane (of order 2), also known as Fanos plane, has
7 points and lines.
Remark 4.11. The inverse process is available. If we have a projective plane and we
delete a line and all the points incident with that line then the remaining structure is an
affine plane. The deleted line is obvious the line at infinity.
Therefore, it is well-established that both affine and projective planes of order n exist
when n is a prime power.
It is conjectured that no finite planes exist with orders that are not prime powers, although this statement has not been proved. The best result to date is the celebrated BruckRyser theorem ([4]), which was published in 1949, which states:
13
161
001
011
101
111
100
110
010
162
all varieties in each of the blocks) is used. Yates [28] first described incomplete block
experiment designs.
Example 4.13. A researcher is carrying out a study of the effectiveness of four different
skin creams for the treatment of a certain skin disease. He has eighty subjects and plans
to divide them into 4 treatment groups of twenty subjects each. Using a randomized blocks
design, the subjects are assessed and put in blocks of four according to how severe their
skin condition is; the four most severe cases are the first block, the next four most severe
cases are the second block, and so on to the twentieth block. The four members of each
block are then randomly assigned, one to each of the four treatment groups.
Definition 4.14. Let V be a set with v elements (varieties). A finite collection = {Bi }bi=1
of nonempty subsets in V is a incomplete block design, or (v, b, r, k)-design when it verifies:
1. Every Bi contains a fixed-number k of varieties, k < v.
2. Every variety x V replies r( b) times, in other words, x is contained in exactly r
different blocks Bi .
It is easy to see than vr = bk.14 If V = {vj }vj=1 , we can define the b v incidence
matrix N = (nij ) defined:
1 if vj Bi
nij =
0 other case.
Finally, it is usual to define the vv symmetric matrix = (x,y ), named concurrence
matrix, being x,y the number of blocks where the varieties x, y appear together. This
matrix balance the block design. Obvious x,x = r and, when x 6= y and x,y = is a
constant, then we say that the design is balanced.
Example 4.15. In the twentieth century, the most frequent treatment used in the strawberry
growing is the Methyl Bromide. It is an agricultural fumigant widely used because it is
a powerful agent for the control of pathogens and bad herbs. Moreover, it increases the
productivity because it reduces the effect known as stress of the land. However, it is considered as one of the causes of the hole in the ozone layer. On November of 2002, in the IV
Meeting of Montreal Protocol (Copenhagen) its progressive withdrawal was agreed, until
its total disuse in the developed countries.
One research team is studding a new treatment to replace the Methyl Bromide. Specifically, they are interested in testing its effect in 6 varieties of strawberry:: Camarosa, Andana, Chandler, Cartuno, Sophie and Tudla. For this experiment, the research team dispose
of 3 fields with 4 plots.
They use the small design of v = 6, b = 3 and k = 4 defined by the incidence matrix
1 1 1 1 0 0
N = 1 1 0 0 1 1
0 0 1 1 1 1
14
The trick for remembering this formula is using letters of the words varieties and blocks, so
varietiesblocks.
163
2 2 1 1 1 1
2 2 1 1 1 1
1 1 2 2 1 1
=
1 1 2 2 1 1
1 1 1 1 2 2
1 1 1 1 2 2
Definition 4.16. Let V be a set with v elements (varieties). A finite collection = {Bi }bi=1
of nonempty subsets in V is a balanced incomplete block design, or (v, b, r, k, )-design
when it verifies:
1. is a (v, b, r, k)-design.
2. Every pair x, y of varieties appears together in exactly ( b) blocks Bi .
Then the five parameters have the following relations
Theorem 4.17. Every balanced incomplete block design (v, b, r, k, )-design verifies:
1. vr = bk.
2. (v 1) = r(k 1).
Proof. 1. was commented above. To proof 2. we count the number of ones in the v2 b
matrix A = (a{x,y},i), {x, y} V , 1 i b defined
1 if {x, y} Bi
a{x,y},i =
0 other case.
Each row contains ones, then the number of ones in A is v2 . Each column contains
k
k
2 ones, then the total number of ones is b 2 . Therefore
k(k 1)
k1
v(v 1)
=b
= vr
2
2
2
5.
Applications
In this section we introduce some applications about different results of discrete mathematic
displayed in the previous sections.
164
P1
P2
P4
P3
165
2i
radians.
k
We denote hgii the subset of G generate by the rotation gi and we denote ind(gi) the
index of such element, that is,
k
ind(gi) =
|hgii|
Concretely, G = {g0, g1, . . . , gk1}, where gi means the rotation of
166
#+
$!
"+
*"
"
#!
$"
"
%"
%#
+!
'%
)+
*!
&#
&$
% !
)!
&"
)
'$
&(
'#
(+
' +
'
(*
%(
($
'*
&*
(
')
%)
&)
G2
G3
G4
G6
Using the lemma of Burnside (5) we can calculate the number of orbits and solve the
original problem.
Onk =
1 X ind(gi )
n
k
gi G
On4
n
1
+4
n
2
+9
n
3
+6
n
4
(6)
167
Figure 10. (Left) Dual graph representations of existing RNAs. (Right) Comparing dual
(column F) and digraph (G) representations of hypothetical RNA secondary structures (E).
5.2.1. Graphical Representation of RNA Structures
Unlike graphs for chemical structures, where atoms are vertices and bonds are edges, our
RNA graphs are RNA secondary topologies where a vertex or an edge can represent multiple nucleotide bases or base pairs, which are themselves composed of multiple atoms and
bonds. To allow graphical representation of complex RNA secondary topologies, we state
below rules for defining RNA graphs and provide justifications for these rules. The rules
specify how to represent RNA loops, bulges, junctions and stems as vertices or edges in a
graph. Essentially, the tree and dual graph rules simplify RNA secondary motifs to allow
their representation as mathematical graphs; the "RNA graphs" specify the skeletal connectivity of the secondary motifs.
We use tree graphs to represent RNA trees and dual graphs to represent any RNA secondary structures, including trees and pseudoknots, since pseudoknots cannot be represented as trees. Still, the tree representation is advantageous because of its intuitive appeal
and the existence of applicable tree enumeration theorems, especially those by Cayley and
by Harary and Prins.
5.2.2. Planar Tree Graph Rules
To represent RNA trees as planar graphs, we use the following rules to assign edges and
vertices.
T1. A nucleotide bulge, hairpin loop or internal loop is considered a vertex when there
is more than one unmatched nucleotide or non-complementary base pair. The special case
of the GU wobble base pair is regarded as a complementary base pair.
168
Figure 11. Schematic graphical representations for three RNA secondary topologies computed using Zukers MFOLD algorithm.
T2. The 3 and 5 ends of a helical stem are considered a vertex.
T3. An RNA stem is considered an edge; we define an RNA stem to have two or more
complementary base pairs.
T4. An RNA junction is a vertex.
5.2.3. Planar Dual Graph Rules
To represent trees, pseudoknots and other RNA secondary topologies as planar graphs, we
use the following general rules.
D1. A vertex represents a double-stranded helical stem.
D2. An edge represents a single strand that may occur in segments connecting the
169
(7)
For unlabeled trees, Harary and Prins obtained the counting polynomial t(x) whose
coefficient NV is the number of distinct graphs with V vertices:
t(x) =
NV xV = T (x)
V =1
where
T (x) = x exp
1 2
T (x) t(x2 )
2
hX
1
r=1
T (xr )
(8)
(9)
170
tree with six vertices (five edges or 100 nt) has six possible motifs, whereas an 11-vertex
(10 edges or 200 nt) tree has 235 possible motifs. As the RNA size increases from 100 to
200 nt, the number of possible motifs increases by a factor of 39, indicating the potential
of large RNAs to form many more novel secondary motifs.
Enumeration of RNA dual graphs
The enumeration of dual graphs, unlike trees, simultaneously yields tree, pseudoknot
and other possible topological motifs as defined by the dual graph rules (D1-D3). We
have heuristically enumerated all such graphs for the cases of V = 2, 3 and 4, which
correspond to 3, 8 and 30 possible dual graphs, respectively. In addition to RNA trees
(T ) and pseudoknots (P ), enumerated motifs in Figure 5.2.4. reveal graphs involving
single-edge connectors; we call such motifs bridge graphs ( B) or simply bridges. Bridges
are biologically important since they suggest existence of independent RNA submotifs and
thereby help in the modular design of RNAs. Examples of RNA bridges are box H/ACA
snoRNA, hepatitis C virus (HCV) RNA and group I intron.
The distribution of tree, pseudoknot and bridge types in V = 2, 3 and 4 motif sets is as
follows. For the V = 2 motif set, three graphs correspond to one tree, one pseudoknot and
one bridge; for V = 3 set, eight graphs correspond to two trees, three pseudoknots and three
bridges; and for V = 4 set, 30 graphs include four trees, 20 pseudoknots and 13 bridges
(thus seven graphs are both pseudoknots and bridges). These enumeration results imply
that the number of bridges (N V bridge ), trees (N V tree ), and pseudoknots (N V pseudo ) within
a given topological set follow:
N V tree N V bridge N V pseudo
The complexity and number of the dual graphs increase quickly with vertex number,
making it non-trivial to determine the number of topological possibilities for a given V .
General enumeration theorems for RNA dual graphs are not available.
5.2.5. Conclusion
We estimate the number of distinct RNA tree motifs based on the Cayley and Harary-Prins
enumeration theorems. These theorems imply that the RNA topology space is much smaller
than the sequence space, which renders our topological approach potentially effective for
finding novel RNAs. Our surveys of existing RNAs identified a number of motifs in nature
but showed that many hypothetical motifs do not exist. Since not all enumerated motifs are
probable RNAs, energetic, functional and evolutionary aspects of RNA folds must be taken
into consideration to provide better future estimates of RNAs repertoire.
171
172
3. we have , ij = k, ji = k, and all identities obtained from these by cyclic permutations of (i, j, k).
We can summarize the last rule in a picture:
When we multiply two elements going clockwise around the circle we get the next one:
for example, ij = k. But when we multiply two going around counterclockwise, we get
minus the next one: for example, ji = k.
We can use the same sort of picture to remember how to multiply octonions:
This is the Fano plane, a little gadget with 7 points and 7 lines. The lines are the sides
of the triangle, its altitudes, and the circle containing all the midpoints of the sides. Each
pair of distinct points lies on a unique line. Each line contains three points, and each of
these triples has has a cyclic ordering shown by the arrows. If ei , ej and ek are cyclically
ordered in this way then
ej ei = ek
ei ej = ek
Together with these rules:
1. 1 is the multiplicative identity,
2. e1 , e2, . . ., e7 are square roots of 1
173
the Fano plane completely describes the algebra structure of the octonions. Indexdoubling corresponds to rotating the picture a third of a turn. This is certainly a neat
mnemonic, but is there anything deeper lurking behind it? Yes! The Fano plane is the
projective plane over the 2-element field Z2 . In other words, it consists of lines through the
origin in the vector space Z32 . Since every such line contains a single nonzero element, we
can also think of the Fano plane as consisting of the seven nonzero elements of Z32 . If we
think of the origin in Z32 as corresponding to 1 O, we get the following picture of the
octonions:
Note that planes through the origin of this 3-dimensional vector space give subalgebras
of O isomorphic to the quaternions, lines through the origin give subalgebras isomorphic
to the complex numbers, and the origin itself gives a subalgebra isomorphic to the real
numbers.
What we really have here is a description of the octonions as a twisted group algebra.
Given any group G, the group algebra R[G] consists of all finite formal linear combinations
of elements of with real coefficients. This is an associative algebra with the product coming
from that of G . We can use any function
: G2 1
to twist this product, defining a new product
? : R[G]xR[G] R[G]
by:
g ? h = (g, h)gh
where g, h G R[G]. One can figure out an equation involving that guarantees
this new product will be associative. The category of Z32 -graded vector spaces provides a
context in which the octonions are commutative and associative. So far this idea has just
begun to be exploited.
Example 5.2. A curious application of finite geometry is how to win in Transylvanian
lottery. The Transylvanian lottery is a lottery where three numbers between 1 and 14 are
picked by the player, and three numbers are chosed randomly. The player wins if two of his
174
numbers are among the random ones. The problem of how many tickets the player must buy
in order to be certain of winning can be solved by the use of the Fano plane. The solution
is to buy a total of 14 tickets, comprised of two sets of seven. One set of seven is every line
of a Fano plane with the numbers 1-7, the other with 8-14, i.e.:
1 2 5, 1 3 6, 1 4 7, 2 3 7, 2 4 6, 3 4 5, 5 6 7,
8 9 12, 8 10 13, 8 11 14, 9 10 14, 9 11 13, 10 11 12, 12 13 14
Because at least two of the winning numbers must be either high (8-14) or low (1-7),
and every high and low pair is represented by exactly one ticket, you would be guaranteed
at least two correct numbers on one ticket with these 14 purchases. 21 each 26 of the time
you will have one ticket with two numbers matched. If all three winning numbers are either
high or low you would either have one ticket with all three numbers (1 each 26 chance of
this occurring), or three different tickets that each matched two (4 each 26 chance).
175
176
177
References
[1] Meenaxi Bhattacharjee, Dugald Macpherson, Rgnvaldur G. Mller, and Peter M.
Neumann, Notes on infinite permutation groups, Texts and Readings in Mathematics,
vol. 12, Hindustan Book Agency, New Delhi, 1997, , Lecture Notes in Mathematics,
1698.
[2] Mauro Biliotti and Alessandro Montinaro, Finite projective planes of order n with a
2-transitive orbit of length n3, Advances in Geometry 6 (2006), 1537.
[3] Raj Chandra Bose, S. S. Shrikhande, and E. T. Parker, Further results on the construction of mutually orthogonal latin squares and the falsity of eulers conjecture, Canad.
J. Math. 12 (1960), 189203.
[4] Richard Hubert Bruck and Herbert J. Ryser, The non-existence of certain finite projective planes, Canadian Journal Math. 1 (1949), 8893.
[5] Juan de Burgos Roman, Curso de lgebra y geometra, vol. 1, Alambra, Madrid, 1982.
[6] John D. Dixon and Brian Mortimer, Permutation groups, Graduate Texts in Mathematics, vol. 163, Springer-Verlag, New York, 1996.
[7] David S. Dummit and Richard M. Foote, Abstract algebra, Prentice Hall Inc., Englewood Cliffs, NJ, 1991.
[8] Leonard Euler, De quadratis magicis, Commentationes arithmeticae 2 (1849), 593
602.
[9] Leonard Euler, Leonardi euleri opera omina , 1, vol. 7, Tuebner, Berlin-Leipzig, 1923.
[10] Gino Fano, Sui postulati fondamentali della geometria in uno spazio lineare ad un
numero qualunque di dimensioni, Giornale di matematiche 30 (1892), 106132.
[11] Harald Fripertinger, Enumeration in musical theory, Sminaire Lotharingien de Combinatoire (Thurnau, 1991), Publ. Inst. Rech. Math. Av., vol. 476, Univ. Louis Pasteur,
Strasbourg, 1992, pp. 2942.
[12] Ralph P. Grimaldi, Discrete and combinatorial mathematics: An applied introduction ,
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1998.
[13] Hin Hark Gan, Samuela Pasquali, and Tamar Schlick, Explorin the repertoire of rna
secondary motifs using graph theory; implications for rna design, Nucleic Acids Research 31.
[14] Israel Nathan Herstein, Abstract algebra, third ed., Prentice Hall Inc., Upper Saddle
River, NJ, 1996, With a preface by Barbara Cortzen and David J. Winter.
[15] Nathan Jacobson, Basic Algebra I, New York : W.H. Freeman, 1985.
[16] Dieter Jungnickel and Marialuisa J. de Resmini, Another case of the prime power
conjecture for finite projective planes, Advances in Geometry 2 (2002), 215218.
178
[17] Clement Wing Hong Lam, Larry Henry Thiel, and S. Swiercz, The non-existence of
finite projective planes of order 10 , Canadian Journal Math. 41 (1989), 11171123.
[18] Serge Lang, Algebra, third ed., Graduate Texts in Mathematics, vol. 211, SpringerVerlag, New York, 2002.
[19] Dugald Macpherson and Cheryl E. Praeger, Cycle types in infinite permutation groups,
J. Algebra 175 (1995), no. 1, 212240.
[20] Brendan D. McKay and Eric Rogoyski, Latin squares of order 10,
The Electronic Journal of Combinatorics 2 (1995), no. 1,N3, 14,
http://www.combinatorics.org/Volume_2/PDFFiles/v2i1n3.pdf.
[21] Sriram Pemmaraju and Steven Skiena, Computational discrete mathematics, Cambridge University Press, Cambridge, 2003, Combinatorics and graph theory with
Mathematica.
[22] Anavai Ramesh, George Becker, and Neil V. Murray, CNF and DNF considered harmful for computing prime implicants/implicates, J. Automat. Reason. 18 (1997), no. 3,
337356.
[23] Herbert J. Ryser, Combinatorial mathematics, Carus Mathematical Monographs,
vol. 14, Mathematical Association of America, 1963.
[24] kos Seress, Permutation group algorithms, Cambridge Tracts in Mathematics, vol.
152, Cambridge University Press, Cambridge, 2003.
[25] Douglas R. Stinson, A short proof of the non-existence of a pair of orthogonal latin
squares of order six, Journal Combinatorial Theory A36 (1984), 373376.
[26] Gaston Tarry, Le probleme des 36 oficiers, Compte Rendu Ass. Franc. Pour
lavacement des Sciences 2 (1901), 170203.
[27] Eric W. Weisstein, Finite Field. From MathWorldA Wolfram Web Resource ,
http://mathworld.wolfram.com/FiniteField.html.
[28] Frank Yates, A new method of arranging variety trials involving a large number varieties, Journal of Agriculture Science 26 (1936), 424455.
*A version of this chapter was also published in Discrete Mathematics Research Progress ,
edited by Kenneth B. Moore published by Nova Science Publishers, Inc. It was submitted
for appropriate modifications in an effort to encourage wider dissemination of research.
Chapter 7
1 Abstract
Network design and network synthesis have been the classical optimization problems in
telecommunication for a long time. In the recent past, there have been many technological
developments such as digitization of information, optical networks, Internet, and wireless
networks. These developments have led to a series of new optimization problems.
In communication networks, a number of requirements can be identified. For instance,
the network operator requires a good earning capacity, and the network users require reliable communication. The degree to which these and other requirements are fulfilled, can
in many cases be deduced from how the network resources are distributed. In contrast to
the Public Switched Telephony Network (PSTN), services offered in a data communication
network vary significantly in terms of the required bandwidth. This adds a new challenging
dimension into design of the networks, since inevitably, questions of fair medium sharing,
quality guarantees, delays, etc. become crucial.
Different methods of obtaining fair resource sharing are derived and investigated, for
example, Max-Min Fairness, Proportional Fairness, etc. We focus on fairness on backbone
networks possessing certain desired fairness properties.
