190 45 2MB
English Pages 198 [186] Year 2019
Boolean Functions: Topics in Asynchronicity
Boolean Functions: Topics in Asynchronicity
First Edition
Serban E. Vlad Oradea, Romania
This edition first published 2019 © 2019 John Wiley & Sons, inc All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions. The right of Serban E. Vlad to be identified as the author of this work has been asserted in accordance with law. Registered Office John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA Editorial Office 111 River Street, Hoboken, NJ 07030, USA For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com. Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats. Limit of Liability/Disclaimer of Warranty While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Library of Congress Cataloging-in-Publication Data Names: Vlad, Serban E., 1959- author. Title: Boolean functions : topics in asynchronicity / Serban E. Vlad. Description: First edition. | Hoboken, NJ : John Wiley & Sons, 2018. | Includes bibliographical references and index. | Identifiers: LCCN 2018034871 (print) | LCCN 2018057135 (ebook) | ISBN 9781119517498 (Adobe PDF) | ISBN 9781119517511 (ePub) | ISBN 9781119517474 (hardcover) | ISBN 9781119517498 (ePDF) Subjects: LCSH: Algebra, Boolean. Classification: LCC QA10.3 (ebook) | LCC QA10.3 .V533 2018 (print) | DDC 511.3/24–dc23 LC record available at https://lccn.loc.gov/2018034871 ISBN 978-1-119-51747-4 (Hardback) ISBN 978-1-119-51749-8 (ePDF) ISBN 978-1-119-51751-1 (epub) Cover Design: Wiley Cover Image: Courtesy of Serban E. Vlad Set in 10/12pt WarnockPro by SPi Global, Chennai, India
Printed in United States of America 10 9 8 7 6 5 4 3 2 1
To Ciupi and Puiu Mic
vii
Contents Preface xi 1
Boolean Functions 1
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9
The Binary Boole Algebra 2 Definition of the Boolean Functions. Examples. Duality 4 Iterates 6 State Portraits. Stable and Unstable Coordinates 11 Modeling the Asynchronous Circuits 14 Sequences of Sets 14 Predecessors and Successors 15 Source, Isolated Fixed Point, Transient Point, Sink 18 Translations 19
2
Affine Spaces Defined by Two Points 21
2.1 2.2 2.3 2.4 2.5
Definition 21 Properties 23 Functions that Are Compatible with the Affine Structure of Bn The Hamming Distance. Lipschitz Functions 28 Affine Spaces of Successors 31
3
Morphisms 35
3.1 3.2 3.3 3.4 3.5 3.6 3.7
Definition 35 Examples 36 The Composition 38 A Fixed Point Property 39 Symmetrical Functions Relative to Translations. Examples 39 The Dual Functions Revisited 41 Morphisms vs. Predecessors and Successors 42
4 4.1
Antimorphisms 45
Definition 45
25
viii
Contents
4.2 4.3 4.4 4.5 4.6
Examples 46 The Composition 48 A Fixed Point Property 51 Antisymmetrical Functions Relative to Translations. Examples 51 Antimorphisms vs Predecessors and Successors 52
5
Invariant Sets 55
5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 5.10 5.11 5.12
Definition 55 Examples 57 Properties 58 Homomorphic Functions vs Invariant Sets 60 Special Case of Homomorphic Functions vs Invariant Sets 62 Symmetry Relative to Translations vs Invariant Sets 63 Antihomomorphic Functions vs Invariant Sets 64 Special Case of Antihomomorphic Functions vs Invariant Sets 65 Antisymmetry Relative to Translations vs Invariant Sets 66 Relatively Isolated Sets, Isolated Set 67 Isomorphic Functions vs Relatively Isolated Sets 68 Antiisomorphic Functions vs Relatively Isolated Sets 69
6
Invariant Subsets 71
6.1 6.2 6.3 6.4 6.5 6.6
Definition 71 Examples 72 Maximal Invariant Subset 72 Minimal Invariant Subset 74 Connected Components 76 Disconnected Set 77
7
Path Connected Set 81
7.1 7.2 7.3 7.4 7.5 7.6
Definition 81 Examples 82 Properties 84 Path Connected Components 84 Morphisms vs Path Connectedness 85 Antimorphisms vs Path Connectedness 85
8
Attractors
8.1 8.2 8.3 8.4 8.5
87 Preliminaries 88 Definition 89 Properties 90 Morphisms vs Attractors 94 Antimorphisms vs Attractors 95
Contents
9.1 9.2 9.3 9.4 9.5 9.6 9.7
97 Definition 97 Examples 100 Iterates 101 The Sets of Predecessors and Successors 101 Source, Isolated Fixed Point, Transient Point, Sink 103 Isomorphisms vs tcpo 104 Antiisomorphisms vs tcpo 105
10
The Strong Technical Condition of Proper Operation
9
10.1 10.2 10.3 10.4 10.5 10.6 10.7
The Technical Condition of Proper Operation
107 Definition 107 Examples 109 Iterates 110 The Sets of Predecessors and Successors 110 Source, Isolated Fixed Point, Transient Point, Sink 111 Isomorphisms vs Strong tcpo 111 Antiisomorphisms vs Strong tcpo 112
11
The Generalized Technical Condition of Proper Operation 115
11.1 11.2 11.3 11.4 11.5 11.6 11.7 11.8
Definition 115 Examples 119 Iterates 120 The Sets of Predecessors and Successors 121 Source, Isolated Fixed Point, Transient Point, Sink 125 Isomorphisms vs the Generalized tcpo 126 Antiisomorphisms vs the Generalized tcpo 128 Other Properties 129
12
The Strong Generalized Technical Condition of Proper Operation 131
12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8
Definition 131 Examples 135 Iterates 136 Source, Isolated Fixed Point, Transient Point, Sink 137 Asynchronous and Synchronous Transient Points 141 The Sets of Predecessors and Successors 141 Isomorphisms vs the Strong Generalized tcpo 144 Antiisomorphisms vs the Strong Generalized tcpo 146
13
Time-Reversal Symmetry 147
13.1 13.2
Definition 148 Examples 150
ix
x
Contents
13.3 13.4 13.5
The Uniqueness of the Symmetrical Function 151 Isomorphisms and Antiisomorphisms vs Time-Reversal Symmetry 151 Other Properties 152
14
Time-Reversal Symmetry vs tcpo 155
14.1 14.2 14.3
Time-Reversal Symmetry vs tcpo 155 Time-Reversal Symmetry vs the Strong tcpo 156 Examples 159
15
Time-Reversal Symmetry vs the Generalized tcpo 163
15.1 15.2
Time-Reversal Symmetry vs the Generalized tcpo Examples 168
Appendix A
The Category As 171
Appendix B
Notations 175
Bibliography Index 181
177
163
xi
Preface In this framework, by asynchronicity we mean that the coordinate functions Φ1 , … , Φn of a function Φ are computed independently on each other, asynchronously. Synchronicity is that special case of asynchronicity when Φ1 , … , Φn are computed at the same time, synchronously. It is of special interest to study the iterations of Φ, which can be asynchronous or synchronous. Our project “Topics in asynchronicity” has been thought of having two parts, part I: Boolean functions and part II: Boolean systems. While working we took the decision to split it in two books. The source of inspiration is represented by the asynchronous circuits from electronics that can be modeled by Boolean functions Φ ∶ {0, 1}n −−→ {0, 1}n iterating their coordinates in arbitrary time, independently on each other, i.e. asynchronously. The uncertainties related with the behavior of the circuits and their models are generated by technology and also by temperature variations and voltage supply variations. In order to understand the dynamics of these systems, we give the example of the function Φ from Table 1, whose state portrait was drawn in Figure 1 (we have adopted the terminology of state portrait, by analogy with the phase portraits of the dynamical systems theory; such drawings might be called in engineering and elsewhere state transition graphs or state transition diagrams). In Figure 1, the arrows show the increase of time. We have underlined in the tuples (𝜇1 , 𝜇2 , 𝜇3 ) ∈ {0, 1}3 these coordinates, called unstable (or excited, or enabled), for which 𝜇i ≠ Φi (𝜇), i ∈ {1, 2, 3}; these are the coordinates that are about to switch, but the time instant and the order in which these switches happen are not known. In this model, each present value 𝜇 ∈ {0, 1}3 of the state may be followed by several possible values in the future, giving nondeterminism and also branching time in the future. (1, 0, 1) is an isolated fixed point of Φ (a fixed point is also called equilibrium point, or rest position, or final state), where the system stays indefinitely long; it has no underlined coordinates. Unlike it, (0, 1, 0) is a fixed point that is not isolated, since a transfer to it exists, from (0, 0, 0).
xii
Preface
Table 1 An example. (𝝁1 , 𝝁2 , 𝝁3 )
𝚽(𝝁1 , 𝝁2 , 𝝁3 )
(0, 0, 0)
(0, 1, 1)
(0, 0, 1)
(0, 1, 1)
(0, 1, 0)
(0, 1, 0)
(0, 1, 1)
(1, 1, 1)
(1, 0, 0)
(0, 0, 0)
(1, 0, 1)
(1, 0, 1)
(1, 1, 0)
(1, 0, 0)
(1, 1, 1)
(1, 1, 0)
Figure 1 Dependence on the order in which Φ1 , Φ2 , Φ3 are computed.
The transition (0, 1, 1) −−→ (1, 1, 1) consists in the computation of Φ1 (0, 1, 1); even if we do not know when it happens, we know that it happens and the system, if it is in (0, 1, 1) , surely gets to (1, 1, 1) sometime. And the transitions (1, 1, 1) −−→ (1, 1, 0), (1, 1, 0) −−→ (1, 0, 0), (1, 0, 0) −−→ (0, 0, 0) are similar. The interesting behavior is in (0, 0, 0); if Φ3 (0, 0, 0) is computed first, or if Φ2 (0, 0, 0), Φ3 (0, 0, 0) are computed simultaneously, the system gets to (0, 1, 1) sometime, with (0, 0, 1) a possible intermediate state; but if Φ2 (0, 0, 0) is computed first, then the state (0, 1, 0) is reached and, as it is a fixed point of Φ (no coordinate is underlined), the system rests there indefinitely long. In the previous discussion: (a) a system is identified with a function Φ ∶ {0, 1}n −−→ {0, 1}n , in the sense that Φ contains all the information that gives the behavior of the system. This justifies our definitions of the Boolean functions via state portraits and, in fact, this is the motivation situated behind writing this book; (b) the system that we refer to is Boolean (this vaguely refers at {0, 1}), universal (the state space is all of {0, 1}n ), regular (a generator function Φ exists), asynchronous (Φ1 , … , Φn are not computed at the same time, but the fact that these coordinates are computed independently on each other
Preface
also shows that the structure of the system is variable), nondeterministic (Φ1 , … , Φn have unknown durations of computation), autonomous (no input), noninitialized; (c) the durations of computation of Φ1 , .., Φn are subject to no restriction (this is the unbounded delay model of computation of the Boolean functions); (d) time is discrete or continuous. The topics that are common for the Boolean functions and the Boolean systems include morphisms and antimorphisms, invariant sets, the conditions of proper operation (race-freedom) and time-reversal, with the symmetry that it generates. The concept of isomorphism is easily understood by looking at Figure 2, where the state portrait of a function which is isomorphic with the function Φ from Figure 1 was drawn. To each point 𝜇 ∈ {0, 1}3 from Figure 1, the vector (1, 0, 1) was added modulo 2 coordinatewise and the result expressed by Figure 2 is that the transitions from the first case become transitions translated with (1, 0, 1) in the second case. Note the arrows and the underlined coordinates of the two functions: the behavior is the same. The morphisms present under a more general form this transfer of properties from a function to another one and this is observed by taking a look at Figure 3, representing a function that accepts a morphism from it to both functions, from Figures 1 and 2. The morphism of this example forgets the computations of Φ2 . A nonempty set A ⊂ {0, 1}n is invariant (Φ is kept in mind) if, whenever a computation starts in 𝜇 ∈ A, it ends in some point 𝜇′ ∈ A and two types of invariance are situated behind this intuition. We can think, looking at Figure 2, that the fixed points (0, 0, 0), (1, 1, 1) give the invariant sets {(0, 0, 0)}, {(1, 1, 1)}, {(0, 0, 0), (1, 1, 1)} (where the computation starts in (0, 0, 0) and Figure 2 This function is isomorphic with the function Φ from Figure 1.