Key Words: Resource Allocation, Communication Networks, Optimization
2 Introduction
In recent years, we have witnessed considerable accomplishments in the design and deployment of broadband communication networks. The dramatic growth of communications, as
93751502, slu@nccu.edu.tw
180
arose in the 90s along with the increasing availability of Internet, has given new prominence to dimensioning of the network infrastructure facilitating transfer of information (in
form of data, speech, etc.). An Internet service can be anything from electronic mail to
video-conferencing, but is always associated with a transfer of data, i.e., data communications. Network capabilities grow at a remarkable rate. At the same time, a phenomenal
growth in data traffic and a wide range of new requirements of emerging applications call
for new mechanisms for the control and management of communication networks. The idea
of a single shared physical network that will support multiple heterogeneous applications
with different traffic characteristics and different Quality of Service (QoS) requirements, is
widely regarded as the way to meet the telecommunication challenges of the future [14].
QoS has always been the major issue for telecom providers [51]. Packet-switched networks
have been proposed to offer the QoS guarantees in integrated-services networks because
individual packets may exhibit a significant variation in network service quality.
The rules for bandwidth allocation in networks carrying elastic traffic can be defined in
several ways, meeting different overall network goals. In Internet, it is desired to avoid poor
users, meaning users possessing an unfairly small share of bandwidth. The available bandwidth can be divided between the users according to their needs. Therefore, a problem of
network dimensioning with elastic traffic requires to allocate bandwidth to maximize flows
fairly [34]. Fair resource allocation problems are concerned with the allocation of limited
bandwidth among competing activities so as to achieve the best overall performances of the
system but providing fair treatment of all the competitors (see [20], [21], [34]). We introduce the methodology that allows the decision maker to explore a set of solutions satisfying
users preferences with respect to throughput and fairness. The formulation and analysis is
carried out in a general utility-maximizing framework.
QoS routing concerns the selection of a path satisfying the QoS requirements of a connection [15], [35]. The path selection process involves the knowledge of the connections
QoS requirements and information on the availability of bandwidth. QoS routing poses
major challenges in terms of algorithmic design. On one hand, the path selection process
is a complex task, due to the need to concurrently deal with the connections QoS requirements, as well as with the global utilization of network resources [4]; on the other hand,
connection requests need to be handled promptly upon their arrival [50]. Depending on the
specifics and the number of QoS metrics involved, computation in real time required for
path selection can become prohibitively expensive as the network size grows.
Consider a fixed network topology G = (V, E), where V and E denote the set of nodes
and the set of links in the network respectively. Given the maximal possible capacity of
each link. Suppose we know that, for each link, the cost taking account of delay and the
purchasing cost of bandwidth. In this network, there arem different classes which have their
own QoS requirement. In each class, every connection is allocated the same bandwidth
and has the same QoS requirement. Suppose each connection is delivered between the
same source and destination in this (core) network. Under a limited available budget, we
want to allocate the bandwidth in order to provide each class with maximal possible QoS.
The purpose of this work is to show that a methodology that allows the decision maker to
explore a set of solutions could satisfy preferences with respect to throughput and fairness,
and choose the solution which the decision maker finds best.
The challenge in integrated-services networks is to determine general resource alloca-
181
tion and QoS routing schemes that have the following desirable goals:
1. Links and bandwidth must be determined in a way such that the network can assure
fairness and maximize revenue.
2. Bandwidth must be allocated for each flow such that user requirements are met and
at the same time such that the predefined condition of fairness is satisfied.
3. An appropriate effective route for each flow (between two nodes) must be found.
These operational processes are involved in the efficient set-up and usage of a network.
Three main components of these processes are designed for which links to develop to meet
certain connectivity requirements, determining how much capacity to put on the links to
serve all traffic demands, and choosing which paths to use for the various traffic streams to
meet demand without violating capacity restrictions on links.
We deal with the problem of dimensioning bandwidth for elastic data applications in
packet-switched communication networks, which can be considered as a multiple-objective
optimization model. Each user is allowed to request more than one type of service, and
users satisfaction is summarized by means of their achievement functions. We focus on
allocating resources with proportional fairness and finding a routing scheme on communication networks. An approach is presented for the fair resource allocation problem and QoS
routing in networks, offering multiple services to users. The objective of the optimization
problem is to determine the amount of required bandwidth for each class to maximize the
sum of the users satisfaction.
3 Network Architecture
Internet is known to be of a best-effort nature, where each service is completed to the level of
quality that relevant transmission media (links, switches and routers) can provide. In effect,
an uncertainty is implied - a service may be satisfactorily set-up, but also, which is unfortunate, insufficiently carried out, due to time delays, connection interrupts etc. It may also
imply that particular applications work well, while others totally fail. The most common
problem, when a certain service fails, is lack of enough transmission bandwidth (measuring
the amount of data possible to transfer per second). Therefore, a high occurrence of failures
in service completion is commonly remedied by overdimensioning of network resources,
eliminating arising bottlenecks by adding capacity. The overdimensioning strategy has the
potential of solving the problem temporarily. However, regarding the fast development of
new, sophisticated Internet applications, it is reasonable to assume that the future will require even further overdimensioning. As the process continues, this strategy will result in a
network with a very large capacity, only occasionally fully used, and kept unemployed for
most of the time. Undoubtedly, this is economically unattractive.
Traffic generated in an edge network can roughly be put in either of two categories,
namely i) elastic traffic, which is a type of best-effort traffic that employs whatever resources
it is assigned, and ii) non-elastic traffic which is traffic that is typically sensitive to assigned
bandwidth and transmission delays etc. [40]. The data communications community is well
aware of the potential traffic property differences, as for instance the future Internet Protocol
182
(IPv6) features the so called flow-labelling function, which accommodates different QoS
requirements. Examples of elastic traffic are classical Internet applications as Web, File
Transfer Protocol (FTP), and mail. Real-time applications, as e.g. Voice over IP (VoIP) and
video-conferencing, are on the other hand typically nonelastic. Since the different types of
traffic are generated in the edge networks, they are as indicated above, multiplexed before
transmitted into the backbone network. Therefore, the aggregated backbone traffic flows
consist of both elastic and non-elastic traffic, and an appropriate denomination would be
semi-elastic traffic. This pushes forward the fact that the backbone traffic flows require a
minimal bandwidth level (constituted by the sum of the required bandwidth for the nonelastic applications), but still are able consume bandwidth exceeding this level (due to its
elastic portion).
The Universal Mobile Telecommunications System (UMTS) [41] has specified four
different traffic classes according to their QoS requirements for different applications as
Table 1 shows. The basic core network architecture for UMTS is based on GSM network
with GPRS [41]. The main function of the core network is to provide switching, routing and
transit for user traffic. A core network also contains the databases and network management
functions. For example, UMTS network services have different QoS classes for four types
of traffic:
1. Conversational class (voice, video telephony, video gaming)
2. Streaming class (multimedia, video on demand, webcast)
3. Interactive class (web browsing, network gaming, database access)
4. Background class (email, SMS, downloading)
In the communications community, a backbone network (or core network), is a network
that realizes the connections between local networks, as illustrated in Fig. 1. From the
backbone point of view, the local networks can be seen as edge networks, to which most of
the subscribers (traffic generators) are connected. Consequently, the majority of the traffic
can be regarded as generated in the local networks. Traffic from different users in a local
network is concentrated (multiplexed) by a switch which connects to more distant places,
by the backbone.
A similar process takes place on practically every level of the network hierarchy. For
instance, the local networks are connected to a regional network, which in turn is connected to a national network, and so on. As the local networks induce the traffic, the traffic
e4
183
e14
1
7
e5
e15
e1
Class 1
e11
Class 1
Class 2
e2
e12
e7
e19
Class 3
Class 4
e23
e24
e18
e6
e9
e8
3
d
Class 3
e20
e16
e3
Class 2
e25
10
e21
11
e26
Class 4
e13
e22
e10
e17
184
technique allows us to distribute bandwidth in a fair way. Of course, there will still be
a need to upgrade capacities from time to time, but such controlled medium-sharing will
facilitate an overall network stability and potentially enhance subscriber equity. Notably,
although new IP mechanisms supporting such control exist, very little work has been done
in this area.
Usually, it is argued that in data communications and particularly the Internet, traffic
patterns are very difficult or even impossible to predict. While this is certainly true for small,
local networks, it is a well-known fact that the larger the networks that are considered, the
more predictable and stable (in a relative sense) is the volume of the traffic. Consequently,
for a backbone network (typically very large), it might be reasonable to assume traffic flows
to be almost static, over certain periods of time. Consider for instance a transatlantic fiber
connection. The traffic on such a medium is composed of millions of individual Internet
sessions, so no single session has virtually any influence on the overall traffic behavior. On
the other hand, traffic in a small access network can be quite sensitive to a single session.
185
186
traffic of the IP protocol. Resource allocation models may be used to solve network design
problems [34].
Network management must stay within a budget of expenses for purchasing link bandwidth. Network dimensioning with elastic traffic may be thought of as a search for such network flows that will maximize the network throughput (the sum of all flows in the network)
while staying within a budget constraint for the costs of link bandwidth. However, such a
problem of formulation would lead to the starvation of bandwidth between certain network
nodes. Looking at the problem from the user perspective, the bandwidth between different
users should be treated as fairly as possible. Whatever the users preference, it would be
expressed in terms of fairness for a certain set of criteria which depend on the individual
connection. Let us first consider providing fairness for all connections between competitive
activities. Network management must consider two goals: increasing throughput and providing fairness [34]. These two goals are clearly conflicting if the budget constraint need to
be satisfied.
5 Problem Definition
The most convenient way of representing a communication network is by the notions provided by graph theory. Specifically, a network formed by nodes and links is modelled by a
graph of vertices and edges. In the sequel, the words vertex and edge are treated equivalent
to node and link, respectively. A link is regarded as a connection between the two nodes to
which it is attached. In the general setting, a link facilitates transfer of various entities, i.e.,
it may carry flows associated with several demands simultaneously. This is in fact a key
feature for the validity of the network model, and is often referred to as multi-commodity
flow network modelling. We consider all links to be directed. Furthermore, each link is
usually assigned a capacity, limiting the amount of flow that it can carry.
A connection is an directed request for flow transfer between two nodes. Sometimes it
can be convenient to associate such a demand with its volume. The volume is then specifying the requested flow size for the associated connection. A demand for flow can be realized
in several different ways, since two nodes may be connected directly or in various ways via
other nodes. A set of links connecting two nodes is referred to as path or route between the
nodes. A path is always associated with a connection. To keep track of the communication
possibilities, each connection is assigned a routing list, in which all the potential routes for
that connection can be found.
Consider a directed network topology G = (V, E) as shown in Fig. 1, where V and
E denote the set of nodes and the set of links in the network respectively. There are m
different QoS classes of connections in the network. Let I = {1, . . . , m} be an index
set consists of m different QoS classes. The specific QoS requirements, for each class i,
include minimal bandwidth requirement bi and maximal end-to-end delay constraint Di .
We denote the total number of connections, for each class i, by Ki . Let Ji , for each class
i, be an index set consists of Ki connections, that is, Ji = {1, . . . , Ki }. All connections
are delivered between the same source o and destination d in this (core) network. Every
connection, in the same class i, is allocated the same bandwidth xi and has the same QoS
requirement.
187
188
Definition 4 A feasible path pi,j between o and d, for a connection j of class i, is defined
as a (routing) path from o to d such that D(pi,j ) Di and each link along pi,j satisfies the
capacity constraint. A connection j of class i is feasible if it has a feasible path.
Definition 5 A feasible path pi,j is called a Pareto optimal path, for a connection j in class
i, if no other feasible path is as less as pi,j with respect to two evaluation, path cost and
ene-to-end delay, and strictly less than pi,j with respect to at least one evaluation.
Definition 6 The set of all Pareto optimal paths is called the routing database P . That is,
P = {pi,j | pi,j is the Pareto optimal path from o to d, j Ji , i I}.
Definition 7 A link
Pcalled bottleneck link if the usage of bandwidth achieves its link
P e is
capacity, that is, iI jJi yi,j (e) = Ue .
Decision variables are listed as follows:
yi,j (e) the bandwidth allocated to link e E for connection j in class i;
the bandwidth allocated to each connection in classi;
xi
zi,j (e) a binary variable which determines whether the link e is chosen for
connection j in class i.
Some notations are listed below:
V
A set of nodes in the network topology
E
A set of links in the network topology
I
An index set consists of m different QoS classes
Expected number of connections in class i
Ki
An index set consists of Ki connections in class i
Ji
Bandwidth requirement for each connection in class i
bi
B
Limited available budget
Unit cost for each link e E
e
Maximal capacity of each link e
Ue
M
A sufficiently large positive number
A subset of outgoing links connected with the source o
Eo
A subset of incoming links connected with the destination d
Ed
A subset of incoming links to the node V
Ein
189
Network Requirements
In designing a communication network, as in practically all problems of mathematical nature, some parameters are regarded as fixed (constant) and some are variable. The preliminary design target is to determine the variables, such that some overall objectives are
reached. Since a backbone certainly is a large and very complex network, there are several
ways of specifying a particular target, as well as variable and static parameters. Depending
on from what viewpoint the network is considered, a number of different problems can be
identified.
This paper uses the bandwidth and budget as constraints of requirements for feasible
path computations. Due to the limited budget on network planning, there exists the budget
constraint (2).
XXX
e yi,j (e) B
(2)
eE iI jJi
Because the aggregate bandwidth of all connections at any link does not exceed the capacity,
we have constraint (3).
XX
yi,j (e) Ue , e E
(3)
iI jJi
Constraints (4), (5), (6), and (7) show that every connection in the same class uses the same
bandwidth and has the same bandwidth requirement. For each e E, j = 1, . . . , Ki , and
i = 1, . . . , m,
(4)
yi,j (e) M zi,j (e) 0,
xi yi,j (e) M (1 zi,j (e)),
(5)
(6)
xi bi ,
(7)
and
where M is a sufficiently large number. Constraints (8), (10), and (9) express the node
conservation relations indicating that flow in equals flow out for every connectionj in class
i. For each j = 1, . . . , Ki , and i = 1, . . . , m,
X
yi,j (e) = xi ,
(8)
eEo
yi,j (e) = xi ,
(9)
eEd
and
X
eEin
yi,j (e) =
yi,j (e),
(10)
eEout
for all V \ {o, d}. Although yi,j (e) are continuous variables, constraints (8)-(9) are
flow conservation constraints. Continuous decision variables and binary variables must be
nonnegative, shown in constraints (11)-(13). For e E, j = 1, . . . , Ki , i = 1, . . . , m,
yi,j (e) 0,
(11)
190
(12)
(13)
and
Many problems in the network design context are particularly well formulated as optimization tasks. In general, an optimization task is formalized as a mathematical programme
consisting of an objective function and a set of constraints necessarily fulfilled. Our goal is
to maximize the total utility of all competing classes. Letfi be a real valued utility function
(which will be made apparent) and consider the mathematical programming
(Model 1)
max
wi fi (xi )
(14)
iI
s. t.
(2) (13)
(15)
P
iI wi
= 1, and M =
7
7.1
In the long run, a network operator always requires economical profit from the administrated network. For the possibility of this to be achieved, there are some obvious properties that a backbone must possess. Usually, vital parameters of the operators income are
proportional to the networks total throughput. The simplest way of defining a network allocation rule, and also the most profitable way from the network operator viewpoint, is to
maximize the total throughput of the network. This optimization task is called throughput
maximization, and is formulated as follows:
X
Ki xi
(Model 2)
max
iI
s. t.
(2) (13),
191
requirement of this type could be classified as direct, as it is imposed directly on the network by the operator. Indirect requirements are in this notion requirements imposed on
the network via the operator by the network service customers - the subscribers. In purchasing a service, the customers want to be guaranteed a certain degree of quality. Quality
of a service in turn, depends on to what amount of bandwidth a customer is assigned, the
connection reliability, etc. The volume of bandwidth assigned to one customer is strongly
dependent on the bandwidths assigned to other customers, which is natural since, after all,
the network is a shared medium. Regulations for how the medium should be shared must
take into account aspects of fairness, operators revenue, network utilization, etc.
7.2
s. t.
(2) (13),
7.3
Massouli
e and Roberts ([30], [31]) proposed an allocation policy called minimum potential
delay with utility functions (16). The minimal potential delay allocation is characterized as
the following objective function:
(Model 4)
max
s. t.
(2) (13).
iI
Ki
xi
Note that when Ki = 0 and thus xi = 0, the corresponding term in the objective function
should be dropped out.
7.4
The classical notion of fairness is the so-called Max-Min Fairness (MMF). In its original form, the MMF rule of allocating bandwidth disregards network total throughput, and
192
instead emphasizes the importance of meeting the demands of the poor users. In a pure fairness sense, it could be argued that allocating bandwidth according to this rule is optimal.
This fact and simplicity/efficiency of implementation make it commonly used in various
existent networks.
7.5
Kelly et al. [20] show that an allocation policy can be expressed in terms of a utility function, as a function of bandwidth (rate), in the sense that the desired bandwidth allocation
maximizes aggregate utility subject to constraints. Kelly et al. [20] advocated proportional
fairness characterized by log(xi ). This log utility function is strictly concave. The proportional fair bandwidth allocation is determined by the following objective function:
(Model 5)
max
Ki log(Ki xi )
iI
s. t.
(2) (13).
Determining the maximizer of this model can be done explicitly for simple networks. In this
case Kelly et al. [20] have shown that the maximizer corresponds to a proportionally fair
bandwidth allocation. Furthermore, for any other feasible rate, the aggregate weighted proportional change is nonnegative. Alternatively one can design rate control mechanisms that
converge to the associated bandwidth allocation [20]. This method of allocating bandwidth
yields a compromise between high total bandwidth allocation (total network throughput)
and fairness between users.
max
X
iI
s. t.
wi Ki
x1
i
1
(2) (13),
where wi is a fixed parameter. Due to the strict concavity of the function to be maximized,
this defines a unique allocation referred to as -bandwidth allocation. This allocation corresponds to the maximum throughput criterion when 0, to proportional fairness when
1, to the potential delay criterion when 2, and to max-min fairness when
[32].
193
max
wi log i
iI
s. t.
xi
ri
(2) (13),
Implication
We introduce the concept of majorization1 to provide the fairness. For any m-dimensional
vector x=( x1 , . . . , xm ) of reals, let x(1) . . . x(m) denote the components of x in
increasing order.
P
Pm
Pk
Definition 9 For x and t in Rm , x M t if m
i=1 s(i) =
i=1 t(i) and
i=1 x(i)
Pk
i=1 t(i) , for k = 1, . . . , m 1. When x M t then x is said to be majorized by t.
If x M t, then the allocation x is more fair than t. Next, we have the following
definition.
Definition 10 A function g : Rm R is called Schur-concave, if x M t implies g(x)
g(t).
Thus, we have the following theorem taken from [33].
Theorem 11 Let h be an arbitrary real function and defineg(x)=
then g is Schur-concave if and only if h is concave.
Pm
i=1
h(xi ) for x Rm ,
1
Multiple criteria optimization defines the dominance relation by the standard vector inequality. The theory
of majorization includes the results which allow us to express the relation of fair (equitable) dominance as a
vector inequality on the cumulative ordered outcomes (see [29] and [33]).
194
(17)
The simplest aggregation functions commonly used for the multiple criteria problem (16)
are defined as the sum of outcomes
X
fi (x),
(18)
g(f (x)) =
iI
(19)
(20)
(21)
195
fi (x)
(23)
iI
(25)
Hence, for each class i, the service times of connections occupying the end-to-end paths
have a general distribution G with mean 1/i = i /xi . Suppose that connections occupy
the end-to-end paths in the order they arrive and that packet sizes, which need to be transmitted from o to d, are identically distributed, mutually independent, and independent of
the inter-arrival times.
Under these assumptions, we analyze this end-to-end transmission system as
M/G/Ki /Ki loss systems [7], that is, Poisson arrivals, general service, Ki end-to-end paths
196
with identical bandwidth allocation xi , and no waiting space. For each class i, we can
derive the steady-state occupancy probabilities from Erlang loss system [39]. We have
i ni
i ni
i
xi
i
= Pi (0)
Pi (ni ) = Pi (0)
ni !
ni !
where ni = 1, 2, . . . , Ki , i = 1, 2, . . . , m.
P i
Solving for Pi (0) in the equation K
ni =0 Pi (ni ) = 1, we obtain that
j 1
j 1
Ki
Ki
X
X
1
1
i
i i
=
Pi (0) =
j! i
j!
xi
j=0
(26)
j=0
and then
Pi (ni ) =
j 1
ni X
Ki
1
i
j! i
j=0
ni X
j 1
Ki
1 i i
1 i i
ni !
xi
j!
xi
1
ni !
i
i
j=0
i i
xi
Ki X
j 1
Ki
i i
j!
xi
(27)
j=0
under conditions of Poisson arrival, general service time, and onlyKi end-to-end paths. Eq.
(27) is referred to as Erlangs loss formula [39]. If we denote the traffic load
i =
i i
,
Ki xi
(28)
Pi (Ki ) =
1
Ki
(Ki i )Ki X
(Ki i )j
Ki !
j!
j=0
(Ki i )Ki
[exp(Ki i ) Ri (Ki )]1
Ki !
(29)
where Ri (Ki ) is the Ki th-degree Taylor remainder term of exp(Ki i ) [3]. It is valid for all
service distributions and only depends on the traffic load, i . From Taylors formula with
remainder, we have the following results.
197
Ri (Ki ) =
Moreover,
lim Ri (Ki ) = 0.
Ki
Harel [16] proved that the fraction of customers lost in the M/G/K/K system is convex
in the arrival rate, if the traffic intensity is below some and concave if the traffic intensity
is greater than . Some convexity properties of the blocking probability (29) are listed
below. These results are consistent with convexity properties showed by Harel [16].
Proposition 16 For each Ki , there exists a i such that for all i < (>)i , the blocking
probability (29) is strictly convex (concave) ini .
Proposition 17 The blocking probability (29) is strictly decreasing and strictly convex in
xi /i , provided i and Ki fixed.
10
A backbone link cannot be sized in arbitrarily small portions, but are built up from fixedsized modules. Furthermore, even demand volume is usually restricted to allocation in
discrete portions. As a consequence, the resulting mathematical programmes have to be
solved over a partly integral-valued domain, rendering so-called mixed-integer programming problems (MIP problems). Large MIP problems are known to be very difficult to
handle and often require heuristics, in order to be solvable in a reasonable amount of time.
However, accounting for the requirement of modularity is a most challenging problem and
the research community of network design as well as the industry are addressing research
in this direction.
To summarize, it is our conviction that future large-scale networks, particularly the next
generation Internet, will require a large portion of sophisticated network engineering, in
order to meet the demands of service guarantees, connection reliability, cost efficiency and
structured sharing of transmission media. It is reasonable to assume that the sharing of
media will be based on fairness principles, possibly integrated in some sort of prioritization scheme, and that the network robustness will become the network design fundament.
Since the next generation Internet will be a large and indeed a very complex network of
networks (internetwork), a spirit of generality has to characterize the derivation of the new
engineering methodologies.
A future aim will also be to take the common requirement of QoS guarantees into
account. In the network optimization context such approaches are referred to as demandoriented. Our target is to make efforts in this direction, by combination of the novel techniques of network calculus along with the classical theory of optimization.
198
Acknowledgments.
This research was supported in part by the National Science Council, Taiwan, R.O.C., under
NSC 95-2221-E-004-007.
References
[1] Alkahtani, A. M. S., Woodward, M. E., and Al-Begain, K., Prioritised best effort routing with four quality of service metrics applying the concept of the analytic hierarchy
process, Computers & Operations Research 33, 559580 (2006).
[2] Andrade, R., Lisser, A., Maculan, N., and Plateau, G., B&B frameworks for the capacity expansion of high speed telecommunication networks under uncertainty,Annals of
Operations Research, 140, 4965 (2005)
[3] Apostol, T. M., Mathematical Analysis, 2nd ed., Addison-Wesley Publishing Company, Inc. (1974).
[4] Atov, I., Tran, H. T., and Harris, R. J., OPQR-G: Algorithm for efficient QoS partition
and routing in multiservice IP Networks, Computer Communications, 28, 19871996
(2005).
[5] Bai, Y. and Ito, M. R., Class-based packet scheduling to improve QoS for IP video,
Telecommunication Systems, 29 (1), 4760 (2005).
[6] Berger, A. W. and Kogan, Y., Dimensioning bandwidth for elastic traffic in high-speed
data networks, IEEE/ACM Transactions on Networking, 8 (5), 643654 (2000).
[7] Bertsekas, D. and Gallager, R., Data Networks, 2nd ed., Prentice Hall, New Jersey
(1992).
[8] Bertsekas, D.P., Network Optimization, Athena Scientific (1998).
[9] Correa, J. R., Schulz, A. S., and Stier-Moses, N. E., Fast, Fair, and Efficient Flows in
Networks, Operations Research, 55 (2), 215225 (2007).
[10] Djukic, P., Valaee, S., Reliable packet transmissions in multipath routed wireless networks, IEEE Transactions on Mobile Computing, 5 (5), 548559 (2006).
[11] Ferng, H. W. and Chang, J. F., The departure process of discrete-time queueing systems with Markovian type inputs, Queueing Systems, 36, 201220 (2000).
[12] Fischer, M. J., Masi, D. M. B., Gross, D., and Shortle, J. F., Loss systems with heavytailed arrivals, The Telecommunications Review, 15, 9599 (2004).
[13] Fortz, B., Rexford, J., Thorup, M., Traffic engineering with traditional IP routing
protocols, IEEE Communications Magazine, 40 (10), 118124 (2002).
[14] Gozdecki, J., Jajszczyk, A., Stankiewicz, R., Quality of service terminology in IP
networks, IEEE Communications Magazine, 41 (3), 153159 (2003).
199
[15] Guerin, R. A., Orda, A., QoS routing in networks with inaccurate information: Theory
and algorithms, IEEE/ACM Transactions on Networking, 7 (3), 350364 (1999).
[16] Harel, A., Convexity properties of the Erlang loss formula, Operations Research, 38
(3), 499505 (1990).
[17] van Hoesel, S., Optimization in telecommunication networks, Statistica Neerlandica,
59 (2), 180205 (2005).
[18] Johari, R., Tan, D. K. H., End-to-end congestion control for the Internet: Delays and
stability, IEEE/ACM Transactions on Networking, 9 (6), 818832 (2001).
[19] Kelly, F. P., Charging and rate control for elastic traffic, European Transactions on
Telecommunications, 8, 3337 (1997).
[20] Kelly, F. P., Maulloo, A. K., Tan, D. K. H., Rate control for communication networks: Shadow prices, proportional fairness and stability, Journal of the Operational
Research Society, 49, 237252 (1998).
[21] Kelly, F. P., Fairness and stability of end-to-end congestion control,European Journal
of Control, 9, 159176 (2003).
[22] Kelly, F. P., Williams, R. J., Fluid model for a network operating under a fair
bandwidth-sharing policy, The Annals of Applied Probability, 14 (3), 10551083
(2004).
[23] Lien, Y. N., Jang, H. C., Tsai, T. C., and Luh, H., BBQ: A QoS Management Infrastructure for All-IP Networks, Communications of Institute of Information and Computing Machinery: Mobile Communications and Wireless Networks, 7 (1), 89115
(2004).
[24] Loudni, S., Boizumault, P., and David, P., On-line resources allocation for ATM networks with rerouting, Computers & Operations Research, 33, 28912917 (2006).
[25] Low, S. H., Lapsley, D. E., Optimization flow controlPart I: Basic algorithm and
convergence, IEEE/ACM Transactions on Networking, 7 (6), 861874 (1999).
[26] Low, S. H., A duality model of TCP and queue management algorithms, IEEE/ACM
Transactions on Networking, 11 (4), 525536 (2003).
[27] Luh, H. and Wang, C. H., Mathematical Models of Pareto Optimal Path Selection on
All-IP Networks, Proceedings of The First Sino-International Symposium on Probability, Statistics, and Quantitative Management, 185197 (2004).
[28] Luh, H., Wang, C. H., Proportional bandwidth allocation for unicasting in All-IP networks, Proceedings of the 2nd Sino-International Symposium on Probability, Statistics, and Quantitative Management, 111130 (2005).
[29] Marshall, A. W., Olkin, I., Inequalties: Theory of Majorization and Its Applications,
New York: Academic Press (1979).
200
[30] Massouli
e , L., Roberts, J., Bandwidth sharing and admission control for elastic traffic,
Telecommunication Systems, 15, 185201 (2000).
[31] Massouli
e , L. and Roberts, J., Bandwidth sharing: objectives and algorithms,
IEEE/ACM Transactions on Networking, 10 (3), 320328 (2002).
[32] Mo, J., Walrand, J., Fair end-to-end window-based congestion control, IEEE/ACM
Transactions on Networking, 8 (5), 556567 (2000).
[33] Muller, Stoyan, A., D., Comparison Methods for Stochastic Models and Risks, Wiley,
Chichester (2002).
201
[46] Wang, C. H., Yue, W., Luh, H., Performance Evaluation of Predetermined Bandwidth
Allocation for Heterogeneous Networks, Technical Report of IEICE, 107 (6), 3742
(2007).
[47] Wang, C. H., Luh, H., Two-Phase Modeling of QoS Routing in Communication Networks. International Workshop on Performance Modeling and Evaluation in Computer and Telecommunication Networks (PMECT07) in conjunction with IEEE ICCCN2007, Honolulu, Hawaii, USA, August 16, 2007.
[48] Wang, C. H., Luh, H., Blocking Probabilities of QoS Routing in IP Networks with
Multiple Classes, The Second Asia-Pacific Symposium on Queueing Theory and Network Applications (QTNA2007), International Conference Center, Kobe, Japan, August 1-4, 2007.
[49] Wang, C. H., Luh, H., A Fair QoS Scheme for Bandwidth Allocation by
Precomputation-based Approach, International Journal of Information and Management Sciences, 19 (3), accepted for publication (2008).
[50] Wu, H., Jia, X., He, Y., Huang, C., Bandwidth-guaranteed QoS routing of multiple
parallel paths in CDMA/TDMA ad hoc wireless networks, International Journal of
Communication Systems, 18, 803816 (2005).
[51] Xiao, X., Ni, L. M., Internet QoS: A big picture, IEEE Network, 13 (2), 818 (1999).
[52] Ye, H. Q., Qu, J., Stability of data networks: Stationary and bursty models. Operations Research, 53 (1), 107125 (2005).
Chapter 8
R EVERSIBLE L OGIC
Alexis De Vos
Department of Electronics and Information Systems, University of Ghent,
Ghent, Belgium
Abstract
Reversible logic circuits are beneficial to both classical and quantum computer design. Present-day logic building-blocks (like OR gates and NAND gates) are logically
irreversible and therefore cannot be used for designing reversible computers. Thus
reversible computation needs an appropriate design methodology. In contrast to conventional digital logic circuits, reversible logic circuits (of a same logic width w) form
a mathematical group. The reversible circuits of width w form a group isomorphic to
the symmetric group S2w . Its Young subgroups allow systematic and efficient synthesis of an arbitrary reversible circuit. We can choose either a left coset, a right coset,
or a double coset approach. The optimal design is reminiscent of the so-called banyan
networks of telecommunication.
As an illustration, three experimental prototypes (in c-MOS chip technology) of
reversible computing devices are presented. Special care has been taken to avoid as
much as possible the appearance of garbage bits. The examples illustrate how, in a
near future, reversible computers will outperform conventional computers, in terms of
power dissipation and heat generation.
1.
Introduction
Reversible computing [1] [2] is useful both in low-power classical computing [3] [4] and in
quantum computing [5]. According to the Landauer theorem, the only way to make classical digital computing lossless, is by taking care that, at each stage of the computation, no
information is lost. Indeed, each bit of information that is thrown away, causes the generation of a quantum of heat (with magnitude kT log(2), where k is the Boltzmann constant
and T is the temperature of the computer hardware). This can be easily seen, using thermodynamics. For instance, resetting a bit to 0 makes one forget about its original contents.
So, an unknown bit has become a fully specified one and thus the (macroscopic) entropy
204
Alexis De Vos
adding
computer
adding
computer
= A+B
Q = AB
suffices to calculate backwards:
A =
1
(P + Q)
2
B =
1
(P Q) .
2
Reversible Logic
205
206
Alexis De Vos
Table 1. Truth table of two irreversible logic circuits: (a) the AND gate and (b) the OR
gate.
AB
AB
00
01
10
11
0
0
0
1
00
01
10
11
0
1
1
1
(a)
XY
(b)
= X AND Y
X+Y
= X OR Y
XY
= X XOR Y ,
2.
Group Theory
All reversible circuits of the same width form a group. If we denote by w the width, then
the truth table of an arbitrary reversible circuit has 2w rows. As all output words have to be
Reversible Logic
207
Table 2. Truth table of three reversible logic circuits of width 2: (a) an arbitrary
reversible circuit r, (b) the identity gate i, and (c) the inverse r1 of r.
AB
PQ
AB
PQ
AB
PQ
00
01
10
11
00
10
11
01
00
01
10
11
00
01
10
11
00
01
10
11
00
11
01
10
(a)
(b)
(c)
different, they can merely be a repetition of the input words in a different order. In other
words: the 2w output words are a permutation of the 2w input words. There exist (2w )! ways
to permute 2w objects. Therefore there exist exactly (2w )! different reversible logic circuits
of width w. The number 2w is called the degree of the group; the number (2w )! is called the
order of the group. The group is isomorphic to a group well-known by mathematicians: the
symmetric group S2w . For further reading in the area of symmetric groups in particular, and
groups, subgroups, cosets, and double cosets in general, the reader is refered to appropriate
textbooks [10] [11].
The symmetric group has a wealth of properties. For example, it has a lot of subgroups,
of which most have been studied in detail. Some of these subgroups naturally make their
appearance in the study of reversible computing. An example is the subgroup of conservative logic circuits, studied in detail by Fredkin and Toffoli [12]. Table 3a gives an example.
In each of its rows, the output (P, Q, R, ...) contains a number of 1s equal to the number
of 1s in the corresponding input (A, B, C, ...). Table 4 gives C(w), the number of conservative logic circuits of width w. An even more important subgroup is the subgroup of linear
reversible circuits. Linear reversible circuits have been studied in detail by Patel et al. [13].
A logic circuit is linear iff each of its outputs P , Q, ... is a linear function of the inputs A,
B, ... In its turn, a linear function is defined as follows. A Boolean function f (A, B, ...)
is linear iff its ReedMuller expansion [14] only contains terms of degree 0 and terms of
degree 1. The reversible circuit of Table 3a is not linear. Indeed it can be written as a set of
three Boolean equations:
P
= B AB AC
Q = A
R = C AB AC .
Whereas the function Q(A, B, C) is linear, the function P (A, B, C) is clearly not (its
ReedMuller expansion containing two terms of second degree). Table 3b is an example of
208
Alexis De Vos
Table 3. Truth table of three reversible logic circuits of width 3: (a) a conservative
circuit, (b) a linear circuit, and (c) an exchanging circuit.
ABC
P QR
ABC
P QR
ABC
P QR
000
001
010
011
100
101
110
111
000
001
100
101
010
110
011
111
000
001
010
011
100
101
110
111
100
000
001
101
111
011
010
110
000
001
010
011
100
101
110
111
000
001
100
101
010
011
110
111
(a)
(b)
(c)
a linear circuit:
P
= 1B C
Q = A
R = AB .
Based on pioneering work by Kerntopf [15], De Vos and Storme [16] have proved that
an arbitrary Boolean function can be synthesized by a (loop-free and fanout-free) wiring
of a finite number of identical reversible gates, provided the gate is not linear. In other
words: all non-linear reversible circuits can be used as a universal building block. Thus the
linear reversible circuits constitute the weak ones. Indeed, any wiring of linear circuits
(be they reversible or not, be they identical or not) can yield only linear Boolean functions
at its outputs. The linear reversible circuits form a group isomorphic to what is called in
mathematics the affine general linear group AGL(w, 2). Its order equals 2(w+1)w/2 w!2,
where w!2 is the bifactorial of w, the q-factorial being a generalization of the ordinary
factorial w! = w!1:
w!q = 1(1 + q)(1 + q + q 2 )...(1 + q + ... + q w1 ) .
Table 4 gives the number of different linear reversible circuits. We see that (at least for
w > 2) a vast majority of the reversible circuits are non-linear and thus can act as universal
gates.
Now we descend the hierarchy of subgroups one step, by imposing that each of the
outputs equals one of the inputs. Table 3c is such a circuit:
P
= B
Q = A
R = C.
Reversible Logic
209
R
2
24
40,320
20,922,789,888,000
C
1
2
36
414,720
2
24
1,344
322,560
1
2
6
24
Such circuits are called exchangers (a.k.a. SWAP gates). They form a subgroup isomorphic
to Sw of order w!. Also this number is given in Table 4. Finally, we can impose that each
of the outputs equals the corresponding input:
P
= A
Q = B
R = C.
This results in the trivial subgroup I of order 1, merely consisting of one circuit, i.e. the
identity gate i.
We have thus constructed a chain of subgroups:
S2w AGL(w, 2) Sw I ,
with subsequent orders
(2w )! > 2(w+1)w/2 w!2 > w! > 1 ,
where we have assumed w > 1. Here, the symbol reads is proper supergroup of. For
the example w = 3, this becomes:
S8 AGL(3, 2) S3 I ,
with subsequent orders
40, 320 > 1, 344 > 6 > 1 .
3.
Control Gates
Besides using the letters A, B, C, ... for the input bits and P , Q, R, ... for the output bits,
we will also use A1 , A2, ..., Aw for the inputs and P1 , P2, ..., Pw for the outputs, because
sometimes this is more convenient.
210
Alexis De Vos
Table 5. Truth table of three reversible logic circuits of width 3: (a) an arbitrary
circuit, (b) a controlled NOT gate, and (c) a twin circuit.
A1 A2 A3
P1 P2 P3
A1 A2 A3
P1 P2 P3
A1 A2A3
P1 P2 P3
000
001
010
011
100
101
110
111
100
101
110
000
111
011
010
001
000
001
010
011
100
101
110
111
001
000
011
010
101
100
110
111
000
001
010
011
100
101
110
111
001
011
010
000
100
101
111
110
(a)
(b)
(c)
We now define a special class of reversible logic circuits, called control gates, by their
relationship between the outputs P1 , P2, ..., Pw and the inputs A1 , A2, ..., Aw. In a control
gate, we always have P1 = A1, P2 = A2 , ..., Pu = Au , where u is an integer obeying
0 < u < w. The other outputs, i.e. Pu+1 , Pu+2 , ..., and Pw , are controlled by means of
some Boolean function f of the u inputs A1, A2 , ..., Au :
If f (A1 , A2, ..., Au) = 0, then we additionally have Pu+1 = Au+1 , Pu+2 = Au+2 ,
..., Pw = Aw .