Figure 3 A morphism exists from this function to the functions from Figure 1 and Figure 2: the computation of Φ2 is forgotten.
xiii
xiv
Preface
ends in (0, 0, 0) etc.). But the set {0, 1}3 ∖{(0, 0, 0)} is also invariant. From the previous sets, {(0, 0, 0)}, {(1, 1, 1)} are attractors. The functions from Figures 1 and 2 suggest the problem of finding sets of Boolean functions Φ where, even if we do not know the time instants and the order in which their coordinates are computed, we know that for any 𝜇 ∈ {0, 1}n , the values 𝜇, Φ(𝜇), (Φ ⚬ Φ)(𝜇), (Φ ⚬ Φ ⚬ Φ)(𝜇), … are computed sometime, in this order. Thus, the behavior of the (asynchronous) systems that we are looking for reproduces in a certain way the behavior of the (synchronous, usual) dynamical systems in their Boolean version, and this is considered to be “nice”, in a context with many unknown parameters. We get the “proper operation” properties of the Boolean functions/systems. The functions from Figures 1 and 2 do not fulfill such a property, for example in Figure 2 it is not sure that Φ(1, 0, 1) = (1, 1, 0) is really computed, since the computation of Φ2 (1, 0, 1) first produces the transfer of the system from (1, 0, 1) to (1, 1, 1), where it rests indefinitely long. The functions from Figures 3 and 4 fulfill the proper operation property. Time reversal means, roughly speaking, reversing the arrows of a state portrait. The function from Figure 2 does not accept this, since reversing the arrows that point to (1, 1, 0) to arrows that start from (1, 1, 0) is impossible, but the function from Figure 4 does accept. We have inserted an arrow from (1, 1, 1) to (1, 1, 0). The time-reversed symmetrical function of the function from Figure 4 is the function from Figure 5. The book is structured into chapters, sections, paragraphs, and the chapters have a short introduction and/or summary. The paragraphs are definitions, Figure 4 Function that accepts time reversal.
Figure 5 The time-reversed symmetrical function of the function from Figure 4.
Preface
notations, remarks and also theorems, lemmas, corollaries with their proofs. We have added two appendixes containing the definition of the category whose objects are Φ ∶ {0, 1}n −−→ {0, 1}n functions, and the notations respectively. In Chapter 1, we introduce the binary Boole algebra and we give some preliminaries on Boolean functions (such as duality, iterates, state portraits, …). We sketch how the asynchronous circuits are modeled by Boolean functions. Chapter 2 is dedicated to the affine spaces [𝜇, 𝜇′ ] ⊂ {0, 1}n defined by two points 𝜇, 𝜇′ ∈ {0, 1}n . Their meaning consists in the fact that, given Φ ∶ {0, 1}n −−→ {0, 1}n , the set [𝜇, Φ(𝜇)] contains the points that may be accessed when Φ(𝜇) is computed asynchronously; for example, looking at Figure 4, we have [(0, 0, 0), Φ(0, 0, 0)] = [(0, 0, 0), (0, 0, 0)] = {(0, 0, 0)} and also [(1, 0, 1), Φ(1, 0, 1)] = [(1, 0, 1), (1, 1, 0)] = {(1, 0, 1), (1, 0, 0), (1, 1, 1), (1, 1, 0)}. Chapters 3 and 4 introduce the morphisms and the antimorphisms of Boolean functions. Intuitively, the morphisms from Φ to Ψ presume that the succession of the cause 𝜇, 𝜈 ∈ {0, 1}n and the effect Φ(𝜇), Ψ(𝜈) ∈ {0, 1}n is the same, time flows in the same sense when Φ, Ψ are computed (from the past to the future, or from the future to the past); and the antimorphisms act as if for Φ and Ψ time flows in opposite senses. The invariant sets are treated in Chapters 5 and 6. The concept is taken from the dynamical systems theory and it is brought in this timeless framework, where we discuss as well symmetry relative to translations, maximality and minimality, disconnectedness, etc. The path connected sets are treated in Chapter 7: the visual meaning of a path connecting 𝜇 ∈ {0, 1}n with 𝜈 ∈ {0, 1}n is given by the existence in the state portrait of the points 𝜆1 , … , 𝜆p ∈ {0, 1}n such that an arrow exists from 𝜇 to 𝜆1 and … and an arrow exists from 𝜆p to 𝜈. Chapter 8 introduces the attractors, the nonempty subsets of {0, 1}n satisfying a strong version of invariance together with one of: topological transitivity, minimality, and path connectedness. Four concepts of proper operation of a Boolean function are presented in Chapters 9–12. Their fulfillment decreases the nondeterminism that is generated by the unknown parameters that occur in modeling. Time-reversal symmetry is addressed in Chapter 13 and, combined with the fulfillment of the proper operation properties, in Chapters 14 and 15. This concept that is originating in physics and in the dynamical systems theory refers to two functions Φ, Ψ, which are iterated in time flowing in opposite senses. The result is that Φ, Ψ are somehow inverse to each other. We have kept the terminology of time-reversal and time-reversal symmetry even in this timeless approach since other symmetries of the Boolean functions exist also. The most significant part of the bibliography consists in literature dedicated to dynamical systems theory and we translate concepts from synchronous real numbers systems to asynchronous Boolean systems by making analogies, and
xv
xvi
Preface
then from Boolean systems to Boolean functions. We indicate in this respect [2, 12, 15, 16, 19, 25], and [40].1 An important monograph in Boolean functions is [7]. Introducing the asynchronous Boolean systems is the purpose of [35], see also [30]. The technical condition of proper operation was known for many years by the theoreticians in switching circuits [24], perhaps with different names (race-freedom is one of them). We have also gathered useful intuition in this direction from many engineering sources such as [5, 6, 27]. An excellent survey in the time-reversal symmetry of the dynamical systems is [20]. The book is addressed to mathematicians and computer scientists who are interested in theory and applications of Boolean functions, dynamical systems, and circuits. Kind thanks to the unknown reviewers and the publisher for their elegant cooperation. Oradea, May, 2018
Serban E. Vlad
1 The monographs [16, 25], and [40] were suggested by a reviewer of the book. Other two monographs suggested by him are: Eric Goles, Servet Martínez, Neural and Automata Networks: Dynamical Behavior and Applications, Kluwer Academic Publishers, 1990 and Robert Francois, Discrete Iterations: A Metric Study, Springer Series in Computational Mathematics, 1986, but at the moment when this text was written, they were not available to the author.
1
1 Boolean Functions The works of George Boole (1815–1864) [8] are contained in about 50 articles and a few other publications. Calculus of reasoning, which Boole was preoccupied with, found its way into his 1847 work, The Mathematical Analysis of Logic, that continued the ideas of Gottfried Wilhelm Leibniz (1646–1716) and pushed the idea that logic was a mathematical discipline, rather than philosophy. In 1854, Boole published An Investigation into the Laws of Thought, on Which are Founded the Mathematical Theories of Logic and Probabilities, which is perhaps his most important work. Boole approached logic in a new way, reducing it to simple algebra, incorporating logic into mathematics, and laying the foundations of the now famous binary approach. Logical expressions are now represented using a mathematical form called in his honor Boolean Algebra. Boole’s work on mathematical logic was criticized and/or ignored by his contemporaries, except for an American logician, Charles Sanders Peirce (1839–1914), who gave a speech at the American Academy of Arts and Sciences, describing Boole’s ideas. Peirce spent more than 20 years working on these ideas and their applications in electronic circuitry.1 Unfortunately, Boolean algebra remained mostly unknown and unused for many years, until the 1940s, when a young student by the name of Claude Elwood Shannon picked up Boole’s and Peirce’s works and recognized their relevance to electronics design. The purpose of this chapter is that of giving the first definitions and notations related with the Boolean algebra with two elements B. The functions Φ ∶ Bn −−→ Bp are called Boolean, and 0, 1; ⋅, ∪ are dual couples, while the logical complement is self-dual. The iterates of Φ ∶ Bn −−→ Bn are two kinds: the first given by the composition Φ ⚬ Φ and the second by allowing some coordinates Φi to be computed and some others Φj to be not. The state portrait of Φ ∶ Bn −−→ Bn is a directed graph that indicates all the associations resulting when 1,…, n coordinates of Φ are computed. The graph 1 Peirce is considered also the “father of pragmatism” and one of the founders of semiotics. Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
2
1 Boolean Functions
is associated with a unique Φ, thus it may act as a definition of Φ. The state portraits are widely used to characterize the asynchronous computations. An example is given of the way that the asynchronous circuits are modeled by the Boolean functions. The predecessors and successors, as well as the sources, isolated fixed points, transient points and sinks are defined. These concepts characterize the “past” possible causes and the “future” possible effects around a point 𝜇. In the last section, we introduce the translations.
1.1 The Binary Boole Algebra We denote B = {0, 1}.
Notation 1.1
Definition 1.1 The set B and, more general, the set Bn , n ≥ 1 are organized as topological spaces by the discrete topology. Definition 1.2 −− 0 1 ; 1 0
The following laws are defined on B: ⋅ 0 1 0 0 0 ; 1 0 1
∪ 0 1 ⊕ 0 1 0 0 1 ; 0 0 1 1 1 1 1 1 0 Table 1.1
called negation, not, or (logical) complement; product or intersection; sum or union; and modulo 2 sum or disjoint union. These laws induce laws that are denoted with the same symbols on Bn . Remark 1.1 ∀𝜉 ′ ∈ B,
The laws of B fulfill well-known equations, such as ∀𝜉 ∈ B,
𝜉 = 𝜉, 𝜉 ⊕ 𝜉 ′ = 𝜉𝜉 ′ ∪ 𝜉𝜉 ′ , 𝜉 = 𝜉 ⊕ 1, etc. Definition 1.3 Let I an arbitrary, finite set. We consider the (binary) family ai ∈ B, i ∈ I, which is denoted sometimes with a or with (ai ) when I is kept in mind.2 The set supp a = {i|i ∈ I, ai = 1} 2 The family ai ∈ B, i ∈ I is a function a ∶ I −−−→ B with ∀i ∈ I, ai = a(i) and similarly for ai ∈ Bn , i ∈ I.
1.1 The Binary Boole Algebra
is called the support (set) of a. More general, the support of the family ai ∈ Bn , i ∈ I is supp a = {i|i ∈ I, ai ≠ (0,…, 0)}. By definition, the support of ai , i ∈ ∅ is supp a = ∅. Definition 1.4 The modulo 2 summation of the family ai ∈ B, i ∈ I, denoted with Ξ ai , is∶ i∈I { 1, if card(supp a) is odd, Ξ ai = 0, if card(supp a) is even. i∈I By definition Ξ ai = 0.
i∈∅
This summation induces a summation Ξ ai of the families ai ∈ Bn , i ∈ I where i∈I supp a is a finite set. Remark 1.2 We have the following conventions, which are compatible with Definition 1.4 and which will be used throughout this work: • the empty set ∅ is a finite set; • 0 (= card(∅)) is an even number. Remark 1.3 As previously I is a finite set, supp a ⊂ I is also finite and card(supp a) ∈ {0, 1, 2, …}, thus Definition 1.4 makes sense. Notation 1.2
We denote 𝜀i ∈ Bn , i ∈ {1,…, n},
𝜀i = (0,…, 1,…, 0). i
Remark 1.4 The set B is a Boole algebra together with the laws , ⋅, ∪ and also a field together with ⊕, ⋅ . On the other hand Bn is an n-dimensional linear space together with the laws Bn × Bn ∋ (𝜇, 𝜈) → 𝜇 ⊕ 𝜈 ∈ Bn and B × Bn ∋ (𝜁 , 𝜇) → 𝜁 ⋅ 𝜇 ∈ Bn , 𝜇 ⊕ 𝜈 = (𝜇1 ⊕ 𝜈1 ,…, 𝜇n ⊕ 𝜈n ), 𝜁 ⋅ 𝜇 = (𝜁 ⋅ 𝜇1 ,…, 𝜁 ⋅ 𝜇n ).
(1.1) (1.2)
The canonical basis of Bn is given by 𝜀1 ,…, 𝜀n . Definition 1.5 n-tuples.