If however f (A1 , A2, ..., Au) = 1, then the values of Pu+1 , Pu+2 , ..., Pw follow
from the values of Au+1 , Au+2 , ..., Aw by the application of a reversible circuit g
of width v = w u.
Thus: if f = 0, then we apply the v-bit follower to Au+1 , Au+2 , ..., Aw, else we apply the vbit circuit g to them. We call A1 , A2, ..., Au the controlling bits and Au+1 , Au+2 , ..., Au+v
the controlled bits. Whereas w is the width, u is the controlling width and v is the controlled
width. We call f the control function and g the controlled circuit.
u
There exist 22 Boolean functions f of u binary variables. Together with the XOR
operation, they form a group isomorphic to the direct product group S2 S2 ... S2 =
u
S22 . Therefore, the control gates with a same controlled gate g form a group isomorphic to
u
u
S22 . Its order is 22 .
We also assign an icon to the control gate: Figure 3b (where u = 4 and v = 2, such that
w = 6). Note that each of the controlling bits is labelled by a small square. However, in the
special case where the controlling function f (A1 , A2, ..., Au) is an AND of some controlling bits whether inverted or not, then circular tags are used: a filled circle if the variable
is not inverted, an open circle if the variable is inverted. Figure 3c shows an example:
f (A1 , A2, A3, A4) = A1 A3 A4.
We consider two special cases in detail:
Reversible Logic
211
Figure 3. Icons of reversible circuits of width w = 6: (a) arbitrary circuit, (b) control gate
with arbitrary control function f , and (c) control gate with AND control function.
If v = 1, then only two possibilities exist for the controlled circuit g: either it is
the trivial follower or it is the inverter. We only have to consider the latter choice.
Then the controlled gate is represented by a cross: see Figure 4a. We call such
gates controlled NOTs. An example is given in Table 5b. Its controlling function is
f (A1, A2) = A1 + A2 . Note that, in the truth table of a controlled NOT, the first
two rows are either permuted or not, the second two rows are either permuted or not,
etcetera. Therefore the controlled NOTs form a subgroup isomorphic to S2 S2 ...
w1
[17]. If the gates control function f is an AND function, we call it
S2 of order 22
a TOFFOLI gate (e.g. Figure 4b with control function f = A1 A3 A4 ).
If v = 2, then 4! = 24 possibilities exist for the controlled circuit g. The most interesting case is where g is a SWAP gate. Then the controlled gate is represented by a
cross-over: see Figure 4c. We call such gates controlled SWAPs. They form a subw2
group of order 22 . If additionally the gates control function is an AND function,
we call it a FREDKIN gate (e.g. Figure 4d with control function f = A2 A3 ).
Note that the functionallity of the controlled NOT gate can be written as a set of w Boolean
equations:
P1 = A1
P2 = A2
...
Pw1 = Aw1
Pw = f (A1 , A2, ..., Aw1) Aw
(1)
212
Alexis De Vos
Figure 4. Icons of control gates: (a) arbitrary controlled NOT gate, (b) specific TOFFOLI
gate, (c) arbitrary controlled SWAP gate, and (d) specific FREDKIN gate.
and so can the functionallity of the controlled SWAP gate:
P1 = A1
P2 = A2
...
Pw2 = Aw2
Pw1 = f (A1, A2, ..., Aw2)(Aw1 Aw ) Aw1
Pw = f (A1, A2, ..., Aw2)(Aw1 Aw ) Aw .
4.
(2)
Cosets
Subgroups are at the origin of a second powerful tool in group theory: cosets. For convenience, we will, as much as possible, adopt the following style: a group is represented by a
bold-faced capital letter; its order is denoted by an upper-case letter, whereas an element of
the group is represented by a lower-case letter. E.g. a and b might be two elements among
the C elements of some group C. Already in Table 4, we used upper-case letters (i.e. R, C,
L, and E) for group orders.
If H (with order H) is a subgroup of the group G (with order G), then H partitions G
G
classes, all of the same size H. These equipartition classes are called cosets. We
into H
distinguish left cosets and right cosets.
The left coset of the element a of G is defined as all elements of G which can be written
as a cascade ba, where b is an arbitrary element of H. Such left coset forms an equipartition
class because of the following property: if c is member of the left coset of a, then a is
member of the left coset of c. Right cosets are defined in an analogous way. Note that H
itself is one of the left cosets of G, as well as one of its right cosets.
What is the reason of defining cosets? They are very handy in synthesis. Assume we
want to make an arbitrary element of the group G in hardware. Instead of solving this
problem for each of the G cases, we only synthesize the H circuits b of H and a single
G
1). If we can make each of these
representative ri of each other left coset (1 i H
Reversible Logic
213
G
H+H
1 circuits, we can make all the others by merely making a short cascade bri. If we
G
1 is much smaller than G.
cleverly choose the subgroup H, we can guarantee that H + H
G
We call the set of H + H 1 building-blocks the library for synthesizing the G circuits
of G.
The clever choice of the subgroup H of G is the challenge of the designer. He/she can
G
1)/dH = 0, what leads to
e.g. aim for minimizing the size of the library: d(H + H
log(G)
=2.
log(H)
Ratios of logarithms of sizes will play more important parts in our story. See e.g. Appendix B.
Maslov and Dueck [18] present a method for synthesizing an arbitrary reversible circuit of width three. As a subgroup H of the group G = S8 , they propose all circuits with
output (P, Q, R) equal (0,0,0) in case of the input (A, B, C) = (0, 0, 0). This subgroup
is isomorphic to S7 . Thus the supergroup has order G = 8! = 40, 320, whereas the subgroup has order H = 7! = 5, 040. The subgroup partitions the supergroup into 8 cosets.
Interesting is the fact, that the procedure can be repeated: for designing each of the 5,040
members of S7 , Maslov and Dueck choose a subgroup of S7 . They choose all reversible
circuits where (P, Q, R) equals (0,0,0) in case (A, B, C) = (0, 0, 0) and equals (0,0,1) in
case (A, B, C) = (0, 0, 1). This is a subgroup isomorphic to S6 of order 6! = 720, which
partitions S7 into seven cosets. Etcetera. Figure 5a illustrates one step of the procedure:
the 24 elements of S4 are fabricated by means of the 6 elements of its subgroup S3 plus
the representatives of the 3 other cosets in which S4 is partitioned by S3 . Thus Maslov and
Dueck apply the following chain of subgroups:
S8 S7 S6 S5 S4 S3 S2 S1 = I ,
(3)
(4)
They need, for synthesizing all 40,320 members of S8 , a library of only (7+6+...+1)+1 =
29 elements (the identity gate included). For an arbitrary circuit width w, synthesis of all
(2w )! members of S2w needs a library of 22w1 2w1 + 1 elements.
Van Rentergem et al. [19] [20] also present a coset method for synthesis, however based
the following subgroup H: all circuits from G = S2w possessing the property P1 = A1. Such
circuits consist of the cascade of two control gates with u = 1 and v = w 1. See Figure 6.
If A1 = 0, then g is applied to A2 , A3 , ..., and Aw , else (thus if A1 = 1) h is applied. We
will call such circuit a twin circuit. An example is given in Table 5c. Note that, in the truth
table of a twin circuit, the upper 2w1 rows are permuted among themselves and so are
the lower 2w1 rows. Therefore the twin circuits form a subgroup isomorphic to S2w1
S2w1 . The twin circuits of width 3 form a group isomorphic to S4 S4 = S24 of order
214
Alexis De Vos
S4
S3
S4
S 2 x S2
Figure 5. The symmetric group S4 partitioned (a) as the four left cosets of S3 and (b) as the
three double cosets of S2 S2 .
Note: the dots depict the elements of S4 ; the bold-faced dots depict the elements of the subgroup and the
representatives of the (double) cosets.
(5)
(6)
Reversible Logic
5.
215
Double Cosets
Even more powerful than cosets are double cosets. The double coset of a, element of G,
is defined as the set of all elements that can be written as b1ab2 , where both b1 and b2 are
members of the subgroup H. A surprising fact is that, in general, the double cosets, in which
G is partitioned by H, are of different sizes (ranging from H to H 2). The number of double
cosets, in which G is partitioned by H, therefore is not easy to predict. It is some number
G
G
between 1 + GH
H 2 and H . Usually, the number is much smaller than H , leading to the
(appreciated) fact that there are far fewer double cosets than there are cosets. This results
in smaller libraries for synthesis. However, there is a price to pay for such small library.
Indeed, if the chain of subgroups considered has length n, then the length of the synthesized
cascade is 2n 1 (instead of n as in the single coset synthesis).
The subgroup Sa1 partitions its supergroup Sa into only two double cosets, a small one
of size (a 1)! and a large one of size (a 1)!(a 1). Therefore, a double coset approach
using the MaslovDueck subgroup chain (3) needs only 2w library elements. However, a
w
synthesized cascade can be 22 1 gates long. Therefore this subgroup chain is not a good
choice in combination with double coset synthesis.
For the problem of synthesizing all members of S8 , Van Rentergem, De Vos and Storme
[24] have chosen the double cosets of the above mentioned subgroup obeying P1 = A1 .
They conclude that, for synthesizing all 40,320 members of S8 , they need a library of only
(4 + 2 + 1) + 1 = 8 elements. These suffice to synthesize an arbitrary member of S8 by a
cascade with length of seven or less. For an arbitrary circuit width w, synthesis of all (2w )!
members of S2w needs a library of 2w 1 elements.
Figure 5b illustrates one step of the procedure: the 24 elements of S4 are fabricated by
means of the 4 elements of its subgroup S2 S2 plus the representatives of the two other
double cosets in which S4 is partitioned by S2 S2 . Figure 7a shows how an arbitrary
member g of S16 is decomposed with the help of two members (b1 and b2) of S8 S8 and
one representative a of the double coset of g. Van Rentergem et al. have demonstrated that
it is always possible to construct a representative that is a controlled NOT gate:
P1 = f (A2, A3, ..., Aw) A1
P2 = A2
P3 = A3
...
...
Pw = Aw ,
where (in contrast to Section 3) A1 is the controlled bit (instead of Aw ). A proof is given in
Appendix A (case p = 2w1 and q = 2).
We conclude that the present synthesis for an arbitrary circuit of width w consists of the
cascade of
a first twin circuit,
a controlled NOT gate, and
a second twin circuit.
216
Alexis De Vos
Figure 7. An arbitrary circuit g (member of the group S16 ) decomposed as b1ab2 with the
help of double cosets generated (a) by its subgroup S28 and (b) by its subgroup S82 .
We illustrate the Van Rentergem procedure with an example where G = S8 and H isomorphic to S24 and thus G = 40, 320 and H = 576. We choose the truth table of Table 5a.
Figure 8a gives the result of repeated application of the procedure, until all subcircuits are
member of S2 , i.e. are equal to either the 1-bit identity gate or the 1-bit inverter. The nested
schematic can easily be translated into a chain of controlled NOTs, i.e. the conventional
way of writing down a reversible circuit: Figure 8b. This particular circuit consists of eigth
controlled NOT gates, of which seven are simply TOFFOLI gates. We now introduce a cost
function, called gate cost: we assign to each controlled NOT a unitary cost (whatever the
number of variables in the control function). The gate cost of Circuit 8b thus is 8. Note that
the present double coset approach ends up with a chain of cost of the order 4w .
6.
B
C
Q
R
A
B
C
P
Q
R
Figure 8. Decomposition of the example circuit of width 3 (Table 5a): (a) written as nested
controlled gates and (b) written as a chain of controlled NOTs.
Reversible Logic
217
(2w1 terms) .
Because of its importance, we give here in detail [25] [26] the synthesis algorithm using
the latter partition:
Algorithm A
In the algorithm, we use the notations like Ai (j), where the subscript i refers to the column
in the truth table, whereas the number j refers to the row. Thus these counters obey 1
i w and 1 j 2w . For finding the three parts of the decomposition, we proceed as
follows. We add to the given truth table (consisting of w input columns A and w output
columns P ) two extra sets of columns F and J. These are filled in, in three steps:
First, we fill in the w 1 columns F2 , F3 , ..., Fw by merely copying columns A2 , A3 ,
..., Aw and, analogously, fill in the w 1 columns J2, J3 , ..., Jw by merely copying
columns P2 , P3 , ..., Pw .
Then we construct a coil of 0s and 1s, starting from F1 (1) = 0.
Then we construct a second coil, starting from the non-filled-in F1 (j) with lowest j,
etcetera, until all F1 (and thus also all J1 ) are filled in.
Above, a coil consists of a finite number of windings. Here, a winding is a fourbit sequence F1 (k) = X, F1 (l) = X, J1 (l) = X, and J1 (m) = X, where l results from the condition that the string F2 (l), F3(l), ..., Fw(l) has to be equal to the
string F2 (k), F3(k), ..., Fw(k) and where m results from the condition that the string
J2 (m), J3(m), ..., Jw(m) has to be equal to the string J2 (l), J3(l), ..., Jw(l).
Although the above text might suggest that the algorithm is complicated, it is in fact
very straightforward. Figure 9 provides an illustration of this fact, by giving in detail the
synthesis of a reversible circuit of width w = 2, i.e. the circuit with two inputs (A1 and
A2 ) and two outputs (P1 = A2 and P2 = A1 , in this particular case). First, between
the columns (A1, A2) and (P1, P2) of the truth table, we insert the four empty columns
(F1 , F2) and (J1 , J2). Subsequently, columns F2 and J2 are filled in by simply copying
A2 and P2 , respectively. This step is displayed in boldface. Next comes the tricky part:
filling in the columns F1 and J1 . For this purpose, we start at F1 (1). We may set this bit
arbitrarily, but we choose to set it to 0. This starting choice is marked by a small square
in Figure 9. As a consequence, we automatically can fill in a lot of other bits in columns
218
Alexis De Vos
A1 A2
F1 F2
0
0
1
1
0
1
1
0
0
1
0
1
0
1
0
1
J1 J 2
0
1
1
0
1
1
0
0
P1 P2
0
1
0
1
1
1
0
0
Figure 9. Example of a synthesis according to the basic algorithm ( w = 2): expanded truth
table.
F1 and J1 . Indeed, as all computations need to be reversible, F1 (1) = 0 automatically
leads to F1 (3) = 1. Then we impose J1 (3) = F1 (3), i.e. J1 (3) = 1. Again, reversibility
requires that J1 (3) = 1 infers J1 (4) = 0. Etcetera, until we come back at the starting point
F1 (1). The arrows in Figure 9 show the order of filling in. Here, everything is filled in
when the travelling around is closed. So, this synthesis is finished after a single coil. This
example illustrates that during the application of the algorithm, we walk in circles, while
repeatedly assigning the bit sequence
0, 1, 1, 0, 0, 1, 1, ..., 1, 1, 0, 0, 1, 1, 0 .
In case the first coil is closed before columns J1 and F1 are completely filled in, the designer
just has to start a second coil, etcetera.
The fact that the above algorithm always comes to an end with the extended truth table
being completely filled, constitutes an additional proof that the theorem of Appendix A is
true for the special case p = 2 (and thus q = 2w1 ).
As a result, Algorithm A yields a decomposition of an arbitrary reversible circuit a (Figure 10a) into the desired cascade (Figure 10b) of a first controlled NOT gate with controlled
bit on the first wire, a twin circuit a1 leaving the first bit unaffected (P1 = A1 ), and a second
controlled NOT gate with controlled bit on the first wire. Note that circuit a1 in Figure 10b
is simpler than circuit a in Figure 10a, as a1 obeys P1 = A1.
Algorithm A can now be deepened as follows. By applying the decomposition of
a1 into three circuits, we obtain Figure 10c, where the circuit a2 is again simpler than
the circuit a1 , because it fulfils both P1 = A1 and P2 = A2 . Etcetera, until we obtain
Figure 10d, where the circuit aw1 obeys P1 = A1, P2 = A2 , ..., and Pw1 = Aw1 .
These properties reveal that aw1 is nothing but a control gate with controlled bit Aw .
Therefore, Figure 10d is equivalent to Figure 10e, such that we have decomposed a into
2w 1 controlled NOT gates. This procedure automatically leads us to Algorithm B:
Algorithm B
We add to the given truth table (consisting of w input columns A and w output columns P )
not two extra sets of columns, but 2(w 1) sets of columns. We call them A1, A2, ...,
Reversible Logic
a1
a2
a3
219
Figure 10. Decomposition of a reversible logic circuit of width w = 4 : (a) original logic
circuit, (b), (c), and (d) intermediate steps, (e) final decomposition.
Aw2 , Aw1 , P w1 , P w2 , ..., P 2 , and P 1 . Together they make 2(w 1)w new columns.
These are filled in, in the following steps:
First, we fill in all A1 columns except column A11 , by copying the w1 corresponding
A columns, and analogously, we fill in all P 1 columns except column P11 , by copying
the w 1 corresponding P columns.
Then we fill in the two columns A11 and P11 , by constructing a coil, starting from bit
A11(1), then constructing a new coil, starting at the non-filled-in A11(j) with lowest j,
etcetera, until all A11 (and thus also all P11 ) are filled in.
Then, we fill in all A2 columns except column A22 , by copying the w 1 correspond-
220
Alexis De Vos
Table 6. Expanded truth table according to Algorithm B.
A1A2 A3
0
0
0
0
1
1
1
1
0
0
1
1
0
0
1
1
0
1
0
1
0
1
0
1
0
0
1
1
0
0
1
1
0
1
0
1
0
1
0
1
0
0
1
1
1
0
0
1
0
1
0
1
0
1
0
1
0
0
1
1
1
0
0
1
0
1
0
0
1
1
0
1
0
0
1
0
1
1
1
0
0
1
0
0
1
1
0
1
P1 P2 P3
1
1
1
0
1
0
0
0
0
0
1
0
1
1
1
0
0
1
0
0
1
1
0
1
ing A1 columns, and analogously, we fill in all P 2 columns except column P22 , by
copying the w 1 corresponding P 1 columns.
Then we fill in the two columns A22 and P22 , by constructing the appropriate number
of coils, starting from bit A22 (1), until all A22 (and thus also all P22 ) are filled in.
w1
Etcetera, until finally all Aw1
w1 (and thus also all Pw1 ) are filled in. At that moment,
we have all 2w2 2w entries of the extended table.
We illustrate our deepened procedure for the example circuit in Table 5a. By applying
the above procedure, we obtain Table 6. The first step of the procedure is displayed in bold
face, whereas the second step is emphasized in italic. (The reader may verify that here
this step requires two coils, the former having three windings, the latter having only one
winding.) The third step of the algorithm is underlined.
The above procedure thus yields a decomposition of the logic circuit into five logic
circuits (one computing A1 from A, one computing A2 from A1 , ..., and one computing P
from P 1 ). All five subcircuits are automatically controlled NOT gates. By merely inspecting
Table 6, we find their subsequent control functions: f (A2 , A3) = A3 , f (A11 , A13) = A11 A13 ,
f (A21 , A22) = A21 A22 , f (P12 , P32 ) = P12 P32 , and f (P21 , P31) = P31 .
Figure 11a shows the final synthesis of Table 5a with its five controlled NOT gates.
Note that this gate cost of 5 is lower than the gate cost of 8 in Figure 8b. Noteworthy is the
automatic V-shape of the positions of the five crosses (i.e. controlled NOTs) in the figure.
When we apply the same procedure to each of the 8! = 40,320 circuits of the group S8 ,
sometimes one or more of the five control functions equals 0. This means that one or more
of the five controlled NOTs is the identity gate and thus in fact is abscent, such that there
is a total of less than five gates. We thus yield a statistical distribution of gate cost ranging
from 0 to L = 2w 1 = 5. The average gate cost turns out to be about 4.2.
We stress that a gate cost 2w 1 is very close to optimal. No synthesis method can do
better than 2w3. This is proven in Appendix B. This constitutes a significant improvement
over the method described in Section 5, as the latter yields cascade lenghts rising as 4w . As
Reversible Logic
221
A1
P1
A2
P2
A3
P3
A1
P1
A2
P2
A3
P3
Figure 11. Decomposition of the example circuit of width 3 (Table 5a), according to Algorithm B: (a) into controlled NOT gates and (b) into TOFFOLI gates.
w1
The name ESOP is derived from the expression exclusive-or sum of products. It is a variant of the SOP
or sum of producs, where sum stands for the Boolean OR function and product for AND. Thus an ESOP is
a Boolean expression which is written as a XOR of ANDs. In contrast to the ReedMuller expansion, an ESOP
expansion allows NOT functions (besides the XOR and the AND functions).
222
Alexis De Vos
S
S2
S
2
4
S2
I
I
4
S
2
S2
Figure 12. Two sets of efficient subgroups: (a) a subgroup chain and (b) a subgroup flower.
whereas one of the minimum-ESOP expansions (Figure 13c) is:
f = A1 A1 A2 .
Applying either the ReedMuller decomposition or a minimum- ESOP expansion to the
circuit of Figure 11a yields Figure 11b, with six TOFFOLI gates.
7.
Garbage Bits
In the above sections, synthesis means: finding a hardware implementation for a given
reversible truth table. However, often a synthesis job is defined by an irreversible truth
table. A famous example is the design of a full adder: see Table 7a. It has three input bits:
the augend bit A, the addend bit B, and the carry-in bit Ci ; it has two output bits: the sum
Figure 13. Decomposition of (a) a controlled NOT gate into (b) its ReedMuller expansion
and into (c) one of its minimal ESOP expansions.
Reversible Logic
223
ABCi
Co S
000
001
010
011
100
101
110
111
00
01
01
10
01
10
10
11
(a)
ABCi P
Co SG1G2
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
0000
1000
0100
1100
0101
1101
1001
0001
0111
1111
1011
0011
1010
0010
1110
0110
(b)
bit S and the carry-out bit Co . Basicly, the table gives eight additions of three numbers:
0+0+0 = 0
0+0+1 = 1
...
1+1+0 = 2
1+1+1 = 3.
The truth table surely is not reversible:
the number of output bits is not equal to the number of input bits and
various output words appear more than once in the table, the output Co S = 10 e.g.
appearing three times in Table 7a.
In order to implement this calculation in a revesible computer, we have to expand the
table, such that the original table is embedded in a large reversible one: see e.g. Table 7b.
All bits from Table 7a are repeated (in boldface) in Table 7b. The new table has two extra
output columns: G1 and G2. Those bits are called garbage bits. They are not asked for in the
224
Alexis De Vos
A
B
Ci
Co
Figure 14. Full adder with three TOFFOLI gates and one FREDKIN gate.
first place, but are added in order to guarantee that all output words are different. Because
there are now four output bits, there have to be four input bits as well. Therefore, we have
added one additional input column: bit P , called the preset. For the desired application, P
will always be put equal to 0. We note that there is no unique way to embed an irreversible
table in a larger reversible table. The embedding should thus be done carefully, in order
to minimize the resulting reversible hardware cost. Figure 14 gives the cheapest reversible
implementation of Table 7a [30]. It consists of three TOFFOLI gates, one FREDKIN gate,
and two SWAP gates. Its gate cost is 4 (as SWAPS are considered free of cost).
We note that a controlled NOT can be interpreted as a reversible embedding of the
calculation of an irreversible Boolean function. Indeed, assume that we like to calculate
the Boolean function f (A, B, C) of three Boolean variables, as defined by its truth table in
Table 8a. The table is, of course, irreversible. Indeed, it has less output columns than input
colums. Besides, the output row 0 appears not less than five times and the output row 1
appears three times.
Table 8b shows the truth table of the controlled NOT gate with control function
f (A, B, C), with controlling bits A, B, and C, and with controlled bit the extra input D.
We have the following relations between outputs and inputs: P = A, Q = B, R = C, and
S = f (A, B, C) D, in accordance with (1). The output S equals the desired function f ,
if the input D is preset to zero. The extra outputs P , Q, and R are garbage outputs. We
note that the reversible embedding (Table 8b) unfortunately has a total number of columns
which is double the number of columns in the original problem (Table 8a).
Thus, reversible digital circuits have the disadvantage to generate a lot of garbage output, not desired for the application. Because of Landauers principle, we are not allowed
to throw them away. We thus have to take them all the way through the following computational steps. Only two garbage bits in a full adder is already a matter of great concern.
Indeed, such full adder is just a building block in, say, a 32-bit adder. The latter circuit
will itself be a building block for a 32-bit multiplier. Such multiplier is used many times
in e.g. a digital filter. Many filters make up a filter bank; many filter banks make up e.g. a
speech processor. Each time we step from one architectural level to the next, the number of
garbage bits explodes. This proliferation of garbage will cause huge costs because of extra
gates and extra interconnections. Therefore, the design challenge consists of designing, at
each level of abstraction, circuits that generate as little garbage as possible. The clever Cuccaro adder [31] succeeds in avoiding one of the two garbage bits G1 and G2 in Table 7b and
thus is highly recommendable [32]. The trick consists in avoiding to calculate Co and S
simultaneously, in a single circuit. Cuccaro et al. first calculate Co and afterwards compute
S from Co , when the information of Co is not necessary anymore.
Reversible Logic
225
Table 8. Computing the Boolean function f (A, B, C): (a) irreversibly and (b)
reversibly.
ABC
000
001
010
011
100
101
110
111
0
0
0
1
1
0
0
1
(a)
ABCD
P QRS
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
0000
0001
0010
0011
0100
0101
0111
0110
1001
1000
1010
1011
1100
1101
1111
1110
(b)
8.
Experimental Prototypes
We can use either left cosets, or right cosets, or double cosets in the synthesis procedure;
we can choose one subgroup or another. Whatever choices we make, we obtain a procedure
for synthesizing an arbitrary circuit by cascading a small number of standard cells from a
limited library. By appropriate choice of the representatives of the (double) cosets, we can
see to it that all building blocks in the library are member of either of the two following
special subgroups:
the subgroup of controlled NOT gates and
the subgroup of controlled SWAP gates.
Among the controlled NOT gates, we note three special elements:
If f is identically zero, then Pw is always equal to Aw . Then the gate is the identity
gate i.
If f is identically one, then Pw always equals 1 Aw . Then the gate is an inverter or
NOT gate: Pw = Aw .
226
Alexis De Vos
If f (A1, A2, ..., Aw1) equals the (w 1)-bit AND function A1 A2 ...Aw1, then the
gate is a TOFFOLI gate: whenever A1 A2...Aw1 equals 0, then Pw simply equals
Aw ; but whenever A1 A2...Aw1 equals 1, then Pw equals NOT Aw .
For physical implementation, dual logic is very convenient. It means that, within the
hardware, any logic variable X is represented by two physical quantities, the first representing X itself, the other representing NOT X. Thus, e.g. the physical gate realizing logic gate
of Table 2a has four physical inputs: A, NOT A, B, and NOT B, or, in short-hand notation:
A, A, B, and B. It also has four physical outputs: P , P , Q, and Q. Such approach is common in electronics, where it is called dual-line or dual-rail electronics. Also some quantum
computers make use of dual-rail qubits [33]. As a result, half of the input pins are at logic 0
and the other half at logic 1, and analogous for the output pins. In this way, dual electronics
is physically conservative: the number of 1s at the output equals the number of 1s at the
input (i.e. equals w), even if the truth table of the reversible logic gate is not conservative.
As a result, we get the advantages of conservative logic, without having to restrict ourselves
to conservative logic.
Dual-line hardware allows very simple implementation of the inverter. It suffices to
interchange its two physical lines in order to invert a variable. In other words: in order to
hardwire the NOT gate:
output P is simply connected to input A and
output P is simply connected to input A.
Controlled NOTs are implemented as NOT gates which are controlled by switches. A first
example is the controlled NOT gate with a single controlling bit (i.e. the bit A):
P
= A
Q = AB .
These logic relationships are implemented into the physical world as follows:
output P is simply connected to input A,
output P is simply connected to input A,
output Q is connected to input B if A = 0,
but connected to B if A = 1, and
output Q is connected to input B if A = 0,
but connected to B if A = 1.
The last two implementations are shown in Figure 15a. In the figure, the arrow heads
show the position of the switches if the accompanying label is 1. A second example is a
TOFFOLI gate with two controlling bits (i.e. the bit A and the bit B):
P
= A
Q = B
R = AB C .
Its logic relationships are implemented into physical world as follows:
Reversible Logic
227
228
Alexis De Vos
B
_
Q
_
B
Q
C
_
R
_
C
Figure 15. Schematic for (a) a controlled NOT gate (u = 1, v = 1), (b) a controlled NOT
gate (u = 2, v = 1), and (c) a controlled SWAP gate (u = 1, v = 2).
concept leads to the implementation of the controlled SWAP gate, e.g. the FREDKIN gate:
P
= A
Q = AB AC B
R = AB AC C ,
where A is the controlling bit and B and C are the two controlled bits. The set of equations
corresponds to (2), with control function f (A) = A. Figure 15c shows the physical implementation. The reader will easily extrapolate the design philosophy to reversible logic
gates of width w = u+v, where u controlling bits decide, by means of a control function f ,
whether the v controlled bits are either subjected or not to some particular swapping and/or
inverting.
One application [32] (Figure 18) is an 8-bit Cuccaro adder, implemented in 0.35 m
standard c-MOS technology, containing 17 TOFFOLI and 16 FREDKIN gates. It contains
Reversible Logic
229
Figure 16. Microscope photograph (140 m 120 m) of a 2.4-m 4-bit reversible ripple
adder.
Figure 17. Microscope photograph (610 m 290 m) of a 0.8-m 4-bit reversible carrylook-ahead adder.
a total of 392 transistors. The prototype chip was fabricated in 2004. The reader will
observe that full-custom prototyping at a university lab follows Moores law, with a couple
of years delay with respect to industry. Indeed, many commercial chips nowadays use 0.18
or 0.13 m transistors. Some companies have entered the nanoscale era, by introducing
90 nm, 65 nm and even 45 nm products [37] to the market.
Moores law, i.e. the continuing shrinking of the transistor sizes, leads to a continuing
decrease of the energy dissipation per computational step. This heat generation Q is of the
order of magnitude of CVt2 , where Vt is the threshold voltage of the transistors and C is
the total capacitance of the capacitors in the logic gate [38]. We have C of the order of
magnitude of 0 LW
t , where L, W , and t are the length, the width, and the oxide thickness
of the transistors, whereas 0 is the permittivity of vacuum (8.85 1012 F/m) and is the
230
Alexis De Vos
Reversible Logic
231
Table 9. Moores law for dimensions L, W , and t, and for threshold voltage Vt , as well
as for resulting capacitance C and heat dissipation Q.
technology
(m)
L
(m)
2.4
0.8
0.35
2.4
0.8
0.35
W
(m)
t
(nm)
Vt
(V)
2.4
2.0
0.5
42.5
15.5
7.4
0.9
0.75
0.6
C
(fF)
Q
(fJ)
46.8
3.6
0.82
38
2.0
0.30
1 femtojoule
1000
100
Q (attojoule)
10
C V_t ^2
1 attojoule
0.1
0.01
Landauer quantum
0.001
1 zeptojoule
2000
2010
2020
2030
2040
232
Alexis De Vos
resulting output bits. In practice, such procedure leads to a factor of about 10 in power
reduction [38]. The reduction of the power dissipation is even more impressive if standard
c-MOS technology is replaced by SOI (silicon-on-insulator) technology. Indeed, in the latter process, the threshold voltage Vt can be controlled better, such that low-Vt technologies
are possible [43] [44].
9.
Conclusion
We have demonstrated how the symmetric group S2w has various interesting subgroups.
Many (but not all) of them turn out to be Young subgroups. We have shown how cosets and
double cosets are particularly helpful for synthesizing arbitrary reversible circuits. E.g., we
have demonstrated the power of subgroup chains of the form S2w S2w 1 S2w 2 ...
w2
w1
w
S22
S21 for
S3 S2 S1 and the form S2w S22w1 S42w2 ... S24
single coset synthesis. A particularly efficient synthesis is obtained by the double cosets of
w1
w different but conjugate subgroups of the type S22 .
w1
Reversible Logic
233
Acknowledgements
The author wishes to thank his Ph.D. students Bart Desoete, Filip Beunis, and Yvan Van
Rentergem, as well as prof. Leo Storme, for valuable collaborations. He further thanks
the Invomec division of Imec v.z.w. (Leuven, Belgium) and the Eurochip and Europractice
organisations, for processing the chips at Alcatel Microelectronics (Oudenaarde, Belgium),
Austria Mikro Systeme (Unterpremstatten, Austria), and AMI Semiconductor (Oudenaarde,
Belgium).
Fij
= p
Fij
= p,
X
i
F =
6
1
0
0
0
0
5
1
0
1
0
0
5
0
2
1
0
0
6
0
0
1
1
1
4
where e.g. F53 = 2 expresses that in Figure 21a two objects are mapped from the fifth row
{29,30,...,35} to the third row {15,16,...,21}. Note that the qq flow matrix F
contains incomplete information about the permutation a. The complete information on a
is given by the corresponding n n permutation matrix.
Theorem : each permutation a can be decomposed as a = h1 vh2, where both h1 and
h2 only permute objects within rows and where v only permutes objects within columns.
Figure 21a shows the permutation a, as a mapping. Figures 21b, 21c, and 21d show the
corresponding permutations h1 , v, and h2 to be performed subsequently:
The vertical permutation v (Figure 21c) is found as follows: the cycles of a are
projected vertically, yielding one or more vertical cycles.
234
Alexis De Vos
Figure 21. Decomposition of (a) an arbitrary permutation of 35 objects into (b) a first horizontal permutation, (c) a vertical permutation, and (d) a second horizontal permutation.
Reversible Logic
235
F =4
1
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
1
1
0
0
0
0
0
1
0
0
0
0
0
0
0
1
0
0
0
1
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
0
1
0
0
1
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
1
0
It suffices to apply in each of the p columns of the Young tableau one of these p permutations, in order to obtain the desired vertical permutation v. In Figure 21c, we indeed
recognize four empty columns (corresponding to the four identity matrices in the matrix
sum) and three non-empty columns (corresponding to the remaining three matrices in the
matrix sum).
Thus, the theorem says that one permutation of n objects can be decomposed into
a product of q subpermutations, each of p objects, followed by
a product of p subpermutations, each of q objects, and finally
a second product of q subpermutations, each of p objects.
This is depicted in Figure 22. In brief: one big spaghetti is decomposed into 2q + p small
permutations. The theorem can be interpreted in terms of group theory: if we define
N as the group of all permutations of the n objects,
H as the group of all horizontal permutations of these objects, and
V as the group of all vertical permutations,
then we have that
N is isomorphic to the symmetric group Sn ,
H is isomorphic to the Young subgroup Sp Sp ...Sp = Sqp , and
V is isomorphic to the Young subgroup Sq Sq ...Sq = Spq .
Note that the Young subgroups Sqp and Spq are based on two so-called dual partitions of the
number n :
n = p + p + ... + p
(q terms) and
n = q + q + ... + q
(p terms).
Therefore these two subgroups are referred to as dual Young subgroups. The combinatorial
theorem says the following: if the group N is partitioned into double cosets by means of
the subgroup H, then we can choose in each double coset a representative which is member
of V. In how many double cosets the supergroup N is partitioned by the subgroup H is a
very difficult problem. We will call this number X(p, q). Fortunately, knowledge of the
value of X is not important; essential is the fact that (thanks to Birkhoffs theorem) each of
the X double cosets contains (at least) one member of V.
We now consider the special case where n is even. We distinguish two special subcases
[26]:
236
Alexis De Vos
p
planes
q
planes
q
planes
Reversible Logic
Therefore B L N and thus
L=
log(N )
log(B)
237
(7)
Here dxe stands for the ceiling of x, i.e. the smallest integer larger than or equal to x. We
now apply this general result to three different cases:
(1) In a first application, N is the total number of reversible circuits of width w and B
is the number of controlled NOT gates of width w. Thus:
= (2w )!
B = w (22
w1
1) + 1 .
1
),
2 nn+1/2 en (1 +
4n
we obtain that
w
N > 2[wlog(2)]2
and finally conclude that
L > 2w 4 .
w(w 1) 2w2
(2
1) + 1 ,
2
leading to
L > 4w 10 .
This proofs that the synthesis method of Section 6 cannot work with 2w1 controlled SWAP
gates. The reader is kindly invited to verify that this (negative) result is not in conflict with
the theorem of Appendix A for n equal to a multiple of 4 and p = 4 and q = n4 .
(3) If we apply the general result (7) to the decomposition of controlled NOT gates into
TOFFOLI gates, we have
N
= 22
w1
B = 3w1
and thus obtain
L>
2w
.
2 log2(3)w
2w
2
building blocks,
238
Alexis De Vos
References
[1] Markov, I. An introduction to reversible circuits. Proceedings of the 12 th International Workshop on Logic and Synthesis , Laguna Beach (May 2003), pp. 318 - 319.
[2] Frank, M. Introduction to reversible computing: motivation, progress, and challenges.
Proceedings of the 2005 Computing Frontiers Conference , Ischia (May 2005), pp.
385 - 390.
[3] De Vos, A. Lossless computing. Proceedings of the I.E.E.E. Workshop on Signal Processing, Poznan (October 2003), pp. 7 - 14.
[4] Hayes, B. Reverse engineering. American Scientist 94, 107 - 111 (MarchApril 2006).
[5] Feynman, R. Quantum mechanical computers. Optics News 11, 11 - 20 (1985).
[6] Landauer, R. Irreversibility and heat generation in the computational process. I.B.M.
Journal of Research and Development 5, 183 - 191 (1961).
[7] Keyes, R. and Landauer, R. Minimal energy dissipation in logic. I.B.M. Journal of
Research and Development 14, 153 - 157 (1970).
[8] Bennett, C. Logical reversibility of computation. I.B.M. Journal of Research and Development 17, 525 - 532 (1973).
[9] Bennett, C. and Landauer, R. The fundamental physical limits of computation. Scientific American 253, 38 - 46 (July 1985).
[10] Scott, W. Group theory. New York: Dover Publications (1964).
[11] Hall, P. The theory of groups. Providence: AMS Chelsea Publishing (1968).