The elements 𝜇 ∈ Bn are called points, vectors, tuples, or
3
4
1 Boolean Functions
Notation 1.3
Given the points 𝜇 ∈ Bn and 𝜆 ∈ Bn , we use the notation
𝜇 ⊞ 𝜆 = {i|i ∈ {1,…, n}, 𝜇i ≠ 𝜆i }. Theorem 1.1 We have the properties: 𝜇 ⊞ 𝜆 = 𝜆 ⊞ 𝜇,
(1.3)
𝜇 ⊞ 𝜇 = ∅,
(1.4)
𝜇 ⊞ 𝜇 = {1,…, n},
(1.5)
where the negation acts coordinatewise: 𝜇 = (𝜇1 ,…, 𝜇n ), ∀𝜏 ∈ Bn , 𝜇 ⊞ 𝜆 = (𝜏 ⊕ 𝜇) ⊞ (𝜏 ⊕ 𝜆)
(1.6)
and also 𝜇 ⊕ 𝜆 = Ξ 𝜀i .
(1.7)
i∈𝜇⊞𝜆
Proof: For example, (1.5) is a consequence of 𝜇 ⊞ 𝜇 = {i|i ∈ {1,…, n}, 𝜇i ≠ 𝜇i } = {1,…, n}. We prove (1.7): 𝜇⊕𝜆= =
Ξ
i∈{1,…,n}
𝜇i 𝜀 i ⊕ Ξ
Ξ
𝜆i 𝜀 i =
i∈{1,…,n}
i∈{j|j∈{1,…,n},𝜇j ⊕𝜆j =1}
Ξ
i∈{1,…,n}
(𝜇i ⊕ 𝜆i )𝜀i
𝜀i = Ξ 𝜀i i∈𝜇⊞𝜆
◽
1.2 Definition of the Boolean Functions. Examples. Duality Definition 1.6
The functions Φ ∶ Bn −−→ Bp are called Boolean functions.
Remark 1.5 When a function Φ is given, we may specify the notations of the variables that occur during a reasoning under the form of the association Bn ∋ 𝜇 −−→ Φ(𝜇) ∈ Bp . We have already done so at Remark 1.4. Example 1.1 The identity function 1Bn ∶ Bn −−→ Bn is defined in the following way: (1.8) ∀𝜇 ∈ Bn , 1Bn (𝜇) = 𝜇. It has the remarkable property that its set of fixed points coincides with Bn .
1.2 Definition of the Boolean Functions. Examples. Duality
We take a point 𝜇′ ∈ Bp . The constant function Φ ∶ Bn −−→ Bp
Example 1.2 is defined by
∀𝜇 ∈ Bn , Φ(𝜇) = 𝜇′ .
(1.9)
Example 1.3 The projection of Bn on the ith coordinate is the function 𝜋i ∶ Bn → B, i ∈ {1,…, n} defined by ∀𝜇 ∈ Bn , 𝜋i (𝜇) = 𝜇i . Definition 1.7 definition
(1.10)
The dual Φ∗ ∶ Bn −−→ Bp of the function Φ ∶ Bn −−→ Bp is by
∀𝜇 ∈ Bn , Φ∗ (𝜇) = Φ(𝜇), in other words ∀i ∈ Remark 1.6
{1,…, n}, Φ∗i (𝜇1 ,…, 𝜇n )
(1.11) = Φi (𝜇1 ,…, 𝜇n ).
For any 𝜇 ∈ Bn ,
(Φ∗ )∗ (𝜇) = Φ∗ (𝜇) = Φ(𝜇) = Φ(𝜇). Example 1.4 We give some examples of dual functions: (1Bn )∗ = 1Bn , the dual of the constant function equal with 𝜇′ is the constant function equal with 𝜇′ and (𝜋i )∗ = 𝜋i , i ∈ {1,…, n}. In addition, given Υ ∶ B −−→ B and Φ, Ω, Γ ∶ B2 −−→ B, ∀𝜇 ∈ B, Υ(𝜇) = 𝜇, ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = 𝜇1 𝜇2 , ∀𝜇 ∈ B2 , Ω(𝜇1 , 𝜇2 ) = 𝜇1 ∪ 𝜇2 , ∀𝜇 ∈ B2 , Γ(𝜇1 , 𝜇2 ) = 𝜇1 ⊕ 𝜇2 , we have ∀𝜇 ∈ B, Υ∗ (𝜇) = 𝜇 = 𝜇, ∀𝜇 ∈ B2 , Φ∗ (𝜇1 , 𝜇2 ) = Φ(𝜇1 , 𝜇2 ) = 𝜇1 𝜇2 = 𝜇1 ∪ 𝜇2 = 𝜇1 ∪ 𝜇2 , ∀𝜇 ∈ B2 , Ω∗ (𝜇1 , 𝜇2 ) = Ω(𝜇1 , 𝜇2 ) = 𝜇1 ∪ 𝜇2 = 𝜇1 𝜇2 = 𝜇1 𝜇2 , ∀𝜇 ∈ B2 , Γ∗ (𝜇1 , 𝜇2 ) = Γ(𝜇1 , 𝜇2 ) = 𝜇1 ⊕ 𝜇2 = ((𝜇1 ⊕ 1) ⊕ (𝜇2 ⊕ 1)) ⊕ 1 = 𝜇1 ⊕ 𝜇2 ⊕ 1.
5
6
1 Boolean Functions
Remark 1.7 The Cartesian product3 of two functions Φ ∶ Bn −−→ Bp , Ψ ∶ Bm −−→ Bq , Bn ∋ 𝜇 → Φ(𝜇) ∈ Bp , Bm ∋ 𝜆 → Ψ(𝜆) ∈ Bq is either of Φ × Ψ ∶ Bn × Bm −−→ Bp × Bq , Bn × Bm ∋ (𝜇, 𝜆) → (Φ(𝜇), Ψ(𝜆)) ∈ Bp × Bq and Φ × Ψ ∶ Bn+m −−→ Bp+q , Bn+m ∋ (𝜇1 ,…, 𝜇n , 𝜆1 ,…, 𝜆m ) → (Φ1 (𝜇1 ,…, 𝜇n ),…, Φp (𝜇1 ,…, 𝜇n ), Ψ1 (𝜆1 ,…, 𝜆m ),…, Ψq (𝜆1 ,…, 𝜆m )) ∈ Bp+q . Previously we have identified Bn × Bm and Bn+m . We shall NOT use the Cartesian product of functions in the exposure for the sake of its conciseness, but many concepts to follow could be discussed in terms of Cartesian products.
1.3 Iterates Notation 1.4
We denote with N the natural numbers set, N = {0, 1, 2, …}.
Definition 1.8 The k-iterate of Φ ∶ Bn −−→ Bn , where k ∈ N, is the function Φ(k) ∶ Bn −−→ Bn , ⎧𝜇, if k = 0, ⎪ n (k) ∀𝜇 ∈ B , Φ (𝜇) = ⎨(Φ ⚬ … ⚬ Φ)(𝜇), if k ≥ 1 ⎪ ⏟⏞⏞⏞⏟⏞⏞⏞⏟ ⎩ k and we agree that (Φ ⚬ … ⚬ Φ) = Φ. ⏟⏞⏞⏞⏟⏞⏞⏞⏟ 1
Definition 1.9 The 𝜆-iterate of Φ ∶ Bn −−→ Bn , where 𝜆 ∈ Bn , is the function Φ𝜆 ∶ Bn −−→ Bn defined by { 𝜇i , if 𝜆i = 0, ∀𝜇 ∈ Bn , ∀i ∈ {1,…, n}, Φ𝜆i (𝜇) = Φi (𝜇), if 𝜆i = 1. Remark 1.8 Note that for both Definitions 1.8 and 1.9 the dimensions n of the domain and of the codomain of Φ, Bn , must be equal. 3 See also Definitions A.2 and A.3, page 171.
1.3 Iterates
Remark 1.9 The definition of Φ(k) is intuitively related with the composition of a function with itself, these are the “synchronous” iterations of the function Φ. All the coordinates Φ1 ,…, Φn are computed at same the time, synchronously. The definition of Φ𝜆 is intuitively related with the fact that the coordinates of Φ are not computed at the same time (only these coordinates Φi are computed for which 𝜆i = 1), i.e. Φ1 ,…, Φn are computed independently on each other. This gives the “asynchronous” iterations of Φ, when Φ, Φ ⚬ Φ, … are replaced ′ by Φ𝜆 , Φ𝜆 ⚬ Φ𝜆 , … Remark 1.10 Note that: • synchronicity should be considered as a special case of asynchronicity, when all the coordinates Φ1 ,…, Φn are computed simultaneously; • synchronicity means elegance and predictability; • asynchronicity is more realistic in modeling. Theorem 1.2 We have for all k, p ∈ N, 𝜆, 𝜈 ∈ Bn and any 𝜇 ∈ Bn that (Φ(k) )(p) (𝜇) = Φ(kp) (𝜇), 𝜆 𝜈
(1.12)
𝜆𝜈
(1.13)
(Φ ) (𝜇) = Φ (𝜇). Proof: (1.12): Case k = 0, then (Φ(0) )(p) = (1Bn )(p) = 1Bn = Φ(0) = Φ(0p) ; Case p = 0, then (Φ(k) )(0) = 1Bn = Φ(0) = Φ(k0) ; Case k ≥ 1, p ≥ 1, then (Φ(k) )(p) = Φ ⚬ … ⚬ Φ ⚬ … ⚬ Φ ⚬ … ⚬ Φ = Φ ⚬ … ⚬ Φ. ⏟⏞⏞⏞⏟⏞⏞⏞⏟ ⏟⏞⏞⏞⏟⏞⏞⏞⏟ ⏟⏞⏞⏞⏟⏞⏞⏞⏟ k
k
⏟⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏟⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏟
kp
p
(1.13): We take 𝜆, 𝜈, 𝜇 ∈ B and i ∈ {1,…, n} arbitrary and we get: n
⎧𝜇 , if 𝜈 = 0, i ⎪ i 𝜇i , if 𝜈i = 0, = ⎨𝜇i , if 𝜆i = 0 and 𝜈i = 1, = 𝜆 Φi (𝜇), if 𝜈i = 1 ⎪Φi (𝜇), if 𝜆i = 1 and 𝜈i = 1 ⎩ 𝜆𝜈 = Φi (𝜇) {
(Φ𝜆 )𝜈i (𝜇)
◽
7
8
1 Boolean Functions
Theorem 1.3 We can write that (Φ∗ )(k) (𝜇) = (Φ(k) )∗ (𝜇), ∗ 𝜆
(1.14)
𝜆 ∗
(1.15)
(Φ ) (𝜇) = (Φ ) (𝜇), ∗ 𝜆
∗ 𝜆′
𝜆
𝜆′ ∗
((Φ ) ⚬ … ⚬ (Φ ) )(𝜇) = (Φ ⚬ … ⚬ Φ ) (𝜇)
(1.16)
hold for any k ∈ N and 𝜇, 𝜆,…, 𝜆 ∈ B . n
′
Proof: We take 𝜇 ∈ Bn arbitrary, fixed. The first statement is proved by induction on k. For k = 0, we have (Φ∗ )(0) (𝜇) = 1Bn (𝜇) = 𝜇 = 𝜇 = 1Bn (𝜇) = (Φ(0) )∗ (𝜇) thus we suppose that (1.14) is true. We infer (Φ∗ )(k+1) (𝜇) = ((Φ∗ )(k) ⚬ Φ∗ )(𝜇) = ((Φ(k) )∗ ⚬ Φ∗ )(𝜇) = (Φ(k) )∗ (Φ(𝜇)) = Φ(k) (Φ(𝜇)) = Φ(k+1) (𝜇) = (Φ(k+1) )∗ (𝜇). We prove now (1.15) and let 𝜆 ∈ Bn , i ∈ {1,…, n} arbitrary. We infer: { { , if 𝜆 = 0, 𝜇 𝜇i , if 𝜆i = 0, i i (Φ∗ )𝜆i (𝜇) = = = Φ𝜆i (𝜇) Φ∗i (𝜇), if 𝜆i = 1 Φi (𝜇), if 𝜆i = 1 = (Φ𝜆 )∗i (𝜇). In order to prove (1.16), we can write ((Φ∗ )𝜆 ⚬ (Φ∗ )𝜆 )(𝜇) = (Φ∗ )𝜆 ((Φ∗ )𝜆 (𝜇)) = (Φ𝜆 )∗ ((Φ𝜆 )∗ (𝜇)) ′
′
′
= Φ𝜆 (Φ𝜆′ (𝜇)) = Φ𝜆 (Φ𝜆′ (𝜇)) = (Φ𝜆 ⚬ Φ𝜆′ )(𝜇) = (Φ𝜆 ⚬ Φ𝜆 )∗ (𝜇) ′
and the general result is obtained by induction on the number of functions Φ𝜆 which are composed ◽ Theorem 1.4 The function Φ is given. For any 𝜇 ∈ Bn , we have the existence of k ′ ∈ N and k ′′ > k ′ such that ∀k ≥ k ′ , Φ(k) (𝜇) = Φ(k
′′
−k ′ +k)
(𝜇).
(1.17)
Proof: Indeed, the sequence Φ(k) (𝜇), k ∈ N has finitely many values and ∃k ′ ∈ ′ ′′ ◽ N, ∃k ′′ > k ′ such that Φ(k ) (𝜇) = Φ(k ) (𝜇). Property (1.17) is true
1.3 Iterates
Theorem 1.5 Let the function Φ ∶ Bn −−→ Bn . We consider also that 𝜇, 𝜆 ∈ Bn , p, i1 ,…, ip , q, j1 ,…, jq ∈ {1,…, n} are given. (a) If Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ,
(1.18)
Φ𝜆 (𝜇) = 𝜇 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip ;
(1.19)
then
(b) if Φ(𝜇 ⊕ 𝜀j1 ⊕ … ⊕ 𝜀jq ) = 𝜇,
(1.20)
Φ𝜆 (𝜇 ⊕ 𝜀j1 ⊕ … ⊕ 𝜀jq ) = 𝜇 ⊕ 𝜆j1 𝜀j1 ⊕ … ⊕ 𝜆jq 𝜀jq ;
(1.21)
Φ(𝜇 ⊕ 𝜀j1 ⊕ … ⊕ 𝜀jq ) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ,
(1.22)
then
(c) if
then Φ𝜆 (𝜇 ⊕ 𝜀j1 ⊕ … ⊕ 𝜀jq ) = 𝜇 ⊕ 𝜆j1 𝜀j1 ⊕ … ⊕ 𝜆jq 𝜀jq ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆i p 𝜀 i p .
(1.23)
Proof: (a) The hypothesis states the truth of (1.18). For any k ∈ {1,…, n} we have Φ𝜆k (𝜇)
⎧𝜇k , k ∈ {1,…, n}∖{i1 ,…, ip }, ⎪ = ⎨𝜇k , k ∈ {i1 ,…, ip } and 𝜆k = 0, ⎪𝜇 ⊕ 1, k ∈ {i ,…, i } and 𝜆 = 1 1 p k ⎩ k
i.e. (1.19) is true. (b) We have the truth of Eq. (1.20). For any k ∈ {1,…, n} we infer that Φ𝜆k (𝜇
⎧𝜇k , k ∈ {1,…, n}∖{j1 ,…, jq }, ⎪ ⊕ 𝜀 ⊕ … ⊕ 𝜀 ) = ⎨𝜇k ⊕ 1, k ∈ {j1 ,…, jq } and 𝜆k = 0, ⎪𝜇 , k ∈ {j ,…, j } and 𝜆 = 1, 1 q k ⎩ k j1
jq
wherefrom the truth of (1.21) follows.
9
10
1 Boolean Functions
(c) From the truth of (1.22) we infer, ∀k ∈ {1,…, n}, that Φ𝜆k (𝜇 ⊕ 𝜀j1 ⊕ … ⊕ 𝜀jq ) ⎧ ⎪𝜇k , k ∈ {1,…, n}∖({i1 ,…, ip } ∪ {j1 ,…, jq }), ⎪𝜇k , k ∈ {i1 ,…, ip }∖{j1 ,…, jq } and 𝜆k = 0, ⎪ ⎪𝜇k ⊕ 1, k ∈ {i1 ,…, ip }∖{j1 ,…, jq } and 𝜆k = 1, =⎨ ⎪𝜇k ⊕ 1, k ∈ {j1 ,…, jq }∖{i1 ,…, ip } and 𝜆k = 0, ⎪𝜇 , k ∈ {j ,…, j }∖{i ,…, i } and 𝜆 = 1, 1 q 1 p k ⎪ k ⎪𝜇k ⊕ 1, k ∈ {i1 ,…, ip } ∩ {j1 ,…, jq } ⎩ ◽
and this shows the truth of (1.23)
Remark 1.11 Theorem 1.3 has many applications, we show how it can be used in rewriting Theorem 1.4 and we give also a suggestion of using it in rewriting Theorem 1.5. Theorem 1.6 Let 𝜇 ∈ Bn arbitrary. If k ′ ∈ N and k ′′ > k ′ fulfill (1.17), then ∀k ≥ k ′ , Φ∗(k) (𝜇) = Φ∗(k
′′
−k ′ +k)
(𝜇).
Proof: We get ∀k ≥ k ′ , Φ∗(k) (𝜇)
Theorem 1.3
=
Φ(k)∗ (𝜇) = Φ(k) (𝜇) = Φ(k) (𝜇) = Φ(k ′′ −k ′ +k) (𝜇)
= Φ(k ′′ −k ′ +k) (𝜇) = Φ(k
′′
−k ′ +k)∗
(𝜇)
Theorem 1.3
=
Φ∗(k
′′
−k ′ +k)
(𝜇)
◽
Theorem 1.7 For 𝜇, 𝜆 ∈ Bn , p, i1 ,…, ip , q, j1 ,…, jq ∈ {1,…, n}, (i) (1.18) is equivalent with Φ∗ (𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ; (ii) (1.24) implies Φ∗𝜆 (𝜇) = 𝜇 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip . Proof: (i) (1.18) =⇒ (1.24) The computation is straight: (1.18)
Φ∗ (𝜇) = Φ(𝜇) = Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ⊕ (1,…, 1) = (𝜇 ⊕ (1,…, 1)) ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip = 𝜇 ⊕ 𝜀 i 1 ⊕ … ⊕ 𝜀i p and (1.24)=⇒(1.18) is proved similarly.
(1.24)
1.4 State Portraits. Stable and Unstable Coordinates
(ii) We suppose that (1.24) is true, thus (1.18) is true also. Then Theorem 1.5 (a) shows the truth of (1.19) and we can write: Φ∗𝜆 (𝜇)
Theorem 1.3
=
(1.19)
Φ𝜆∗ (𝜇) = Φ𝜆 (𝜇) = Φ𝜆 (𝜇) = 𝜇⊕𝜆i1 𝜀i1 ⊕· · · ⊕𝜆ip 𝜀ip = 𝜇 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip ⊕ (1,…, 1) = 𝜇 ⊕ 𝜆 i 1 𝜀 i 1 ⊕ … ⊕ 𝜆i p 𝜀 i p
◽
1.4 State Portraits. Stable and Unstable Coordinates Remark 1.12 The Boolean functions may be defined: • by a formula, this was made at (1.8), (1.9), (1.10); in Definition 1.7, page 5, as Φ was supposed to be known, the new function Φ∗ was defined by formula (1.11), • by a table, we have done so at Table 1 in Preface, • by a state portrait, if the dimensions of the domain and of the codomain are equal, and this is the topic of the present section. The possibility occurs because a state portrait corresponds to exactly one Boolean function. Remark 1.13 The terminology of “state portrait,” or rather “phase portrait,” is specific to dynamical systems theory and gives the evolution in time of a system. In a binary context, the syntagms “state transition diagram” or “state transition graph” are preferred by many authors. Definition 1.10 A directed graph is an ordered pair G = (V , E), where E ⊂ V × V . The elements of V are called vertices, nodes, or points, and the elements of E are called arrows, directed edges, or directed arcs. Definition 1.11 The state portrait of the function Φ ∶ Bn −−→ Bn is the directed graph GΦ = (VΦ , EΦ ) defined by VΦ = Bn , EΦ = {(𝜇, 𝜇′ )|𝜇, 𝜇′ ∈ Bn , 𝜇 ≠ 𝜇′ and ∃𝜆 ∈ Bn , 𝜇′ = Φ𝜆 (𝜇)}. Remark 1.14 We give without proof the following result. The state portrait GΦ defines the function Γ ∶ VΦ −−→ VΦ by ∀𝜇 ∈ VΦ , ⎧𝜇⊕ Ξ 𝜀i , if {(𝜇′ , 𝜇′′ )|(𝜇′ , 𝜇′′ ) ∈ EΦ , 𝜇′ = 𝜇} ⎪ i∈A0 ∪···∪Ak ⎪ = {(𝜇, 𝜇 ⊕ Ξ 𝜀i ),…, (𝜇, 𝜇 ⊕ Ξ 𝜀i )}, Γ(𝜇) = ⎨ i∈A0 i∈Ak ⎪ ⎪ 𝜇, if {(𝜇′ , 𝜇′′ )|(𝜇′ , 𝜇′′ ) ∈ EΦ , 𝜇′ = 𝜇} = ∅. ⎩ We have Γ = Φ and for each Ω ∶ VΦ −−→ VΦ with Ω ≠ Φ, we get GΦ ≠ GΩ .
11
12
1 Boolean Functions
Remark 1.15 In a state portrait, if an arrow exists from 𝜇 to 𝜇′ and 𝜇′ = Φ𝜆 (𝜇): • we must have 𝜆 ≠ (0,…, 0), otherwise we get 𝜇′ = Φ(0,…,0) (𝜇) = 𝜇, contradiction, • we must have also a coordinate i ∈ {1,…, n} with Φi (𝜇) ≠ 𝜇i , otherwise 𝜇 is a fixed point of Φ and ∀i ∈ {1,…, n}, ∀𝜆 ∈ Bn , { { 𝜇i , if 𝜆i = 0, 𝜇i , if 𝜆i = 0, 𝜇i′ = Φ𝜆i (𝜇) = = = 𝜇i Φi (𝜇), if 𝜆i = 1 𝜇i , if 𝜆i = 1 representing a contradiction too. We use to underline 𝜇i these coordinates of 𝜇 that fulfill Φi (𝜇) ≠ 𝜇i , since this way the drawing is more intuitive. Definition 1.12 Let 𝜇 ∈ Bn . The coordinates 𝜇i , i ∈ {1,…, n} such that Φi (𝜇) ≠ 𝜇i are called unstable, or excited, or enabled and the set of the unstable coordinates of 𝜇 is denoted with Φ𝜇 . The coordinates 𝜇i with Φi (𝜇) = 𝜇i are called stable. 4 Remark 1.16
We obviously have, see Notation 1.3, page 4:
Φ𝜇 = {i|i ∈ {1,…, n}, 𝜇i ≠ Φi (𝜇)} = 𝜇 ⊞ Φ(𝜇). Example 1.5 We have drawn in Figure 1.1 the state portrait of the identity 1B2 ∶ B2 −−→ B2 . All the points 𝜇 ∈ B2 are fixed points of 1B2 , so there is no arrow and all the coordinates 𝜇i are stable.
(0,0)
(1,0)
(0,1)
(1,1)
Figure 1.1 The state portrait of 1B2 .
Vice versa, the only function Φ ∶ B2 −−→ B2 whose state portrait is the one from Figure 1.1, i.e. that fulfills Φ(0, 0) = (0, 0), Φ(1, 0) = (1, 0), Φ(1, 1) = (1, 1), Φ(0, 1) = (0, 1), is the identity 1B2 . Example 1.6 The function Φ ∶ B2 −−→ B2 , ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇1 𝜇2 ) has its state portrait drawn in Figure 1.2. We see that Φ has three fixed points, (0, 0), (1, 0), (1, 1) with no unstable coordinate and no arrow starting from them. As Φ(0, 1) = (1, 0), the point (0, 1) has both coordinates unstable. There are also 22 − 1 = 3 arrows starting from (0, 1), since Φ(1,0) (0, 1) = (1, 1), Φ(0,1) (0, 1) = (0, 0) and Φ(1,1) (0, 1) = (1, 0). 4 Both 𝜇i and i are called coordinates (of 𝜇), but this creates no confusion.
1.4 State Portraits. Stable and Unstable Coordinates
Figure 1.2 The state portrait of Φ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇1 𝜇2 ).
Vice versa, the only function Φ ∶ B2 −−→ B2 with the state portrait drawn in Figure 1.2, i.e. fulfilling Φ(0, 0) = (0, 0), Φ(1, 0) = (1, 0), Φ(1, 1) = (1, 1), Φ(0, 1) = (1, 0) is Φ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇1 𝜇2 ). Example 1.7 Figure 1.3 contains the state portrait of the constant function Φ ∶ B2 −−→ B2 , ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (1, 0). We notice that 22 − 1 = 3 arrows start from (0, 1), since it has two unstable coordinates, 21 − 1 = 1 arrows start from (0, 0), (1, 1), since they have one unstable coordinate and no arrows start (or 20 − 1 = 0 arrows start) from (1, 0), since it has no unstable coordinate, being a fixed point. Figure 1.3 The state portrait of Φ(𝜇1 , 𝜇2 ) = (1, 0).