[12] Fredkin, E. and Toffoli, T. Conservative logic. International Journal of Theoretical
Physics 21, 219 - 253 (1982).
[13] Patel, K., Markov, I. and Hayes, J. Optimal synthesis of linear reversible circuits.
Proceedings of the 13 th International Workshop on Logic and Synthesis , Temecula
(June 2004), pp. 470 - 477.
[14] Wang, L. and Almaini, A. Optimisation of ReedMuller PLA implementations. I.E.E.
Proceedings Circuits, Devices and Systems 149, 119 - 128 (2002).
[15] Kerntopf, P. On universality of binary reversible logic gates. Proceedings of the 5 th
Workshop on Boolean Problems , Freiberg (September 2002), pp. 47 - 52.
[16] De Vos, A. and Storme, L. r-Universal reversible logic gates. Journal of Physics A:
Mathematical and General 37, 5815 - 5824 (2004).
[17] De Vos, A., Raa, B. and Storme, L. Generating the group of reversible logic gates.
Journal of Physics A: Mathematical and General 35, 7063 - 7078 (2002).
Reversible Logic
239
[18] Maslov, D. and Dueck, G. Reversible cascades with minimal garbage. I.E.E.E. Transactions on Computer-Aided Design of Integrated Circuits and Systems 23, 1497 - 1509
(2004).
[19] Van Rentergem, Y., De Vos, A. and De Keyser, K. Using group theory in reversible
computing. Proceedings of the I.E.E.E. World Congress on Computational Intelligence, Vancouver (July 2006), pp. 8566 - 8573.
[20] Van Rentergem, Y., De Vos, A. and De Keyser, K. Six synthesis methods for reversible
logic. Open Systems & Information Dynamics 14, 91 - 116 (2007).
[21] Kerber, A. Representations of permutation groups I. Lecture Notes in Mathematics
240, Berlin: Springer Verlag (1970), pp. 17 - 23.
[22] James, G. and Kerber, A. The representation theory of the symmetric group. Encyclopedia of Mathematics and its Applications 16, 15 - 33 (1981).
[23] Jones, A. A combinatorial approach to the double cosets of the symmetric group with
respect to Young subgroups. European Journal of Combinatorics 17, 647 - 655 (1996).
[24] Van Rentergem, Y., De Vos, A. and Storme, L. Implementing an arbitrary reversible
logic gate. Journal of Physics A: Mathematical and General 38, 3555 - 3577 (2005).
[25] Van Rentergem, Y. and De Vos, A. Synthesis and optimization of reversible circuits.
Proceedings of the ReedMuller 2007 Workshop , Oslo (May 2007), pp. 67 - 75.
[26] De Vos, A. and Van Rentergem, Y. Young subgroups for reversible computers. Advances in Mathematics of Communications . 2, 183 - 200 (2008).
[27] De Vos, A. and Van Rentergem, Y. Networks for reversible logic. Proceedings of the
8 th International Workshop on Boolean Problems , Freiberg (September 2008).
[28] Gaidukov, A. Algorithm to derive minimum ESOP for 6-variable function. Proceedings of the 5 th International Workshop on Boolean Problems , Freiberg (September
2002), pp. 141 - 148.
[29] Pogosyan, G., Rosenberg, I. and Takada, S. Building minimum ESOPs through redundancy elimination. Proceedings of the 6 th International Workshop on Boolean
Problems, Freiberg (September 2004), pp. 201 - 206.
[30] Van Rentergem, Y. and De Vos, A. Optimal design of a reversible full adder. International Journal of Unconventional Computing 1, 339 - 355 (2005).
[31] Cuccaro, S., Draper, T., Kutin, S. and Moulton, D. A new quantum ripple-carry addition circuit. Proceedings of the 8 th Workshop on Quantum Information Processing ,
Cambridge (June 2005), arXiv:quant-ph/0410184.v1.
[32] Skoneczny, M., Van Rentergem, Y. and De Vos, A. Reversible Fourier transform chip.
Proceedings of the 15 th International Conference on Mixed Design of Integrated
Circuits and Systems, Poznan (June 2008).
240
Alexis De Vos
[33] Chuang, I. and Yamamoto, Y. The dual-rail quantum bit and quantum error correction.
Proceedings of the 4 th Workshop on Physics and Computation , Boston (November
1996), pp. 82 - 91.
[34] Singh M., Giacomotto C., Zeydel B. and Oklobdzija V. Logic style comparison for
ultra low power operation in 65 nm technology. Proceedings of the 17 th International
PATMOS Workshop, Goteborg (September 2007), pp. 181 - 190.
[35] Desoete, B., De Vos, A., Sibinski, M. and Widerski, T. Feynmans reversible logic
gates, implemented in silicon. Proceedings of the 6 th International Conference on
Mixed Design of Integrated Circuits and Systems , Krakow (June 1999), pp. 497 - 502.
[36] Desoete, B. and De Vos, A. A reversible carry-look-ahead adder using control gates.
Integration, the V.L.S.I. Journal 33, 89 - 104 (2002).
[37] Bohr, M., Chau, R., Ghani, T. and Mistry, K. The high-k solution. I.E.E.E. Spectrum
44, 23 - 29 (October 2007).
[38] De Vos, A. and Van Rentergem, Y. Energy dissipation in reversible logic addressed by
a ramp voltage. Proceedings of the 15 th International PATMOS Workshop , Leuven
(September 2005), pp. 207 - 216.
[39] Zeitzoff, P. and Chung, J. A perspective from the 2003 ITRS. I.E.E.E. Circuits &
Systems Magazine 21, 4 - 15 (2005).
[40] Patra, P. and Fussell, D. On efficient adiabatic design of MOS circuits. Proceedings of
the 4 th Workshop on Physics and Computation , Boston (November 1996), pp. 260 269.
[41] Alioto, M. and Palumbo, G. Analysis and comparison on full adder block in submicron
technology. I.E.E.E. Transactions on Very Large Scale Integration Systems 10, 806 823 (2002).
[42] Van Rentergem, Y. and De Vos, A. Reversible full adders applying Fredkin gates.
Proceedings of the 12 th International Conference on Mixed Design of Integrated
Circuits and Systems, Krakow (June 2005), pp. 179 - 184.
[43] Belleville, M. and Faynot, O. Low-power SOI design. Proceedings of the 11 th International PATMOS Workshop , Yverdon (September 2001), pp. 8.1.1 - 8.1.10.
[44] Nagaya, M. Fully-depleted type SOI device enabling an ultra low-power solar radio
wristwatch. O.K.I. Technical Review 70, 48 - 51 (2003).
[45] Yong, A. What is ... a Young tableau? Notices of the A.M.S. 54, 240 - 241 (2007).
[46] Clos, C. A study of non-blocking switching networks. Bell Systems Technical Journal
32, 406 - 424 (1953).
[47] Hwang, F. Control algorithms for rearrangeable Clos networks. I.E.E.E. Transactions
on Communications 31, 952 - 954 (1983).
Reversible Logic
241
[48] Hui, J. Switching and traffic theory for integrated broadband networks . Boston:
Kluwer Academic Publishers (1990), pp. 53 - 138.
[49] Chao, J., Jing, Z. and Liew, S. Matching algorithms for three-stage bufferless Clos
network switches. I.E.E.E. Communications Magazine 41, 46 - 54 (2003).
[50] Jajszczyk, A. Nonblocking, repackable, and rearrangeable Clos networks: fifty years
of the theory evolution. I.E.E.E. Communications Magazine 41, 28 - 33 (2003).
[51] Bhatia, R. Matrix analysis. New York: Springer (1997), pp. 28 - 56.
[52] Borgersen, R. Equivalence of seven major theorems in combinatorics. http://
home.cc.umanitoba.ca/umborger/Presentations/GS-05R-1.pdf (2004).
[53] de Werra, D. Path coloring in bipartite graphs. European Journal of Operational Research 164, 575 - 584 (2005).
[54] Comtet, L. Advanced combinatorics. Dordrecht: Reidel Publishing Company (1974),
pp. 124 - 125.
[55] Even, S., Kohavi, I. and Paz, A. On minimal modulo 2 sums of products for switching
functions. I.E.E.E. Transactions on Electronic Computers 16, 671 - 674 (1967).
[56] Courant, R. Differential and integral calculus . London: Blackie & Son Limited
(1970), p. 361.
Chapter 9
ABSTRACT
Schrdinger equation with imaginary PT symmetric potential V (x) = i x3 is studied using the
numerical discretization methods in both the coordinate and momentum representations. In the
former case our results conrm that the model generates an infinite number of bound states with
real energies. In the latter case the differential equation is of the third order and a square-well,
solvable approximation of kinetic energy is recommended and discussed. One finds that in the
strong-coupling limit, the exact PT symmetric solutions converge to their Hermitian predecessors.
PACS 03.65.Ge
ACKNOWLEDGEMENTS
Work supported by the GACR grant Nr. 202/07/1307, by the MSMT \Doppler Institute"
project Nr. LC06002 and by the Institutional Research Plan AV0Z10480505.
e-mail: znojil@ujf.cas.cz
244
Miloslav Znojil
Introduction
An interest in imaginary cubic anharmonic oscillators dates back to their perturbation analysis by Caliceti et al [1]. The simplified homework example with the mere
two-term non-Hermitian Hamiltonian
HBZ = p2 + i x3
has been proposed by D. Bessis and J. Zinn-Justin who had in mind its possible
applicability in the context of statistical physics [2]. The example has been revitalized by C. Bender et al due to its possible methodical relevance in relativistic
quantum field theory [3]. They emphasized that the apparent reality of the spectrum
of energies EBZ is quite puzzling.
The conjecture of a full compatibility of similar Hamiltonians with the postulates
of quantum mechanics [4] opened many new and interesting questions. The current
Hermiticity of Hamiltonians was replaced by a weaker condition of their commutativity with a product PT of the spatial parity P and of the complex conjugation T .
The latter factor is to be understood as a one-dimensional version of the operator of
time reversal.
The discussion between C. Bender and A. Mezincescu [5] pointed out that one
of the key problems of the new studies lies in the ambiguity of the spectrum which
depends quite crucially on our choice of the boundary conditions which can be, in
general, complexified [6]. The fragile character of the reality of the energies has been
confirmed by the WKB and perturbative studies [7, 8] and by the quasi-exact and
exact models [9] where the admissible unavoided level crossings [10] prove sometimes
followed by the spontaneous breakdown of PT symmetry [11].
In such a context we propose here an extremely elementary approach to similar
models replacing interactions which admit just a numerical treatment (typically,
V (x) = ix3 ) by their exactly solvable square-well analogues.
In a search for analogies between the solvable and unsolvable models in one dimension, all of the possible forms of a confining well are often being approximated by
the ordinary real and symmetric square well
(
(SQW )
(x) =
S 2 , x (, ) (, ),
0, x (, ).
(1)
In this spirit one can also replace the antisymmetric and imaginary homework potential VBZ (x) = i x3 by its elementary square-well analogue
i T , x (, ),
x (, ),
V (ISQW ) (x) = 0,
+i T 2 , x (, ).
245
h
d
(2)
(3)
x (0) = i G.
(4)
Putting h
= 2m = 1 and using the ansatz
(
(x) =
cos k x + B sin k x,
x (0, ),
k 2 = E,
(L + i N ) exp( x), x (, ), 2 = i T 2 k 2 ,
(5)
we shall guarantee the full compatibility of such a convention with the symmetry
requirements (4) by the choice of the purely imaginary constant B = i G/k in wave
functions (5).
Matching conditions at x =
Let us split = p + i q in its real and imaginary part with a fixed sign, p, q 0. This
gives p2 + k 2 = q 2 and 2pq = T 2 . These rules are easily re-parameterized in terms of
a single variable ,
p = q cos ,
k = q sin ,
q=
T
,
2 cos
(0, /2).
(6)
(7)
The real part defines our first unknown parameter, G = G(). Due to our normalization conventions, the imaginary part of the right-hand-side expression must vanish,
Re[tan(k +)] = 0. An elementary re-arrangement of such an equation acquires the
form of an elementary quadratic algebraic equation for X = tan k. Its two explicit
solutions read
pq
p+q
X2 =
X1 =
,
(8)
k
k
3
246
Miloslav Znojil
"
(+)
T sin (+)
,
tan
= tan
2
2 cos (+)
"
(9)
"
T sin ()
()
tan
.
(10)
= tan
2
2 cos ()
In implicit manner these equations specify the two respective infinite series of appropriately bounded real roots = n() (0, /2).
Energies
For (0, /2) the left-hand-side arguments [. . .] in eqs. (9) and (10) run from zero
to infinity. Their tangens functions oscillate infinitely many times from minus infinity
to plus infinity. Within the same interval, the limited variation of the argument
makes both the eligible right-hand side functions monotonic, very smooth and
bounded, tan[( (+) )/2] (1, ) and tan[() /2] (0, 1). A priori this indicates
that our roots k = k(n() ) will all lie within well determined intervals,
kn(+)
1
1
,
n + ,n +
4
2
n = 0, 1, . . . ,
3
m + ,m + 1
m = 0, 1, . . . .
4
After such an approximate localization of the roots, an unexpected additional merit
of our parametrization (6) manifests itself in an unambiguous removal of the tangens
operators from both eqs. (9) and (10). This gives the following two relations,
()
km
kn(+) = n +
1 n(+)
,
2
4
()
km
=m+1
()
m
,
4
n() =
2n()
(0, 1).
After an elementary change of notation with n(+) = 2n and n() = 2n+1 , we may
finally combine the latter two rules in the single secular equation
sin
N
2
2N + 2 N
=
4T
2 cos
N
2
N = 0, 1, . . . ,
(11)
247
2k
6
0.1
0.2
0.3
0.4
0.5
Equation (7) in combination with eqs. (9) and (10) determines the real parameter
G = G() =
k2
qp
(12)
responsible for the behavior of the wave functions near the origin [remember that
B = iG/k in eq. (5)]. For its analysis let us introduce an auxiliary linear function
of and N ,
q
2N + 2 N
R(N , N ) =
4T
N + 1/2 N + 1
,
2T
2T
Our secular eq. (11) can be then read as an algebraic quadratic equation with the
unique positive solution,
cos
N
2
R(N , N ) +
R2 (N , N ) + 1
(13)
N = arcsin
+ ...
2
2
2R 48 R3
R+ R +1
5
248
Miloslav Znojil
represents a quickly convergent iterative algorithm for the efficient numerical evaluation of the roots N . One can conclude that in a way compatible with our a
priori expectations, the value of p = pN = Re q/2R lies very close to zero. As a
consequence, the asymptotic decrease of our wave functions remains slow. We have
q = qN = Im k so that, asymptotically, our wave functions very much resemble
free waves exp(ikx). In the light of eq. (12) we have (x) exp(ikx) near the
origin.
For the models with a very small R (i.e., for the low-lying excitations in a deep well
with T 1) we get an alternative estimate
N = arcsin
4
i
1h
1
1
R
1 + R2 1 R R2 + . . . .
2
2
4
4
In the limit R 0 the present spectrum of energies moves towards (and precisely
coincides with) the well known levels of the infinitely deep Hermitian square well
of the same width I = (, ) (cf. eq. (1) with S ). The complex-rotation
transition from the Hermitian well V (SQW ) (x) of eq. (1) (with S 1) to its present
non-Hermitian PT symmetric alternative V (ISQW ) (x) of eq. (2) (with T 1) proves
amazingly smooth.
Wave functions exhibit a similar tendency. In outer region, they are proportional
to exp(px) and decay very quickly since p = O(R1/2 ). Parameter G() becomes
strongly superscript-dependent,
G(+) =
k2
= O(R3/2 ),
q+p
G() = (q + p) = O(R1/2 ).
In the interior domain of x (, ) the wave functions with superscripts (+) and
()
become dominated by their spatially even and odd components cos kx and sin kx,
respectively. The superscript mimics (or at least keeps the trace of) the quantum
number of the slightly broken spatial parity P.
We can summarize that our present PT symmetric model is quite robust. Independently of the coupling T the spectrum is unbounded from above and remains
constrained by inequalities
(N + 1)2
(N + 1/2)2
EN
.
(14)
4
4
The analogy between our exactly solvable square-well model and the standard or
paradigmatic PT symmetric Hamiltonian HBZ appears closer than expected.
249
n = 0, 1, . . .
(15)
supports a highly plausible conjecture that the spectrum of energies is real, discrete and bounded below. The conjectured absence of its imaginary components is
indicated by the Hilbert-Schmidt analysis [5] and by the perturbation calculations
in both the weak-coupling regime [13] or in its strong-coupling, purely numerically
generated re-arrangement [12].
Certainly, the problem deserves a change of the traditional perspective. Let us,
therefore, move now to its momentum representation. This would give the momentum as a mere number, p (, ) while the coordinate x becomes represented by
the differential operator x = i p . Equation (15) then acquires a new form containing
the purely real differential Schrodinger operator H (CO) E of third order,
"
d3
+ p2 (p) = E (p) ,
dp3
(p) L2 (IR).
This gives an unusual formulation of our bound-state problem where the quadratic
pdependence of the kinetic term T (p) = p2 does not seem to make the equation
any easier to solve. For this reason we shall drastically simplify the kinetic term and
deduce some consequences.
In a way proposed by Pr
ufer [14] many wave functions can be visualized as certain
deformations of solutions which correspond to a locally constant potential, (x)
c1 sin[%(x)] + c2 cos[%(x)]. In the standard quantum mechanics such a trick found
immediate applications in numerical computations [15] while it still admits an easy
interpretation via some traditional Sturm Liouvillean oscillation theorems [16, 17].
Using this idea as a methodical guide let us now replace the kinetic energy operator
T (p) = p2 by the most elementary square well of a finite depth Z > 0,
T (p) =
Z,
p (, 1),
p (1, 1),
p (1, ).
0,
Z,
In the bounded range of energies E < Z this splits our toy model in the two separate
differential equations,
"
d3
8 3 (p) = 0,
3
dp
p (1, 1),
250
Miloslav Znojil
"
d3
+ 8 3 (p) = 0,
dp3
p (, 1)
(1, ).
The two auxiliary parameters = (E) > 0 and = (E) > 0 are defined in
such a way that Z = E + 8 3 > E = 8 3 . They appear in the three independent
(exponential) solutions of our equation. Their general superpositions are complex
but they may be given the real, trigonometric form. Near the origin we have
0 (p) = d e2 p + f e p cos(
p + ),
p (1, 1),
= 3
where the symbols d, f and stand for the three undetermined constant parameters.
In the right and left asymptotic regions we obtain the similar formulae. After we
omit their exponentially growing and normalization-violating unphysical components
we get the one-parametric family
+ (p) = g e2 p ,
p (1, ).
p (, 1),
3 .
(16)
The weighted sum of these equations re-scales and interrelates the unknown coefficients d and g in terms of a new energy parameter t = t(E) = (E)/(E) > 0 or
rather R = R(E) = (1 t + t2 )1/2 > 0,
d e2 D(E) =
G(E)
,
3 R2 (E)
G(E) g e2 .
After we eliminate G from the last two equations (16) which are linear in d and f
we obtain the elementary formula which defines the shift = (E),
3
.
tan(
+ ) =
2/t 1
The trigonometric factors become fixed up to their common sign = 1,
3
t(E) R(E).
cos(
+ ) = [1 t(E)/2] R(E),
sin(
+ ) =
2
The same sign enters our last decoupled definition
f e F (E) =
2[t(E) + 1] G(E)
.