Vice versa, the only function Φ ∶ B2 −−→ B2 with the state portrait from Figure 1.3 is Φ(𝜇1 , 𝜇2 ) = (1, 0). Example 1.8 The function Φ ∶ B2 −−→ B2 , ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) is characterized by the fact that all 𝜇 ∈ B2 have both coordinates unstable and its state portrait was drawn in Figure 1.4. Figure 1.4 The state portrait of Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ).
The only function with the state portrait drawn in Figure 1.4 is Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ). Example 1.9 We give in Figure 1.5 the state portrait of the dual function of Φ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇1 𝜇2 ), i.e. Ψ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇1 ∪ 𝜇2 ). We see that Figure 1.5 results from Figure 1.2 by complementing all the binary coordinates, while the arrows and the underlined coordinates remain the same.
13
14
1 Boolean Functions
Figure 1.5 The state portrait of Ψ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇1 ∪ 𝜇2 ).
1.5 Modeling the Asynchronous Circuits Example 1.10 In Figure 1.6, we give the example of a circuit with two inputs 𝜔1 , 𝜔2 and three logical gates, whose outputs were denoted with 𝜇1 , 𝜇2 , 𝜇3 . The evolution is supposed to happen with 𝜔1 , 𝜔2 constant; therefore, we get four functions Φ𝜔 ∶ B3 −−→ B3 , 𝜔 ∈ B2 : case 𝜔1 = 0, 𝜔2 = 0 ∶ Φ𝜔 (𝜇1 , 𝜇2 , 𝜇3 ) = (1, 𝜇1 𝜇3 , 𝜇2 ); case 𝜔1 = 1, 𝜔2 = 0 ∶ Φ𝜔 (𝜇1 , 𝜇2 , 𝜇3 ) = (1, 𝜇1 𝜇3 , 1); case 𝜔1 = 0, 𝜔2 = 1 ∶ Φ𝜔 (𝜇1 , 𝜇2 , 𝜇3 ) = (0, 𝜇1 𝜇3 , 𝜇2 ); case 𝜔1 = 1, 𝜔2 = 1 ∶ Φ𝜔 (𝜇1 , 𝜇2 , 𝜇3 ) = (0, 𝜇1 𝜇3 , 1). Figure 1.6 Circuit with three logical gates.
ω1 ω2
μ1
μ2
μ3
In the special case when (𝜔1 , 𝜔2 ) = (1, 1), one can see in Figure 1.7 how the system stabilizes from any initial value of (𝜇1 , 𝜇2 , 𝜇3 ) to (0, 0, 1), which is a fixed point of Φ𝜔 . Figure 1.7 The state portrait of Φ(1,1) (𝜇1 , 𝜇2 , 𝜇3 ) = (0, 𝜇1 𝜇3 , 1).
1.6 Sequences of Sets Definition 1.13 Let Ak ⊂ Bn , k ∈ N a sequence of sets. If k1 ∈ N exists such that ∀k ≥ k1 , Ak = Ak1 , we say that the sequence is convergent and the set A = Ak1 is called the limit of the sequence. We use the notation A = lim Ak . k→∞
1.7 Predecessors and Successors
Example 1.11
A descending sequence
A0 ⊃ A1 ⊃ A2 ⊃ … is convergent and its limit is empty or not. This is analogue somehow with the descending sequences of real numbers that are bounded from below. Example 1.12
Dually, an ascending sequence
A0 ⊂ A1 ⊂ A2 ⊂ … of subsets of Bn is convergent. We have an analogy with the ascending sequences of real numbers that are bounded from above. Remark 1.17 The limit in Example 1.11 coincides with the intersection A0 ∩ A1 ∩ A2 ∩ … and the limit in Example 1.12 coincides with the union A0 ∪ A1 ∪ A2 ∪ …
1.7 Predecessors and Successors Definition 1.14
Let Φ ∶ Bn −−→ Bn and we denote for any 𝜇 ∈ Bn ∶
𝜇− = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , Φ𝜆 (𝜈) = 𝜇}, 𝜇+ = {Φ𝜆 (𝜇)|𝜆 ∈ Bn }, O− (𝜇) = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn ,…, ∃𝜆′ ∈ Bn , (Φ𝜆 ⚬ … ⚬ Φ𝜆 )(𝜈) = 𝜇}, ′
O+ (𝜇) = {(Φ𝜆 ⚬ … ⚬ Φ𝜆 )(𝜇)|𝜆 ∈ Bn ,…, 𝜆′ ∈ Bn }. ′
The points 𝜈 ∈ 𝜇− are called the immediate predecessors of 𝜇, and the points 𝜈 ∈ 𝜇+ are called the immediate successors of 𝜇; the points 𝜈 ∈ O− (𝜇) are the predecessors of 𝜇, and the points 𝜈 ∈ O+ (𝜇) are the successors of 𝜇. If 𝜈 ∈ O− (𝜇), we say that 𝜇 is accessible from 𝜈, and if 𝜈 ∈ O+ (𝜇), we say that 𝜈 is accessible from 𝜇. Remark 1.18 If it will not be clear to which function Φ we refer, we shall use the notations 𝜇Φ− , 𝜇Φ+ , O−Φ (𝜇), O+Φ (𝜇). Remark 1.19 Since Φ(0,…,0) (𝜇) = 𝜇, we infer that 𝜇 ∈ 𝜇− and 𝜇 ∈ 𝜇+ , in particular we have 𝜇− ≠ ∅, 𝜇+ ≠ ∅. On the other hand, 𝜇− ⊂ O− (𝜇), 𝜇+ ⊂ O+ (𝜇). Example 1.13
(a) Φ(𝜇) = 𝜇 =⇒
𝜇 = {𝜇}, +
(b) ∃i ∈ {1,…, n}, Φ(𝜇) = 𝜇 ⊕ 𝜀i =⇒ 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀i },
15
16
1 Boolean Functions
(c) ∃i ∈ {1,…, n}, ∃j ∈ {1,…, n}, Φ(𝜇) = 𝜇 ⊕ 𝜀i ⊕ 𝜀j =⇒ 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀i , 𝜇 ⊕ 𝜀j , 𝜇 ⊕ 𝜀i ⊕ 𝜀j } and the general case is obvious. Theorem 1.8 We have ∀𝜇 ∈ Bn , {𝜇} ∪ Φ−1 (𝜇) ⊂ 𝜇− ,
(1.25)
{𝜇} ∪ Φ−1 (𝜇) ∪ Φ−1 (Φ−1 (𝜇)) ∪ … ⊂ O− (𝜇),
(1.26)
{𝜇} ∪ {Φ(𝜇)} ⊂ 𝜇+ ,
(1.27)
{𝜇} ∪ {Φ(𝜇)} ∪ {Φ(2) (𝜇)} ∪ … ⊂ O+ (𝜇).
(1.28)
Proof: (1.25). Let 𝛿 ∈ {𝜇} ∪ Φ−1 (𝜇) arbitrary. If 𝛿 = 𝜇, then obviously 𝛿 ∈ 𝜇− ; and if 𝛿 ∈ Φ−1 (𝜇), then 𝜆 ∈ Bn exists, 𝜆 = (1,…, 1), with Φ𝜆 (𝛿) = Φ(𝛿) = 𝜇 ◽ i.e. 𝛿 ∈ 𝜇− Theorem 1.9 We have ⋃ ⋃ O− (𝜇) = 𝜇− ∪ 𝜆− ∪ 𝛿− ∪ … , ⋃ − 𝜆∈𝜇 𝛿∈
O+ (𝜇) = 𝜇+ ∪
⋃
(1.29)
𝜆−
𝜆∈𝜇−
𝜆+ ∪
𝜆∈𝜇+
⋃ 𝛿∈
⋃
𝛿+ ∪ …
(1.30)
𝜆+
𝜆∈𝜇+
Proof: (1.29). We denote A0 = 𝜇− , A1 =
⋃ 𝜆∈A0
𝜆− ,…, Ak+1 =
⋃
𝜆− , … and we
𝜆∈Ak
show that A0 ⊂ A1 ⊂ A2 ⊂ …
(1.31)
Indeed, as 𝜇 ∈ 𝜇− , we can write that ⋃ ⋃ 𝜆− ⊃ 𝜆− = A0 , A1 = 𝜆∈𝜇−
A2 =
⋃
𝜆∈A1
𝜆∈{𝜇} (1.32) ⋃
𝜆− ⊃
(1.32)
𝜆− = A1
𝜆∈A0
and (1.31) follows by induction. We are in the situation from Example 1.12, see also Remark 1.17, when some k1 ∈ N exists with Ak1 = Ak1 +1 = Ak1 +2 = · · ·
1.7 Predecessors and Successors
We can write 𝜈 ∈ A0 ⇐⇒ ∃𝜆 ∈ Bn , Φ𝜆 (𝜈) = 𝜇, 𝜈 ∈ A1 ⇐⇒ ∃𝜆 ∈ A0 , 𝜈 ∈ 𝜆− ′ ⇐⇒ ∃𝜆 ∈ Bn , ∃𝜆′ ∈ Bn , Φ𝜆 (𝜆) = 𝜇 and 𝜈 ∈ 𝜆− ′′ n ′ n 𝜆′ ⇐⇒ ∃𝜆 ∈ B , ∃𝜆 ∈ B , Φ (𝜆) = 𝜇 and ∃𝜆′′ ∈ Bn , Φ𝜆 (𝜈) = 𝜆 ′ n ′′ n 𝜆′ 𝜆′′ ⇐⇒ ∃𝜆 ∈ B , ∃𝜆 ∈ B , (Φ ⚬ Φ )(𝜈) = 𝜇 and we can prove by induction on k that 𝜈 ∈ Ak ⇐⇒ ∃𝜆1 ∈ Bn ,…, ∃𝜆k+1 ∈ Bn , (Φ𝜆 ⚬ … ⚬ Φ𝜆 )(𝜈) = 𝜇. 1
k+1
From the definition of O− (𝜇), we get O− (𝜇) = A0 ∪ A1 ∪ A2 ∪ … = Ak1 . Equation (1.30). The proof is similar with the previous one, by replacing 𝜇− with ◽ 𝜇+ , etc Theorem 1.10 The predecessors of the predecessors of 𝜇 are predecessors of 𝜇, and the successors of the successors of 𝜇 are successors of 𝜇 ∶ ∀𝜇′ ∈ O− (𝜇), O− (𝜇′ ) ⊂ O− (𝜇), ∀𝜇′ ∈ O+ (𝜇), O+ (𝜇′ ) ⊂ O+ (𝜇). Proof: In order to prove the first inclusion, let 𝜇 ∈ Bn , 𝜇′ ∈ O− (𝜇), and 𝜈 ∈ O− (𝜇′ ) arbitrary, fixed. Then, 𝜆,…, 𝜆′ , 𝜔,…, 𝜔′ ∈ Bn exist such that ′ ′ ′ (Φ𝜆 ⚬ … ⚬ Φ𝜆 )(𝜇′ ) = 𝜇, (Φ𝜔 ⚬ … ⚬ Φ𝜔 )(𝜈) = 𝜇′ . We infer (Φ𝜆 ⚬ … ⚬ Φ𝜆 ⚬ ′ ◽ Φ𝜔 ⚬ … ⚬ Φ𝜔 )(𝜈) = 𝜇, i.e. 𝜈 ∈ O− (𝜇) Remark 1.20 Let Φ, Ψ ∶ Bn −−→ Bn two functions. A nice question is if the statements Φ = Ψ; ∀𝜇 ∈ Bn , 𝜇Φ− = 𝜇Ψ− ; ∀𝜇 ∈ Bn , 𝜇Φ+ = 𝜇Ψ+ ; ∀𝜇 ∈ Bn , O−Φ (𝜇) = O−Ψ (𝜇); ∀𝜇 ∈ Bn , O+Φ (𝜇) = O+Ψ (𝜇) are equivalent. A partial answer will be given in Remark 2.8, page 32. Theorem 1.11 For any 𝜇 ∈ Bn , we can write −
𝜇Φ∗ = 𝜇Φ− , +
𝜇Φ∗ = 𝜇Φ+ , O−Φ∗ (𝜇) = O−Φ (𝜇), O+Φ∗ (𝜇) = O+Φ (𝜇), where we have used the notations X = {x|x ∈ X}, X ∈ {𝜇Φ− , 𝜇Φ+ , O−Φ (𝜇), O+Φ (𝜇)}.
17
18
1 Boolean Functions
Proof: We prove the first equality: 𝜇 Φ∗ = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , (Φ∗ )𝜆 (𝜈) = 𝜇} −
(1.15)
= {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , (Φ𝜆 )∗ (𝜈) = 𝜇} = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , Φ𝜆 (𝜈) = 𝜇} = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , Φ𝜆 (𝜈) = 𝜇} = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , Φ𝜆 (𝜈) = 𝜇} = 𝜇Φ− .
The last equality is proved like this: O+Φ∗ (𝜇) = {((Φ∗ )𝜆 ⚬ … ⚬ (Φ∗ )𝜆 )(𝜇)|𝜆 ∈ Bn ,…, 𝜆′ ∈ Bn } ′
(1.16)
= {(Φ𝜆 ⚬ … ⚬ Φ𝜆 )∗ (𝜇)|𝜆 ∈ Bn ,…, 𝜆′ ∈ Bn } ′
= {(Φ𝜆 ⚬ … ⚬ Φ𝜆′ )(𝜇)|𝜆 ∈ Bn ,…, 𝜆′ ∈ Bn } = {(Φ𝜆 ⚬ … ⚬ Φ𝜆′ )(𝜇)|𝜆 ∈ Bn ,…, 𝜆′ ∈ Bn } = O+Φ (𝜇)
◽
1.8 Source, Isolated Fixed Point, Transient Point, Sink Definition 1.15 The function Φ ∶ Bn −−→ Bn is given. A point 𝜇 ∈ Bn is called: (a) source: if 𝜇− = {𝜇}, 𝜇+ ≠ {𝜇}; (b) isolated fixed point: if 𝜇− = {𝜇}, 𝜇+ = {𝜇}; (c) transient point: if 𝜇− ≠ {𝜇}, 𝜇+ ≠ {𝜇}; (d) sink: if 𝜇− ≠ {𝜇}, 𝜇+ = {𝜇}.5 Example 1.14 We consider the function from Figure 1.8, where (0, 0, 0), (1, 0, 1) are sources, (1, 0, 0), (1, 1, 0) are isolated fixed points, (0, 0, 1), (0, 1, 1) are transient points and (0, 1, 0), (1, 1, 1) are sinks. For example, we have: (0, 0, 0)− = {(0, 0, 0)}, (0, 0, 0)+ = {(0, 0, 0), (0, 1, 0), (0, 0, 1), (0, 1, 1)}; (1, 0, 0)− = {(1, 0, 0)}, (1, 0, 0)+ = {(1, 0, 0)}; (0, 0, 1)− = {(0, 0, 0), (0, 0, 1)}, (0, 0, 1)+ = {(0, 0, 1), (0, 1, 1)}; (0, 1, 0)− = {(0, 0, 0), (0, 1, 0)}, (0, 1, 0)+ = {(0, 1, 0)}. Remark 1.21 If a function Φ ∶ Bn −−→ Bn is given, any point 𝜇 ∈ Bn is in exactly one of the situations (a)–(d) from Definition 1.15. We see that: 5 In [16], the garden-of-eden states are defined as “states that can arise only as initial states of the system and can never be dynamically generated during the course of the subsequent evolution” and this is equivalent here with 𝜇 − = {𝜇}.
1.9 Translations
Figure 1.8 Example of sources, isolated fixed points, transient points, and sinks.
• the sources and the isolated fixed points, where 𝜇− = {𝜇}, fulfill the property that ∀𝜆 ∈ Bn , (Φ𝜆 )−1 (𝜇) ∈ {∅, {𝜇}}, • the isolated fixed points and the sinks, where 𝜇+ = {𝜇}, satisfy either of ∀𝜆 ∈ Bn , Φ𝜆 (𝜇) = 𝜇 and Φ(𝜇) = 𝜇; in particular, the isolated fixed points are fixed points indeed. −
Remark 1.22 Theorem 1.11 shows that card(𝜇Φ∗ ) = card(𝜇Φ− ) and + card(𝜇Φ∗ ) = card(𝜇Φ+ ), thus, 𝜇 is a source for Φ if and only if 𝜇 is a source for ∗ Φ , 𝜇 is an isolated fixed point for Φ if and only if 𝜇 is… Moreover, Eqs. (1.29) and (1.30) show that 𝜇− = {𝜇} ⇐⇒ O− (𝜇) = {𝜇}, 𝜇+ = {𝜇} ⇐⇒ O+ (𝜇) = {𝜇}. Thus, Definition 1.15 may be expressed similarly by replacing 𝜇− , 𝜇+ with O− (𝜇), O+ (𝜇).
1.9 Translations Notation 1.5 𝜏 ∶ ∀𝜇 ∈ Bn ,
For 𝜏 ∈ Bn , we denote with 𝜃 𝜏 ∶ Bn −−→ Bn the translation with
𝜃 𝜏 (𝜇) = 𝜇 ⊕ 𝜏. We also denote Θn = {𝜃 𝜏 |𝜏 ∈ Bn }. Theorem 1.12 The set Θn is a commutative group relative to the composition of the functions, where: (a) the neuter element is 𝜃 (0,…,0) ; (b) ∀𝜏 ∈ Bn , ∀𝜏 ′ ∈ Bn we have 𝜃 𝜏 ⚬ 𝜃 𝜏 = 𝜃 𝜏⊕𝜏 ; ′
′
(1.33)
(c) ∀𝜏 ∈ B , n
(𝜃 𝜏 )−1 = 𝜃 𝜏 .
(1.34)
19
20
1 Boolean Functions
Proof: The statement (a) is obvious, since ∀𝜇 ∈ Bn , 𝜃 (0,…,0) (𝜇) = 𝜇 ⊕ (0,…, 0) = 𝜇 = 1Bn (𝜇) and 1Bn is the neuter element relative to the composition of the functions. Let now 𝜏, 𝜏 ′ , 𝜇 ∈ Bn arbitrary and fixed. We infer (𝜃 𝜏 ⚬ 𝜃 𝜏 )(𝜇) = 𝜃 𝜏 (𝜃 𝜏 (𝜇)) = 𝜃 𝜏 (𝜇 ⊕ 𝜏 ′ ) = (𝜇 ⊕ 𝜏 ′ ) ⊕ 𝜏 = 𝜇 ⊕ (𝜏 ⊕ 𝜏 ′ ) ′
′
= 𝜃 𝜏⊕𝜏 (𝜇), ′
thus (1.33) is true. If 𝜏 = 𝜏 ′ , then 𝜃 𝜏 ⚬ 𝜃 𝜏 = 𝜃 𝜏⊕𝜏 = 𝜃 (0,…,0) = 1Bn , therefore (1.34) is also true. The commutativity of the group Θn is a consequence of (1.33): 𝜃 𝜏 ⚬ 𝜃 𝜏 = 𝜃 𝜏⊕𝜏 = 𝜃 𝜏 ⊕𝜏 = 𝜃 𝜏 ⚬ 𝜃 𝜏 ′
′
′
′
◽
21
2 Affine Spaces Defined by Two Points The points 𝜇, 𝜆 ∈ Bn define the affine space [𝜇, 𝜆] = {𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆} and i∈A the main reason of introducing it is given by the fact that, for Φ ∶ Bn → Bn , we have 𝜇+ = [𝜇, Φ(𝜇)]. In other words, these spaces give the multiple possibilities of computation of a Boolean function. We have properties like [𝜇, 𝜆] = [𝜆, 𝜇], [𝜇, 𝜇] = {𝜇}, etc. The functions h ∶ Bn → Bn that fulfill h([𝜇, 𝜆]) = [h(𝜇), h(𝜆)] are said to be compatible with the affine structure of Bn . The Hamming distance between 𝜇 and 𝜆 is d(𝜇, 𝜆) = card(𝜇 ⊞ 𝜆). The function h is called Lipschitz if ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn , d(h(𝜇), h(𝜆)) ≤ d(𝜇, 𝜆), where ≤ is the order of the natural numbers. If h is compatible with the affine structure of Bn , then it is Lipschitz. If h is bijective and compatible with the affine structure of Bn , then ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn , d(h(𝜇), h(𝜆)) = d(𝜇, 𝜆).
2.1 Definition Notation 2.1 useful:
The points 𝜇, 𝜆 ∈ Bn are given. The following notations will be
[𝜇, 𝜆] = {𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆}, i∈A
[𝜇, 𝜆) = [𝜇, 𝜆]∖{𝜆}, (𝜇, 𝜆] = [𝜇, 𝜆]∖{𝜇}, (𝜇, 𝜆) = [𝜇, 𝜆]∖{𝜇, 𝜆}.
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
22
2 Affine Spaces Defined by Two Points
If 𝜇 = (0, 0, 1) and 𝜆 = (0, 1, 0), we infer
Example 2.1
[𝜇, 𝜆] = {(0, 0, 1) ⊕ Ξ 𝜀i |A ⊂ {2, 3}} i∈A
= {(0, 0, 1) ⊕ Ξ 𝜀i , (0, 0, 1) ⊕ Ξ 𝜀i , i∈ø
i∈{2}
(0, 0, 1) ⊕ Ξ 𝜀 , (0, 0, 1) ⊕ Ξ 𝜀i } i
i∈{3}
i∈{2,3}
= {(0, 0, 1), (0, 1, 1), (0, 0, 0), (0, 1, 0)}. Remark 2.1 [𝜇, 𝜆] may be interpreted as the set containing the points that are situated “between” 𝜇 and 𝜆, some sort of “closed interval” or “closed line segment” with the ends 𝜇 and 𝜆. Remark 2.2
We get for 𝜇, 𝜆 ∈ Bn ∶
[𝜇, 𝜆) = {𝜇 ⊕ Ξ 𝜀i |A ⊊ 𝜇 ⊞ 𝜆}, i∈A
(𝜇, 𝜆] = {𝜇 ⊕ Ξ 𝜀i |ø ⊊ A ⊂ 𝜇 ⊞ 𝜆}, i∈A
(𝜇, 𝜆) = {𝜇 ⊕ Ξ 𝜀i |ø ⊊ A ⊊ 𝜇 ⊞ 𝜆}. i∈A
Theorem 2.1 For any 𝜇, 𝜆 ∈ Bn , we have that [𝜇, 𝜆] is an affine space. Proof: We prove first of all that the set L = { Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆} i∈A
is a linear space. As the product (1.2)page 3 of the vectors with binary scalars is trivial, it is sufficient to show that L is closed relative to the modulo 2 sum of the vectors (1.1)page 3 . Let 𝜇′ , 𝜇′′ ∈ L, 𝜇′ = Ξ ′ 𝜀i , 𝜇′′ = Ξ ′′ 𝜀i where A′ , A′′ ⊂ i∈A
𝜇 ⊞ 𝜆1 . We infer 𝜇′ ⊕ 𝜇′′ = Ξ ′ 𝜀i ⊕ Ξ ′′ 𝜀i = i∈A
i∈A
i∈A
Ξ 𝜀i
i∈A′ ΔA′′
and we have used the notation Δ for the symmetric difference of the sets. We have A′ ΔA′′ ⊂ 𝜇 ⊞ 𝜆, therefore 𝜇′ ⊕ 𝜇′′ ∈ L follows. We define now the function 𝜑 ∶ [𝜇, 𝜆] × [𝜇, 𝜆] → L, ∀(𝜇′ , 𝜇′′ ) ∈ [𝜇, 𝜆] × [𝜇, 𝜆], 𝜑(𝜇′ , 𝜇′′ ) = 𝜇′ ⊕ 𝜇′′ .