3 R(E)
8
251
3 sin(
L2 = 2d e
f e [cos(
+ ) +
+ )],
L3 = 42 d e2 22 f e [cos(
+ ) 3 sin(
+ )]
they read
L1 (, d, f, ) = c e cos(+ ),
L2 (, d, f, ) = c e [cos( + )
3 sin( + ),
L3 (, d, f, ) = 2 2 c e [cos( + ) + 3 sin( + ).
They determine the values of c = c(E) and = (E). Their properly weighted sum
gives
1 t + t2
3 F (E) sin(
+ ) + (2t 1) F (E) cos(
+ ) + 2
D(E) e6 = 0 .
t+1
(1 4 t + t ) cos(2 3) +
3 (1 t ) sin(2 3) =
1 t + t2 3
e
1+t
10
y 5
0.01
0.02
0.03
0.04
0.05
-5
-10
!2
(17)
252
Miloslav Znojil
It is quite instructive to search for the physical energies numerically. Starting from
the very-shallow-well extreme in eq. (17) we find the two clearly distinguished energy
roots. The qualitative features of the graph of secular determinant remain unchanged
in a broad interval of the inverse strengths 1/Z. Its shape is sampled in Figure 2 at
Z = 103 . We have tested that even the approximate height 5 of its left plateau
stays virtually unchanged between Z = 105 and Z = 103 . Within the same interval
of the shallowest wells the left zero grows from the value 0.00280 till 0.0241. Beyond
the broad, downwards-oriented peak one finds the second, right zero moving from
the value 0.01047 (found very close to the instantaneous threshold 0.01077) up the
value 0.1056 (not very far from its threshold 0.1077, either) within the same interval
of 1/Z.
0.0004
y
0.0002
0
0.6235
0.624
0.6245
0.625
0.6255
-0.0002
-0.0004
10
253
Table 1.
Number of levels N and its changes with growing Z.
N
3
1
4
1
5
1
6
2
7
1
9
2
10
1
Beyond Z = 5, our attention has to return quickly to the left half of the picture
where the very slow growth of the local maximum creates a new quality at last. The
top of the local bump touches and crosses the horizontal axis at Z 5.3003 and
E 0.6244. At Z = 5.3005 a new doublet of energies is formed in a way illustrated
in Figure 3. The number of levels jumps to N = 5.
1.2
1.3
1.4
1.5
1.6
-1
-2
y
-3
-4
-5
Figure 4: The local maximum not giving the doublet of roots at Z = 35.
A smooth deformation of the graph takes place when the value of Z grows on.
During this evolution we discover that our (originally broad), downward-oriented
peak shrinks quite quickly and moves comparatively slowly to the right. It gets close
to the rightmost and, to its bad luck, slightly more slowly moving zero number five.
The magnified picture of the resulting collision is displayed here in Figure 4. At
Z = 35 it shows that in the threshold region of the energies,
the wavy motion of the threshold end of our graph still did not manage to
reach the zero axis;
the downwards-oriented peak has already left the positive part (and moved to
the negative part) of the curve in question.
As a consequence, the number of levels drops, quite unexpectedly, down to 3 again
(cf. Table 1).
11
254
Miloslav Znojil
10
y 5
0.5
1.5
2.5
-5
-10
y0.5
2.26
2.28
2.3
2.32
2.34
-0.5
-1
12
255
10
10
y 5
-5
-10
Figure 7: Numerical invisibility of the narrow peak and of the new threshold root at
Z = 1200.
Methodical consequences of our analysis are a bit discouraging. Firstly, the very
symbolic-manipulation derivation of our present formulae proved unexpectedly complicated even in comparison with the multiple standard square wells in textbooks.
Thats why we did not move to any further piece-wise constant approximations
of T (p).
Secondly, even our use of the most elementary solvable example revealed quite
clearly a very real danger of the possible loss of certain levels. For an illustration
let us imagine that our numerical study would have been started in the deep-well
domain, i.e., at the large Z. It is quite easy to generate the graphs of eq. (17) there.
13
256
Miloslav Znojil
In the standard and routine finite-precision computer arithmetics one discovers that
the results are very smooth and look virtually the same, say, in the interval of
Z (1000, 1200).
Let us pick up, for definiteness, the larger sample Z = 1200. We get a picture
(cf. our last Figure 7) which is regular and, deceptively, indicates that N (1200) = 7.
Unfortunately, the correct answer (appearing at the right end of our Table 1) is
N (1200) = 10. Its derivation requires the use of a significantly enhanced precision.
Otherwise, whenever we use just the standard 14 digits and Figure 7, we would have
missed as much as three (i.e., cca 30 % of all) energy levels.
In the light of our preceding considerations, an easy explanation of the latter
numerical paradox lies in the presence of the narrow peak. A priori, it is hardly
predictable of course. It is necessary to spot it by brute force. One finds that at
Z = 1000, this anomalous peak still lives safely below the sixth energy level. The
related number of levels is reliably confirmed as equal to seven, indeed.
In between Z = 1000 and Z = 1200, it is necessary to work in an enhanced
precision arithmetics. One finds that the upper, threshold end of the curve crosses
the horizontal axis only slightly above Z = 1100. Due to the very steep slope of the
curve in this region, this crossing is not visible even at z = 1200 in Figure 7.
One has to trace the narrow peak carefully. It overtakes the sixth energy level
at Z 1190 (and E = 4.217), in an arrangement resembling our Figure 5 above.
Thus, one concludes, finally, that the new, almost degenerate pair of the energy levels
emerges immediately beyond this point.
11
A marginal merit of our use of the square-well-shaped T (p) lies in the availability
of the explicit wave functions. For the lack of space we have to omit illustrative
pictures, mentioning just a few of their most characteristic features.
In the first step we notice that in the rightmost interval of p the absence of any
nodal zero in the wave function is in fact very similar to the usual Sturm Liouville
behavior. Less expectedly, at the exact energy value one encounters an infinity of
the nodal zeros in the leftmost subinterval of p (, 1). In this domain we are
fortunate in studying the exactly solvable case. The very presence of this infinite
left set of nodal zeros is extremely sensitive to the numerical level of precision we
use. Indeed, the errors are proportional to the unphysical (unphys.) (p) exp(2 p)
which is growing rapidly at p 1.
After the smallest deviation of the energy E from its absolutely precise boundstate value even the non-numerical and absolutely precise wave functions will be
dominated by the growing asymptotics (unphys.) (p) exp(2 p) near the left infinity. The change of sign of the asymptotics is a reliable source of information about
the fact that the energy crossed it physical value. This observation survives in the
shooting numerical algorithms [18] as well as in the rigorously proved versions of the
method of Hill determinants [19]). In this context our present numerical experiments
could be perceived as opening a number of new questions. Some of them emerge in
14
257
12
Outlook
In the xrepresentation of our problem our main emphasis has been put on the
exact solvability of its replacement by the purely imaginary square well model. New
light has been thrown on some properties of wave functions. One can expect that the
further detailed study of the PT symmetric square wells will give new answers to the
puzzles concerning the irregular behavior of the nodal zeros in the complex plane as
formulated in ref. [20]. Our present study indicates that some complexified versions
of the Sturm Liouville oscillation theorems should be developed for the study of zeros
of the separate real and imaginary parts of PT symmetric wave functions.
After the standard Fourier-transformation transition to the prepresentation of
our imaginary cubic oscillator the underlying eigenvalue problem can be seen from a
different perspective. Its Hamiltonian is being replaced by a real differential expression. On a suitable Hilbert space this specifies the Hamiltonian operator with the
numerical range (and, hence, spectrum) which is, obviously, real. This complements
the extensive discussion of this topic in [5]. Among several immediate constructive
consequences of the latter observation we underlined the consistency of the approximations imposed directly upon the kinetic term T (p).
As long as the behavior of wave-function asymptotics at large |p| 1 differs in
the left and right infinity, several new qualitative aspects of the problem emerge and
became clarified by our schematic piece-wise constant approximation of T (p). At
small p 0 the emergence and motion of the nodal zeros can be interpreted in a
graphical manner explaining some features of the N (Z) dependence. In particular,
the puzzling loss of its monotonicity seems confirmed by our solvable model.
The use of the momentum representation proved able to throw a new light on
the counterintuitive bound states in PT symmetric quantum mechanics. The emergence/disappearance of our quasi-degenerate doublets should be emphasized as, perhaps, analogous to the unavoided level crossings in harmonic oscillators [10] and/or
to the anomalous doubling of levels in the models of Natanzon type [21]. Similar
irregularities in the spectra could be, perhaps, attributed to a peculiar combination
of the analyticity and non-Hermiticity in PT symmetric systems.
In a brief summary of our numerical observations let us point out the regularity
of the Zdependence of the number N (Z) of the bound states. This indicates that
one should search for an improved application of Sturm-Liouville theory in complex
domain [22]. The possibility of deduction of new oscillation-type theorems exists,
first of all, in the middle interval of p (1, 1) where, for a continuously growing
energy parameter E, a steady right-ward movement of the nodal zeros competes with
the exponential terms which are varying slowly.
15
258
Miloslav Znojil
References
[1] Caliceti E, Graffi S and Maioli M 1980 Commun. Math. Phys. 75 51
[2] D. Bessis 1992 private communication
[3] Bender C M and Milton K A 1997 Phys. Rev. D 55 R3255 and 1998 Phys. Rev.
D 57 3595 and 1999 J. Phys. A: Math. Gen. 32 L87
[4] Bender C M and Boettcher S 1998 Phys. Rev. Lett. 80 5243;
Bender C M, Boettcher S and Meisinger P N 1999 J. Math. Phys. 40 2201;
Znojil M and Tater M 2001 J. Phys. A: Math. Gen. 34 1793
[5] Mezincescu G A 2000 J. Phys. A: Math. Gen. 33 4911;
Bender C M and Wang Q 2001 J. Phys. A: Math. Gen. 34 3325;
Mezincescu G A 2001 J. Phys. A: Math. Gen. 34 3329
[6] Bender C M and Turbiner A 1993 Phys. Lett. A 173 442;
Buslaev V and Grecchi V 1993 J. Phys. A: Math. Gen. 26 5541;
Fernandez F, Guardiola R, Ros J and Znojil M 1999 J. Phys. A: Math. Gen. 32
3105
[7] Alvarez G 1995 J. Phys. A: Math. Gen. 27 4589
[8] Delabaere F and Pham F 1998 Phys. Lett. A 250 25;
Delabaere F and Trinh D T 2000 J. Phys. A: Math. Gen. 33 8771
[9] Bender C M and Boettcher S 1998 J. Phys. A: Math. Gen. 31 L273;
Cannata F, Junker G and Trost J 1998 Phys. Lett. A 246 219;
Bagchi B, Cannata F and Quesne C 2000 Phys. Lett. A 269 79
Znojil M 2000 J. Phys. A: Math. Gen. 33 L61 and 4203 and 4561 and 6825;
Levai G and Znojil M 2000 J. Phys. A: Math. Gen. 33 7165
[10] Znojil M 1999 Phys. Lett. A. 259 220 and 264 108
[11] Khare A and Mandel B P 2000 Phys. Lett. A 272 53;
Bender C M, Berry M, Meisinger P N, Savage V M and Simsek M 2001 J. Phys.
A: Math. Gen. 34 L31
[12] Fernandez F, Guardiola R, Ros J and Znojil M 1998 J. Phys. A: Math. Gen. 31
10105
[13] Bender C M and Weniger E J 2001 J. Math. Phys. 42 2167
[14] Pr
ufer H 1926 Math. Ann. 95 499
16
259
17
INDEX
A
academic, 232
accounting, 197
accuracy, 13
achievement, 181, 192, 193, 194, 200
ACM, 198, 199, 200
adaptation, 13, 17
adiabatic, 231, 240
adult, 11, 13, 17
adulthood, 13
adults, 12, 13, 53
Ag, 97, 98, 100, 102, 105
agent, 162
aggregation, 68, 70, 71, 72, 76, 82, 85, 194
agricultural, 161, 162
aid, 11, 18, 52, 169
air, 256
algorithm, 168, 191, 199, 200, 217, 218, 220,
234, 248
alienation, 15
alternative, 6, 36, 69, 74, 75, 78, 79, 82, 83, 183,
248
alternatives, viii, 67, 68, 69, 74, 75, 76, 77, 82, 83
ambiguity, 21, 131, 244
amplitude, 23, 138, 143, 144
AMS, 52, 55, 238
angular momentum, 93, 94, 110
animal cognition, 11
animals, 11, 15, 17, 18, 34
anomalous, 256, 257
anthropic principle, 14
antithesis, 23, 40
appendix, 236
application, 10, 23, 28, 38, 58, 82, 84, 89, 96,
115, 136, 138, 139, 148, 164, 173, 185, 205,
210, 216, 218, 224, 228, 237, 257
archetype, 3, 5, 24, 25, 26, 27, 31, 34, 35, 37, 38,
39, 41, 42, 46, 47, 48, 49, 50, 52
argument, 9, 10, 33, 38, 176, 246
Aristotelian, 53
Aristotle, 3, 4
arithmetic, 11, 12, 17, 20, 26, 97
Asia, 201
aspiration, 192
assumptions, 5, 6, 21, 28, 29, 69, 195
asymptotic, 248, 250
asymptotically, 248
asymptotics, 256, 257
Athens, 1, 4
Atiyah, 49, 52
ATM, 199
atom, 93
atoms, 18, 30, 38, 47, 88, 95, 110, 167
Austria, 233
autonomy, 27
availability, viii, 67, 180, 256
B
Balanced Scorecard, viii, 67, 68, 77, 83, 84
bandwidth, ix, 179, 180, 181, 182, 183, 184, 185,
186, 187, 188, 189, 190, 191, 192, 193, 195,
196, 198, 199
bandwidth allocation, 180, 185, 187, 190, 191,
192, 193, 195, 196, 199
banks, 224
barrier, 250
base pair, 167, 168
behavior, 24, 26, 184, 247, 256, 257
Belgium, 203, 233
bell, 152
benzene, 94, 95
binomial distribution, 97
bipolar, 25
birth, 11, 40
262
Index
C
calculus, 33, 68, 83, 197, 241
capacitance, 229, 231
carrier, 46
category a, 41, 43, 44, 47
cation, 181, 187, 190, 195
cerebral hemisphere, 16
chaos, 27, 34, 40, 41
chemical structures, 167
children, 12, 13, 16, 17, 53
chiral, 97
chirality, 97
classes, ix, 6, 89, 94, 95, 107, 115, 130, 137, 146,
147, 151, 153, 154, 159, 165, 180, 182, 186,
187, 188, 190, 195, 212
classical, vii, ix, 7, 10, 12, 22, 23, 39, 45, 51, 58,
88, 179, 182, 183, 190, 191, 197, 203, 204,
205, 249
classification, viii, 12, 87, 89, 129
closure, 121, 122, 126
codes, 33
coding, 33
cognition, 11, 13
cognitive development, 11, 13
cognitive domains, 12
cognitive science, 11
coil, 217, 218, 219
coke, 61, 64
coke formation, 61, 64
collective unconscious, 3
Index
correlations, 63, 105, 110
costs, 62, 63, 183, 186, 224
counterbalance, vii, 1
coupling, x, 88, 107, 110, 243, 247, 248, 249, 252
cross-fertilization, 36
culture, 13, 14, 16, 18, 53, 54
customers, 191, 197
Cybernetics, 18, 84, 85
cycles, 73, 74, 96, 135, 140, 142, 143, 144, 233,
234
Czech Republic, 243
D
danger, 10, 255
data communication, ix, 179, 181, 183, 184
database, 182, 188, 190
death, 29, 37
decay, 248
decision making, viii, 58, 59, 67, 68, 69, 74, 84,
85
decisions, 72, 185
decomposition, 64, 140, 142, 143, 144, 217, 218,
219, 220, 222, 234, 236, 237
deduction, 29, 257
definition, 8, 9, 19, 20, 45, 72, 126, 130, 131,
132, 133, 148, 150, 153, 159, 187, 193, 194,
247, 250, 251
deformation, 253
degenerate, 22, 94, 95, 108, 256, 257
degradation, 44
delivery, 184, 185
Department of Energy, 112
derivatives, 245
designers, 185
detection, 254
developed countries, 162
deviation, 256
dichotomy, 14
dielectric constant, 230
differentiation, 34
digit magnitude, 12
digitization, ix, 179
discipline, 25, 51, 185
discontinuity, 245, 250, 251
discordance, 68, 71, 73, 74
discourse, 41, 53, 68
discreteness, 40
discretization, x, 243
distribution, viii, 15, 57, 58, 59, 90, 91, 92, 94,
97, 161, 170, 183, 195, 220
distribution function, viii, 57
division, 130, 150, 151, 233
dominance, 193
263
Doppler, 243
dream, 38
duality, 199
dust, 38
dynamical system, 46, 50
dyscalculia, 12
E
earth, 40
ecological, 161
education, 54
educational psychology, 11
effluent, 62, 64
ego, 40
elasticity, 57