1 The reasoning includes the possibility that 𝜇 = 𝜆, 𝜇 ⊞ 𝜆 = ø, A′ = A′′ = ø, and 𝜇 ′ = 𝜇 ′′ = (0, … , 0) ∈ Bn .
2.2 Properties
𝜑 fulfills the next properties: (i) ∀𝜇′ ∈ [𝜇, 𝜆], ∀𝜇′′ ∈ [𝜇, 𝜆], ∀𝜇′′′ ∈ [𝜇, 𝜆], 𝜑(𝜇′ , 𝜇′′ ) ⊕ 𝜑(𝜇′′ , 𝜇′′′ ) = 𝜑(𝜇′ , 𝜇′′′ ). Indeed, we have 𝜑(𝜇′ , 𝜇′′ ) ⊕ 𝜑(𝜇′′ , 𝜇′′′ ) = 𝜇′ ⊕ 𝜇′′ ⊕ 𝜇′′ ⊕ 𝜇′′′ = 𝜇′ ⊕ 𝜇′′′ = 𝜑(𝜇′ , 𝜇′′′ ). (ii) ∀𝜇′ ∈ [𝜇, 𝜆], ∀𝛿 ∈ L, ∃!𝜇′′ ∈ [𝜇, 𝜆], 𝜑(𝜇′ , 𝜇′′ ) = 𝛿.
(2.1)
We have denoted with ∃! the unique existence. For this, we put 𝜇 , 𝜇 , 𝛿 under the form ′
′′
𝜇 ′ = 𝜇 ⊕ Ξ ′ 𝜀i , i∈A
𝜇 = 𝜇 ⊕ Ξ ′′ 𝜀i , ′′
i∈A
𝛿 = Ξ𝜀
i
i∈B
where A′ , A′′ , B ⊂ 𝜇 ⊞ 𝜆. Equation (2.1) means 𝜑(𝜇′ , 𝜇′′ ) = 𝜇′ ⊕ 𝜇′′ = 𝜇 ⊕ Ξ ′ 𝜀i ⊕ 𝜇 ⊕ Ξ ′′ 𝜀i i∈A
= Ξ ′ 𝜀i ⊕ Ξ ′′ 𝜀i = i∈A
i∈A
i∈A
Ξ 𝜀i = Ξ 𝜀i = 𝛿 ′ ′′
i∈A ΔA
i∈B
i.e. A′ ΔA′′ = B.
(2.2)
In equation (2.2), A , B are known and A is the unknown. The unique solution is given by ′
′′
A′′ = A′ ΔB, therefore the unique 𝜇′′ that fulfills (2.1) is 𝜇′′ = 𝜇 ⊕
Ξ 𝜀i .
i∈A′ ΔB
The theorem is proved Definition 2.1
◽
[𝜇, 𝜆] is called the affine space defined by 𝜇 ∈ Bn and 𝜆 ∈ Bn .
2.2 Properties Theorem 2.2 For any 𝜇, 𝜆, 𝜏 ∈ Bn , the affine space [𝜇, 𝜆] fulfills the following properties: (a) 𝜈 ∈ [𝜇, 𝜆] ⇐⇒ 𝜇 ⊞ 𝜈 ⊂ 𝜇 ⊞ 𝜆, (b) [𝜏 ⊕ 𝜇, 𝜏 ⊕ 𝜆] = 𝜏 ⊕ [𝜇, 𝜆], where we have denoted 𝜏 ⊕ [𝜇, 𝜆] = {𝜏 ⊕ 𝜈|𝜈 ∈ [𝜇, 𝜆]}, (c) [𝜇, 𝜆] = [𝜆, 𝜇],
23
24
2 Affine Spaces Defined by Two Points
(d) [𝜇, 𝜇] = {𝜇}, (e) [𝜇, 𝜆] = [𝜇, 𝜆′ ] ⇒ 𝜆 = 𝜆′ , (f ) 𝜈 ∈ [𝜇, 𝜆] ⇐⇒ [𝜈, 𝜆] ⊂ [𝜇, 𝜆]. Proof: In the proof we shall use several times Theorem 1.1, page 4. (a) =⇒ If 𝜈 ∈ [𝜇, 𝜆], then 𝜈 = 𝜇 ⊕ Ξ 𝜀i , where A ⊂ 𝜇 ⊞ 𝜆. We get 𝜇 ⊕ 𝜈 = i∈A
Ξ 𝜀i = Ξ 𝜀i i.e. A = 𝜇 ⊞ 𝜈 ⊂ 𝜇 ⊞ 𝜆.
i∈𝜇⊞𝜈
i∈A
⇐= If 𝜇 ⊞ 𝜈 ⊂ 𝜇 ⊞ 𝜆, then 𝜈 = 𝜇 ⊕ Ξ 𝜀i ∈ {𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆} = i∈𝜇⊞𝜈
[𝜇, 𝜆]. (b) We can write
i∈A
[𝜏 ⊕ 𝜇, 𝜏 ⊕ 𝜆] = {𝜏 ⊕ 𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜏 ⊕ 𝜇 ⊞ 𝜏 ⊕ 𝜆} i∈A
= {𝜏 ⊕ 𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆} = {𝜏 ⊕ 𝜈|𝜈 ∈ [𝜇, 𝜆]} i∈A
= 𝜏 ⊕ [𝜇, 𝜆]. (c) We have [𝜆, 𝜇] = {𝜆 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆}. i∈A
We prove now the inclusion [𝜇, 𝜆] ⊂ [𝜆, 𝜇] and let 𝜈 ∈ [𝜇, 𝜆] arbitrary. We can write 𝜈 = 𝜇 ⊕ Ξ 𝜀i , i∈A
where A ⊂ 𝜇 ⊞ 𝜆, thus 𝜈 = 𝜆 ⊕ Ξ 𝜀i ⊕ Ξ 𝜀i = 𝜆 ⊕ i∈𝜇⊞𝜆
i∈A
𝜀i .
Ξ
i∈(𝜇⊞𝜆)ΔA
As (𝜇 ⊞ 𝜆)ΔA = (𝜇 ⊞ 𝜆)∖A ⊂ 𝜇 ⊞ 𝜆 = 𝜆 ⊞ 𝜇, we have obtained that 𝜈 ∈ [𝜆, 𝜇]. The inclusion [𝜆, 𝜇] ⊂ [𝜇, 𝜆] is proved similarly. (d) We can write that [𝜇, 𝜇] = {𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜇} i∈A
= {𝜇 ⊕ Ξ 𝜀i |A ⊂ ø} = {𝜇 ⊕ Ξ 𝜀i } = {𝜇}. i∈A
i∈ø
(e) We have 𝜆 ∈ [𝜇, 𝜆′ ] ⇒ 𝜇 ⊞ 𝜆 ⊂ 𝜇 ⊞ 𝜆′ , 𝜆′ ∈ [𝜇, 𝜆] ⇒ 𝜇 ⊞ 𝜆′ ⊂ 𝜇 ⊞ 𝜆 thus 𝜇 ⊞ 𝜆 = 𝜇 ⊞ 𝜆′ and 𝜆 = 𝜇 ⊕ Ξ 𝜀i = 𝜇 ⊕ i∈𝜇⊞𝜆
Ξ 𝜀 i = 𝜆′ .
i∈𝜇⊞𝜆′
2.3 Functions that Are Compatible with the Affine Structure of Bn
(f ) We can write: (a)
(c)
𝜈 ∈ [𝜇, 𝜆] = [𝜆, 𝜇] ⇐⇒ 𝜆 ⊞ 𝜈 ⊂ 𝜆 ⊞ 𝜇 ⇐⇒ {𝜆 ⊕ Ξ 𝜀i |A ⊂ 𝜆 ⊞ 𝜈} ⊂ {𝜆 ⊕ Ξ 𝜀i |A ⊂ 𝜆 ⊞ 𝜇} i∈A
i∈A
(c)
⇐⇒ [𝜆, 𝜈] ⊂ [𝜆, 𝜇] ⇐⇒ [𝜈, 𝜆] ⊂ [𝜇, 𝜆]
◽
Remark 2.3 A special form of the previous statement (b) exists for 𝜏 = (1, … , 1) ∈ Bn , namely [𝜇, 𝜆] = [𝜇, 𝜆] with the notation [𝜇, 𝜆] = {𝜈|𝜈 ∈ [𝜇, 𝜆]}. Theorem 2.3 For any points 𝜇, 𝜈, 𝜆 ∈ Bn with 𝜈 ∈ [𝜇, 𝜆], we have (𝜇 ⊞ 𝜈) ∩ (𝜈 ⊞ 𝜆) = ø,
(2.3)
(𝜇 ⊞ 𝜈) ∪ (𝜈 ⊞ 𝜆) = 𝜇 ⊞ 𝜆.
(2.4)
Proof: We can write, using Theorem 2.2: [𝜇, 𝜆] = {𝜇 ⊕ Ξ 𝜀i |H ⊂ 𝜇 ⊞ 𝜆} = {𝜆 ⊕ Ξ 𝜀i |H ⊂ 𝜇 ⊞ 𝜆}, i∈H
i∈H
𝜈 = 𝜇 ⊕ Ξ 𝜀i = 𝜆 ⊕ Ξ 𝜀i , i∈𝜇⊞𝜈
i∈𝜈⊞𝜆
where 𝜇 ⊞ 𝜈, 𝜈 ⊞ 𝜆 ⊂ 𝜇 ⊞ 𝜆. We prove (2.3) by supposing against all reason the existence of an i ∈ (𝜇 ⊞ 𝜈) ∩ (𝜈 ⊞ 𝜆), and this implies 𝜇i ⊕ 𝜈i = 𝜆i ⊕ 𝜈i = 1. We infer 𝜇i ⊕ 𝜆i = 0, hence i ∉ 𝜇 ⊞ 𝜆, representing a contradiction with the fact that 𝜇 ⊞ 𝜈, 𝜈 ⊞ 𝜆 ⊂ 𝜇 ⊞ 𝜆. We prove (2.4). The inclusion (𝜇 ⊞ 𝜈) ∪ (𝜈 ⊞ 𝜆) ⊂ 𝜇 ⊞ 𝜆 results from 𝜇 ⊞ 𝜈 ⊂ 𝜇 ⊞ 𝜆 and 𝜈 ⊞ 𝜆 ⊂ 𝜇 ⊞ 𝜆, so let us prove the inclusion 𝜇 ⊞ 𝜆 ⊂ (𝜇 ⊞ 𝜈) ∪ (𝜈 ⊞ 𝜆). For this, we take an arbitrary i ∈ 𝜇 ⊞ 𝜆, i.e. 𝜇i ⊕ 𝜆i = 1. Two possibilities exist. If 𝜇i = 𝜈i , then 𝜈i ⊕ 𝜆i = 1 and i ∈ 𝜈 ⊞ 𝜆 ⊂ (𝜇 ⊞ 𝜈) ∪ (𝜈 ⊞ 𝜆). ◽ If 𝜇i ≠ 𝜈i , then i ∈ 𝜇 ⊞ 𝜈 ⊂ (𝜇 ⊞ 𝜈) ∪ (𝜈 ⊞ 𝜆)
2.3 Functions that Are Compatible with the Affine Structure of Bn Definition 2.2 ∀𝜆 ∈ Bn ,
A function h ∶ Bn → Bn with the property that ∀𝜇 ∈ Bn ,
h([𝜇, 𝜆]) = [h(𝜇), h(𝜆)]
(2.5)
25
26
2 Affine Spaces Defined by Two Points
is said to be compatible with the affine structure of Bn . The set of the functions that are compatible with the affine structure of Bn is denoted by Af (Bn ). Theorem 2.4 The tuples a, 𝜏 ∈ Bn are given and we define h ∶ Bn → Bn by ∀𝜇 ∈ Bn , h(𝜇) =
Ξ
i∈{1,…,n}
ai 𝜇i 𝜀i ⊕ 𝜏.
(2.6)
Then h ∈ Af (Bn ). Proof: We notice first that h has the property: for any 𝜇 ∈ Bn , 𝜆 ∈ Bn , h(𝜇 ⊕ 𝜆) = =
Ξ
ai (𝜇i ⊕ 𝜆i )𝜀i ⊕ 𝜏
Ξ
a i 𝜇i 𝜀 i ⊕ 𝜏 ⊕
i∈{1,…,n} i∈{1,…,n}
Ξ
i∈{1,…,n}
ai 𝜆 i 𝜀 i ⊕ 𝜏 ⊕ 𝜏
= h(𝜇) ⊕ h(𝜆) ⊕ 𝜏.