electron, 88, 89, 90, 91, 92, 93, 94
electronic circuits, 227, 230
electronic systems, 89, 93
electrons, ix, 18, 30, 87, 88, 90, 92, 93, 94, 95,
107, 110
email, 182, 184
emotion, 27, 31
emotional, 25, 27, 31
emotions, 27
Empiricism, 9, 49
empowerment, 15
energy, viii, x, 24, 46, 87, 88, 92, 96, 227, 229,
232, 238, 243, 249, 250, 251, 252, 254, 255,
256, 257
energy consumption, 227
enterprise, viii, 16, 67, 68, 77, 83
entropy, 203, 204
environment, 39, 52, 65, 68, 84, 85, 130, 204
epistemological, 39
epistemology, 25
equality, 33, 191
equilibrium, 64, 193
equity, 184
ESR, 96
estimating, 166
estimator, 187
ethane, 61, 63, 64
ethylene, 61
Euclidean space, 35
Europeans, 152
evolution, 4, 12, 16, 17, 18, 31, 37, 40, 241, 253
evolutionary process, 17
expansions, 222
F
factorial, 208
failure, 2, 38, 195
264
Index
G
garbage, ix, 203, 223, 224, 239
gas, 64
Gaussian, 64, 146
generalization, 8, 10, 34, 97, 208, 257
generation, vii, x, 89, 91, 94, 197, 203, 204, 229,
231, 232, 238
generators, 91, 94, 138, 139, 182
genomics, 166
geography, 183
Germany, 53
goals, 57, 65, 68, 180, 181, 186
God, 6, 40
gold, 88
Goodman, 54
government, iv
GPRS, 182
graph, 158, 167, 169, 170, 177, 178, 186, 252,
253, 254, 255
Greece, 1
grouping, 161
groups, 15, 43, 89, 94, 95, 96, 107, 110, 112, 131,
133, 134, 150, 162, 177, 178, 207, 238, 239
growth, 77, 179, 180, 253
GSM, 182
Guaranteed Service, 185
guidance, 73
gyrus, 11, 12
Gyrus, 54
H
H2, 64
hafnium, 230
Hamiltonian, 88, 107, 244, 248, 249, 257
happiness, 16
harm, 3, 4, 178
harmony, 3, 4
Harvard, 54, 84
Hawaii, 201
heat, vii, x, 64, 203, 204, 229, 231, 232, 238
height, 23, 252
Heisenberg, 29
hemisphere, 11
hepatitis, 170
hepatitis C, 170
herbs, 162
heterogeneous, 180
Hilbert, 2, 10, 28, 29, 54, 249, 257
Hilbert space, 257
holistic, vii, 1, 52
homework, 244
homology, 11
homomorphism, 133, 136, 148, 149
host, 12, 185
human, viii, 4, 11, 12, 13, 14, 15, 16, 17, 18, 23,
24, 25, 26, 27, 28, 29, 30, 31, 32, 34, 35, 36,
37, 39, 40, 46, 52, 65, 67, 68, 71, 72, 73
human animal, 13
human brain, 12, 13, 15, 17, 18
human experience, 23
human nature, 52, 68
humanism, 14
humanity, 15, 34, 35
humans, 5, 11, 13, 18, 39, 46
hybrid, 200
hydro, 62
hydrocarbon, 63
hydrocarbons, 62
hydrogen, 62
hypothesis, 11, 26, 27, 122
I
icosahedral, 96, 107
Index
identity, 9, 19, 26, 27, 41, 42, 44, 45, 46, 47, 88,
116, 130, 131, 135, 136, 146, 153, 169, 171,
172, 206, 207, 209, 213, 216, 220, 221, 225,
235, 236
illusion, 16
images, 16, 24, 26, 27, 38
imaging, 11, 53
implementation, 12, 192, 222, 224, 226, 227,
228, 232, 238
inattention, 12
incidence, 162
inclusion, 9
income, 190
independence, 32, 51
Indian, 17
indices, 59, 97
individual differences, 50
individuality, 68
induction, 20
industrial, 161
industry, ix, 129, 197, 229
ineffectiveness, 191
inequality, 58, 193
infants, 11, 13, 15, 35
inferior parietal region, 12, 16
infinite, ix, 8, 13, 21, 28, 31, 32, 35, 36, 38, 50,
88, 115, 116, 119, 121, 122, 123, 124, 125,
132, 177, 178, 243, 246, 256
Information System, 203
infrastructure, 180
injections, 122
inorganic, 25
insects, 34, 35
insight, 4, 10
inspiration, 10
instability, 10
instruction, 16
integration, 2
intellect, 25, 27, 32
intelligence, 22
interaction, 58, 96
interactions, 175, 244
interdisciplinary, vii, 1
Internet, ix, 179, 180, 181, 182, 183, 184, 185,
191, 197, 199, 201, 234
Internet Protocol, 181
interval, 23, 71, 246, 252, 256, 257
intervention, 12
intrinsic, viii, 67, 68, 71
intron, 170
intuition, 15, 35
invariants, 142
inventiveness, 15
265
inventories, 142
inversion, 97
Investigations, 56
IP, 182, 183, 184, 186, 198, 199, 200, 201
IPv6, 182
irrationality, 29
isomorphism, 7, 19, 133, 148
Israel, 177
J
Jaffe, 49, 52, 55
Japan, 201
Japanese, 154
joining, 143, 144
judgment, 31
Jung, vii, viii, 1, 2, 23, 24, 25, 27, 31, 32, 33, 34,
35, 37, 38, 39, 40, 41, 49, 50, 52, 53, 55
Jungian, 3, 28, 55
justice, 3
justification, 10
K
Kant, 30, 54
kernel, 133, 148
kinetic energy, x, 249
King, 87
Kobe, 201
L
labeling, 6
labor, 58
labor force, 58
land, 162
language, 11, 12, 16, 17, 24, 26, 27, 33, 35, 115,
116, 133, 174
latency, 184
Latin squares, ix, 152, 153, 154, 155, 156, 178
law, 10, 12, 14, 41, 42, 149, 204, 229, 231, 232
laws, 23
leakage, 227
learners, 15
learning, 11, 17, 40, 77
Leibniz, 34
lesions, 12
life forms, 18
light, 88
likelihood, 32
limitation, 184
limitations, 26, 35, 39, 51
linear, 2, 8, 12, 24, 58, 59, 62, 173, 207, 208,
209, 238, 247, 250
linear function, 59, 207, 247
266
Index
linear programming, 58
linear systems, 25
linguistic, vii, viii, 24, 57, 67, 68, 69, 70, 71, 74,
77, 78, 83, 84, 85
linguistic information, viii, 67, 68, 70, 84
links, 180, 181, 186, 187, 188, 193
loading, 183
localization, 246
location, 190
locus, 13
logical deduction, 29
London, 53, 54, 55, 56, 84, 241
Los Angeles, 53
losses, viii, 67, 184
low power, 240
lying, 248
M
magma, 130, 131
magnetic, 11
magnetic resonance imaging, 11, 13
Maine, 55
management, 69, 84, 180, 182, 185, 186, 199
manipulation, 16, 255
manufacturing, 58
mapping, 33, 233
market, 229
Markov, 238
Markovian, 198
marriage, 234
mathematical disabilities, 11
mathematical knowledge, 15
mathematical programming, 57, 190
mathematicians, 2, 5, 7, 10, 14, 15, 16, 17, 18,
28, 29, 30, 35, 36, 52, 207
mathematics, ix, 12, 16, 18, 33, 47, 129, 174,
177, 178, 208
matrices, 113
matrix, 30, 74, 147, 162, 163, 233, 234, 235
Max-Min Fairness, ix
meanings, 58
measurement, 2, 161, 195
measures, 59, 60, 61, 62, 64, 71, 73
media, 181, 197
medicine, ix, 129
membership, viii, 6, 22, 23, 57, 58, 59, 70, 71,
74, 75, 76, 77
memory, vii, 1
mental image, 16
mental power, 4, 5
mental representation, 2, 12, 16, 17
messages, 23, 26, 234
metaphor, 13
metaphors, 13
methane, 62
metric spaces, vii
Middle Ages, 40
Mind-Body, 56
MIP, 197
MIT, 53, 84
modeling, viii, 67, 84
models, v, vii, 3, 6, 8, 10, 18, 20, 25, 65, 74, 77,
82, 83, 126, 179, 183, 186, 201, 244, 248, 257
modules, 197
molecules, viii, 87, 88, 89, 95, 96, 110
momentum, vii, x, 93, 94, 110, 243, 248, 249,
257
MOS, ix, 203, 227, 228, 231, 232, 240
Moscow, 56
motion, 23, 253, 257
motivation, 238
movement, 2, 16, 29, 34, 140, 257
multicultural, 15
multimedia, 182
multiplication, 43, 44, 45, 47, 50, 89, 125, 130,
146, 147, 149, 170
multiplicity, 6, 99
multiplier, 224
music, 29
mutations, 140
N
National Science Foundation, 112
natural, vii, viii, 1, 4, 5, 6, 7, 8, 9, 18, 19, 20, 21,
23, 27, 28, 29, 30, 31, 32, 33, 34, 36, 37, 38,
39, 41, 42, 45, 46, 47, 48, 49, 51, 52, 57, 65,
69, 74, 88, 125, 129, 130, 137, 149, 153, 160,
191, 221
network, ix, 179, 180, 181, 182, 183, 184, 185,
186, 188, 189, 190, 191, 192, 193, 195, 197,
199, 241
neurobiological, 16
neuroimaging, 12, 13
neuronal circuits, 16
neurons, 11, 12
neurophysiology, 12, 13
neuropsychology, 11, 12
neuroscience, 11
New Jersey, 198
New Science, 55
New York, 55, 65, 113, 114, 166, 174, 177, 178,
199, 200, 238, 241, 259
Newton, 34
next generation, 197
Ni, 201
NMR, 96, 102
Index
nodes, 180, 181, 185, 186, 188
non-human, 13
non-uniform, 8
nonverbal, 17
normal, 88, 89, 107, 118, 133, 136, 138, 157
normalization, 77, 245, 250, 251
norms, 26
NSC, 198
nuclear, viii, 87, 89, 90, 91, 93, 96, 97, 99, 100,
102, 105, 106
nuclei, 88, 96, 100, 102
nucleus, 90, 97
number-words, 9
numerical computations, 249
O
objective reality, 51
observations, 21, 257
obsolete, 183
operator, ix, 14, 88, 179, 190, 191, 244, 249, 257
opposition, 26, 34, 40, 152
optical, ix, 179, 183
optical transmission, 183
optimism, 63, 64
optimization, vii, ix, 57, 58, 59, 84, 154, 179,
181, 190, 193, 194, 197, 239
orbit, 88, 96, 97, 107, 110, 137, 139, 145, 165,
177
organic, 25
orientation, 90
orthogonal Latin squares, 155, 156
orthogonality, 155
oscillation, 249, 257
oscillator, 243, 248, 257
oxide, 227, 229, 230
oxide thickness, 229
ozone, 162
P
Pacific, 201
packets, 180
pairing, ix, 115, 122, 123, 124, 125, 126
paradox, 10, 46, 256
parameter, 15, 64, 68, 71, 72, 73, 77, 78, 83, 192,
193, 245, 247, 250, 257
Pareto, 76, 188, 190, 199
Pareto optimal, 188, 190
Parkinson, 65
particles, ix, 30, 38, 87, 89, 90, 91, 93, 102
partition, 90, 91, 92, 97, 119, 120, 130, 137, 139,
159, 198, 214, 217
pathogens, 162
267
patients, 34
pattern recognition, 35
pedagogical, 4
perception, 17, 21, 40, 68, 69, 72
periodic, 89, 93, 94, 96, 97, 102, 105, 108, 110
Periodic Table, viii, 87, 89
periodicity, viii, 87, 88, 89, 91, 94, 95, 96, 97,
102, 105, 106, 107, 108, 110, 112
permit, viii, 67
permittivity, 229
personality, 40
perturbation, 249
Philadelphia, 65
philosophers, 3, 7, 15
philosophical, vii, 1, 7, 10, 14, 33, 48, 49
philosophy, 3, 4, 14, 29, 227, 228
physical environment, 15
physical world, 13, 17, 38, 226
physicists, 16, 18, 38
physics, 30, 244
physiological, vii, 1
planar, 167, 168
planets, 3, 14
planning, viii, 67, 68, 83, 161, 187, 189
Plato, 4, 25, 27, 34, 39, 50
play, 13, 47, 65, 77, 89, 130, 153, 213
pleasure, 28
plurality, 2
Poisson, 183, 195, 196
polarity, 14, 34
polynomial, ix, 89, 95, 96, 129, 140, 145, 149,
150, 151, 169, 176
polynomials, 91, 97, 149, 151
poor, 180, 192
population, 12, 15, 161
power, vii, x, 4, 15, 27, 31, 32, 36, 69, 84, 93, 97,
116, 132, 149, 155, 160, 161, 163, 177, 203,
231, 232, 240
powers, 32, 89, 97, 132, 160
predators, 17
predicate, 20, 21, 33, 117, 125, 126
pre-existing, 50
preference, viii, 67, 74, 75, 76, 77, 79, 82, 83, 84,
85, 186
prefrontal cortex, 12
press, 113
pressure, 63
prices, 199
primary products, 62
primate, 12, 17
private, 184, 258
probability, 29, 65, 195, 196, 197
probe, 96
268
Index
production, 26, 61
productivity, 162
profit, 190
prognosis, 11
program, 4, 5, 197
programming, 57, 58, 65, 174, 200
proliferation, 224
propagation, 187
properties, 88
property, 15, 20, 27, 31, 34, 130, 146, 181, 212,
213, 227
Proportional Fairness, ix, 179
proposition, 14, 34, 36, 37, 38, 150
protocols, 184, 186, 198
protons, 88, 102
prototype, 3, 227, 229
prototyping, 229
pseudo, 170
psyche, 2, 24, 31, 34, 37, 38, 50
psychic process, 24
psychological functions, 2, 39
Psychological Perspective, 53
psychologist, 28
psychology, 3, 37
psychophysics, 12
PT, x, 243, 244, 245, 248, 249, 257
public, 191
Public Switched Telephony Network PSTN), ix,
179
pyrolysis, 62
Q
QoS, v, 179, 180, 181, 182, 183, 184, 185, 186,
187, 188, 189, 190, 191, 192, 193, 195, 197,
198, 199, 200, 201
quality of service, 185, 198
quantum, vii, ix, 2, 88, 89, 92, 96, 99, 102, 203,
204, 226, 230, 231, 239, 240, 244, 248, 249,
257, 259
quantum computing, 203, 204
quantum field theory, 244
quantum mechanics, vii, 88, 244, 249, 257, 259
quarks, 18, 38
qubits, 226
Quinn, 49, 52, 55
R
radiation, 61
radio, 240
rail, 226, 240
random, 23, 27, 161, 174, 195
range, 8, 180, 249, 257
reading, 207
real numbers, 5, 13, 22, 23, 32, 46, 48, 59
real time, 180
realism, 10, 33
reality, 3, 11, 13, 14, 16, 18, 24, 26, 30, 34, 36,
37, 38, 39, 49, 51, 52, 244
reasoning, 8, 13, 22, 118, 119, 120, 121, 122,
123, 124, 125, 236
recalling, 118
recognition, 18, 35
reconciliation, 26
recovery, 62
recursion, 20
reflection, 145
regional, 182
regular, 96, 142, 143, 144, 147, 255, 256
rehabilitation, 11
relationship, viii, 4, 12, 15, 38, 40, 87, 206, 210
relationships, viii, 3, 23, 35, 36, 87, 226
relativity, 52, 88
relevance, 244
reliability, 184, 191, 197
religion, 14, 16, 17, 25
Renaissance, 34, 40
repetitions, 133
research, 112
Research and Development, 238
resolution, 34, 165
resource allocation, 180, 181, 194, 195, 200
resources, ix, 58, 179, 180, 181, 183, 184, 199
retail, 47
returns, 252
revenue, 181, 191
rhythm, 3
right hemisphere, 12
rings, ix, 43, 129, 146, 148, 150
risk, 183
RNA, ix, 129, 166, 167, 168, 169, 170
robustness, 197
rotations, 89, 137, 138, 140, 142, 143, 144, 165
routing, 180, 181, 182, 185, 186, 188, 190, 198,
199, 200, 201, 234
S
sacred, 23, 27, 31
sample, 161, 256
satisfaction, 58, 63, 77, 181
scalar, 11, 70, 71
scheduling, 185, 198
schema, 8, 24
school, 13, 14, 15, 28
Schrdinger equation, x, 243
scientific community, 2
Index
search, 11, 12, 24, 49, 154, 177, 186, 241, 244,
252, 257
searches, 255
searching, 35
secular, 246, 247, 252
security, 5
Self, 25, 40, 41, 56
semantic, 68, 77
semantics, 3, 58, 59, 115
semiconductor, 227
semigroup, 131, 146
sentences, 32, 118, 126
series, ix, 20, 30, 31, 35, 179, 227, 246
service quality, 180
services, ix, 179, 180, 181, 182, 183, 184, 185,
191, 193
set theory, 58, 68
shape, 13, 43, 64, 90, 91, 92, 133, 220, 252
shaping, 10
Shapiro, 56
shares, 68, 193
sharing, ix, 179, 184, 185, 197, 199, 200
Shell, 93
sign, 2, 6, 12, 88, 107, 116, 203, 245, 250, 256
signals, 231
signs, 6, 18, 146
silicon, 230, 232, 240
similarity, 84
Singapore, 53
singular, 147
skeleton, 50
skin, 162
SMS, 182
social construct, 15, 17, 18
social context, 15
social responsibility, 15
Socrates, 25
software, 255
SOI, 232, 240
soil, 161
solar, 240
sounds, 14
South America, 35
space-time, 26, 39
Spain, 129, 164
spare capacity, 185
spatial, 12, 244, 248
special theory of relativity, 88
species, 17, 89, 96, 97, 101, 102, 154
spectroscopy, viii, 87, 88, 89, 93, 96
spectrum, 22, 36, 98, 244, 248, 249, 252, 257
speculation, 35
speech, 180, 224
269
T
Taiwan, 179, 198
270
tangible, 12
TCP, 191, 199
teaching, 3, 26
technological developments, ix
technology, ix, 203, 204, 227, 228, 230, 231, 232,
240
telecommunication, ix, 179, 180, 183, 198, 199,
203
telecommunication networks, 183, 198, 199
telephone, 234
telephony, 182, 183, 184
temperature, 63, 203
Tesla, 13
tetrad, 40
textbooks, 207, 255
Theory of Everything, 39
thinking, 2, 18, 27, 36
third order, x, 243, 249, 255
Thomson, 53
threat, 9
threshold, 78, 229, 231, 232, 252, 253, 254, 255,
256
tics, 199
time, ix, 2, 4, 5, 11, 13, 16, 17, 22, 23, 25, 30, 32,
35, 36, 40, 46, 50, 57, 154, 174, 179, 180, 181,
182, 183, 184, 190, 195, 196, 197, 198, 224,
244
tolerance, 58
topological, vii, 43, 170
topology, 170, 180, 183, 186, 188, 231
Topos, 19, 55
total utility, 190
traction, 130
traffic, 14, 180, 181, 182, 183, 184, 185, 186,
196, 197, 198, 199, 200, 241
traffic flow, 182, 183, 184
training, 16, 18
traits, 34
trans, 17, 31, 53, 54, 195
transfer, 62, 180, 181, 184, 186, 187
transformation, 70, 71, 257
transformations, 24, 41, 42
transistor, 227, 229, 230, 231
transistors, 227, 229
transition, 57, 58, 70, 248, 257
transitions, 96
translation, 70
transmission, 15, 164, 165, 181, 183, 191, 195,
197, 227
transparent, 30, 251
transport, 183
transportation, 47
Transylvania, 170
Index
trees, 31, 166, 167, 168, 169, 170
Trinidad and Tobago, 57
two-dimensional, 41, 43, 108
two-dimensional space, 43
U
UMTS, 182, 200
uncertainty, viii, 2, 23, 28, 34, 58, 67, 68, 69, 71,
181, 198
uniform, 8
universal grammar, 26
universality, 16, 238
universe, 31, 68
unpredictability, 184, 185
utilitarianism, 51
V
vacuum, 229
validity, 5, 38, 68, 186
values, 15, 57, 58, 63, 72, 73, 77, 93, 97, 99, 108,
111, 112, 187, 204, 210, 251
variability, 161
variables, 33, 58, 63, 77, 115, 116, 118, 119, 120,
121, 122, 123, 126, 140, 161, 188, 189, 194,
210, 216, 224, 227, 231
variation, 180, 190, 246
vector, 43, 73, 74, 173, 187, 193, 194
vehicles, 154
vertebrates, 18
virus, 170
visible, 26, 52, 256
vision, 41
visuospatial, 12
vocabulary, 115, 116
voice, 5, 182, 184
voids, 10
VoIP, 182
W
wealth, 15, 207
web, 182, 184
wells, 252, 255, 257
West Indies, 57
Western societies, 17
winning, 174
wireless, ix, 179, 184, 198, 201
wireless networks, ix, 184, 201
wires, 15, 221, 234
wisdom, vii, 1, 3
withdrawal, 162
women, 15
wood, 177
Index
World Wide Web, 175
271
Z
Y
zeitgeist, 51
Zen, 50