(2.7)
On the other hand, for a better handling of the following computations, we use the notation supp a = {i|i ∈ {1, … , n}, ai = 1}, thus for any A ⊂ {1, … , n} we get h( Ξ 𝜀i ) = i∈A
Ξ
ai 𝜀 i ⊕ 𝜏 =
i∈{1,…,n}∩A
Ξ
𝜀i ⊕ 𝜏.
i∈supp a∩A
Let us take now 𝜇 ∈ Bn , 𝜆 ∈ Bn arbitrary, fixed. We can write: h(𝜇) ⊞ h(𝜆) = {i|i ∈ {1, … , n}, hi (𝜇) ≠ hi (𝜆)} = {i|i ∈ {1, … , n}, ai 𝜇i ⊕ 𝜏i ≠ ai 𝜆i ⊕ 𝜏i } = {i|i ∈ {1, … , n}, ai 𝜇i ≠ ai 𝜆i } = {i|i ∈ {1, … , n}, ai = 1 and 𝜇i ≠ 𝜆i } = supp a ∩ (𝜇 ⊞ 𝜆).
(2.8)
We infer: h([𝜇, 𝜆]) = h({𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆}) = {h(𝜇 ⊕ Ξ 𝜀i )|A ⊂ 𝜇 ⊞ 𝜆} i∈A
i∈A
(2.7)
= {h(𝜇) ⊕ h( Ξ 𝜀i ) ⊕ 𝜏|A ⊂ 𝜇 ⊞ 𝜆} i∈A
= {h(𝜇) ⊕
Ξ
𝜀i ⊕ 𝜏 ⊕ 𝜏|A ⊂ 𝜇 ⊞ 𝜆}
i∈supp a∩A
= {h(𝜇) ⊕ Ξ 𝜀i |H ⊂ supp a ∩ (𝜇 ⊞ 𝜆)} i∈H
(2.8)
= {h(𝜇) ⊕ Ξ 𝜀i |H ⊂ h(𝜇) ⊞ h(𝜆)} = [h(𝜇), h(𝜆)] i∈H
◽
2.3 Functions that Are Compatible with the Affine Structure of Bn
Theorem 2.5 We denote with 𝜎 ∶ {1, … , n} → {1, … , n} a bijective function. Then h ∶ Bn → Bn defined by ∀𝜇 ∈ Bn , h(𝜇) =
Ξ
i∈{1,…,n}
𝜇𝜎(i) 𝜀i
is compatible with the affine structure of Bn . Proof: We notice first of all the additivity of h ∶ ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn , h(𝜇 ⊕ 𝜆) = h(𝜇) ⊕ h(𝜆). Let us fix 𝜇, 𝜆, arbitrary. We obtain: h(𝜇) ⊞ h(𝜆) = {i|i ∈ {1, … , n}, hi (𝜇) ≠ hi (𝜆)} = {i|i ∈ {1, … , n}, 𝜇𝜎(i) ≠ 𝜆𝜎(i) } = {𝜎 −1 (i)|i ∈ {1, … , n}, 𝜇i ≠ 𝜆i } = 𝜎 −1 ({i|i ∈ {1, … , n}, 𝜇i ≠ 𝜆i }) = 𝜎 −1 (𝜇 ⊞ 𝜆). We conclude: h([𝜇, 𝜆]) = h({𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆}) = {h(𝜇 ⊕ Ξ 𝜀i )|A ⊂ 𝜇 ⊞ 𝜆} i∈A
i∈A
= {h(𝜇) ⊕ Ξ h(𝜀i )|A ⊂ 𝜇 ⊞ 𝜆} = {h(𝜇) ⊕ Ξ 𝜀𝜎(i) |A ⊂ 𝜇 ⊞ 𝜆} i∈A
= {h(𝜇) ⊕ = {h(𝜇) ⊕
i∈A
Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆} −1
i∈𝜎 (A)
Ξ 𝜀i |𝜎 −1 (A) ⊂ 𝜎 −1 (𝜇 ⊞ 𝜆)}
i∈𝜎 −1 (A)
= {h(𝜇) ⊕ Ξ 𝜀i |H ⊂ h(𝜇) ⊞ h(𝜆)} = [h(𝜇), h(𝜆)] i∈H
◽
Example 2.2 The identity 1Bn ∶ Bn → Bn is compatible with the affine structure of Bn . It represents the special case of (2.6) when a1 = … = an = 1 and 𝜏1 = … = 𝜏n = 0. Example 2.3 The translation 𝜃 𝜏 ∶ Bn → Bn , 𝜏 ∈ Bn fulfills 𝜃 𝜏 ∈ Af (Bn ). It is the special case of (2.6) when a1 = … = an = 1. Example 2.4 The constant function h ∶ Bn → Bn equal with 𝜏 ∈ Bn is compatible with the affine structure of Bn . This is the special case of (2.6) when a1 = … = an = 0. Example 2.5 The function h ∶ B3 → B3 defined by h(𝜇1 , 𝜇2 , 𝜇3 ) = (0, 𝜇2 ⊕ 𝜇3 , 𝜇2 ⊕ 𝜇3 ) does not belong to Af (B3 ) (to be compared with (2.6)). For this, we take 𝜇 = (0, 0, 0), 𝜆 = (0, 1, 1) and we see that: [(0, 0, 0), (0, 1, 1)] = {(0, 0, 0), (0, 1, 0), (0, 0, 1), (0, 1, 1)}, h([(0, 0, 0), (0, 1, 1)]) = {(0, 0, 0), (0, 1, 1)}, [h(0, 0, 0), h(0, 1, 1)] = [(0, 0, 0), (0, 0, 0)] = {(0, 0, 0)}.
27
28
2 Affine Spaces Defined by Two Points
Remark 2.4 If h, g ∈ Af (Bn ), then h ⚬ g ∈ Af (Bn ), meaning that Af (Bn ) is a unitary semigroup relative to the composition of the functions. Theorem 2.6 If h is bijective and h ∈ Af (Bn ), then ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn , h((𝜇, 𝜆)) = (h(𝜇), h(𝜆)). Proof: Let 𝜇 ∈ Bn and 𝜆 ∈ Bn arbitrary, for which (2.5) is true, thus h((𝜇, 𝜆)) ⊂ [h(𝜇), h(𝜆)]. The statement of the theorem is false if 𝜔 ∈ (𝜇, 𝜆) exists such that h(𝜔) = h(𝜇) or h(𝜔) = h(𝜆) holds. In the first case, for example, the fact that 𝜔 ≠ 𝜇 and the bijectivity of h give a contradiction. ◽ Theorem 2.7 If h is bijective and h ∈ Af (Bn ), then h−1 ∈ Af (Bn ). Proof: We fix 𝜇 ∈ Bn , 𝜆 ∈ Bn arbitrary. We can write [𝜇, 𝜆] = [h(h−1 (𝜇)), h(h−1 (𝜆))] = h([h−1 (𝜇), h−1 (𝜆)]), thus h−1 ([𝜇, 𝜆]) = [h−1 (𝜇), h−1 (𝜆)]
◽
2.4 The Hamming Distance. Lipschitz Functions Definition 2.3
We define d ∶ Bn × Bn → {0, 1, … , n} by ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn ,
d(𝜇, 𝜆) = card(𝜇 ⊞ 𝜆). d is called the Hamming distance between 𝜇 and 𝜆. Remark 2.5
For any 𝜏 ∈ Bn , we can write that
d(𝜏 ⊕ 𝜇, 𝜏 ⊕ 𝜆) = card(𝜏 ⊕ 𝜇 ⊞ 𝜏 ⊕ 𝜆) = card(𝜇 ⊞ 𝜆) = d(𝜇, 𝜆). In particular, 𝜏 = (1, … , 1) gives d(𝜇, 𝜆) = d(𝜇, 𝜆). Theorem 2.8 For any 𝜇 ∈ Bn , 𝜆 ∈ Bn , we have card([𝜇, 𝜆]) = 2d(𝜇,𝜆) . Proof: We infer for arbitrary 𝜇, 𝜆∶ card([𝜇, 𝜆]) = card({𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆}) i∈A
= card({A|A ⊂ 𝜇 ⊞ 𝜆}) = 2card(𝜇⊞𝜆) = 2d(𝜇,𝜆)
◽
2.4 The Hamming Distance. Lipschitz Functions
Definition 2.4 ∀𝜆 ∈ Bn ,
The function h ∶ Bn → Bn is called Lipschitz if ∀𝜇 ∈ Bn ,
d(h(𝜇), h(𝜆)) ≤ d(𝜇, 𝜆)
(2.9)
is true, where ≤ is the inequality of the natural numbers. Example 2.6 Let a, 𝜏 ∈ Bn and the function h ∶ Bn → Bn defined by ∀𝜇 ∈ Bn , h(𝜇) = Ξ ai 𝜇i 𝜀i ⊕ 𝜏. We have i∈{1,…,n}
(2.8)
d(h(𝜇), h(𝜆)) = card(h(𝜇) ⊞ h(𝜆)) = card(supp a ∩ (𝜇 ⊞ 𝜆)) ≤ card(𝜇 ⊞ 𝜆) = d(𝜇, 𝜆), i.e. h is Lipschitz. The special cases when h is the identity, the translation with 𝜏 and the constant function equal with 𝜏 are Lipschitz too. Theorem 2.9 We suppose that h ∈ Af (Bn ). (a) h is Lipschitz; (b) if in addition h is bijective, then ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn , d(𝜇, 𝜆) = d(h(𝜇), h(𝜆)).
(2.10)
Proof: Let 𝜇 ∈ Bn , 𝜆 ∈ Bn arbitrary. (a) We have card([𝜇, 𝜆]) ≥ card(h([𝜇, 𝜆])).
(2.11)
We infer 2d(𝜇,𝜆)
Theorem 2.8
=
(2.11)
card([𝜇, 𝜆]) ≥ card(h([𝜇, 𝜆]))
(2.5)
= card([h(𝜇), h(𝜆)])
Theorem 2.8
=
2d(h(𝜇),h(𝜆)) ,
thus (2.9) is true. (b) The bijectivity of h makes (2.11) be replaced by card([𝜇, 𝜆]) = card(h([𝜇, 𝜆])), thus 2d(𝜇,𝜆) = card([𝜇, 𝜆]) = card(h([𝜇, 𝜆])) = card([h(𝜇), h(𝜆)]) = 2d(h(𝜇),h(𝜆)) . We get the truth of (2.10)
◽
Example 2.7 If h = 𝜃 𝜏 (the translation with 𝜏 ∈ Bn ), then (2.10) is satisfied, see Remark 2.5, page 28.
29
30
2 Affine Spaces Defined by Two Points
Theorem 2.10 Let h ∶ Bn → Bn bijective and Lipschitz. For any 𝜇 ∈ Bn and any k, i1 , … , ik ∈ {1, … , n}, we have the existence of ih1 , … , ihk ∈ {1, … , n} with h
h
h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik ) = h(𝜇) ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik . Proof: We fix 𝜇 arbitrary and we use the induction on k. We take k = 1 first. From d(h(𝜇), h(𝜇 ⊕ 𝜀i1 )) ≥ 1 since h(𝜇) ≠ h(𝜇 ⊕ 𝜀i1 ) and d(h(𝜇), h(𝜇 ⊕ 𝜀i1 )) ≤ d(𝜇, 𝜇 ⊕ 𝜀i1 ) = 1, we get that d(h(𝜇), h(𝜇 ⊕ 𝜀i1 )) = 1, i.e. ih1 ∈ {1, … , n} exists with h(𝜇 ⊕ 𝜀i1 ) = h h(𝜇) ⊕ 𝜀i1 . We suppose that the statement is true for k − 1 and we prove it for k. From d(h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ), h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ⊕ 𝜀ik )) ≥ 1 since h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ) ≠ h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ⊕ 𝜀ik ) and d(h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ), h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ⊕ 𝜀ik )) ≤ d(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 , 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ⊕ 𝜀ik ) = 1 we infer that d(h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ), h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ⊕ 𝜀ik )) = 1, i.e. ihk ∈ {1, … , n} exists such that h
h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ⊕ 𝜀ik ) = h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ) ⊕ 𝜀ik h
h
h
= h(𝜇) ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−1 ⊕ 𝜀ik . The indexes ih1 , … , ihk are distinct otherwise, without loosing the generality, we get h
h
h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik ) = h(𝜇) ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−2 = h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik−2 ), contradiction with the bijectivity of h Corollary 2.1 ∀𝜆 ∈ Bn ,
◽
If h ∶ Bn → Bn is bijective and Lipschitz, then ∀𝜇 ∈ Bn ,
d(h(𝜇), h(𝜆)) = d(𝜇, 𝜆).
(2.12)
Proof: We take 𝜇, 𝜆 ∈ Bn arbitrary, fixed. If 𝜇 = 𝜆, then (2.12) is true under the form d(h(𝜇), h(𝜇)) = 0 = d(𝜇, 𝜇),
2.5 Affine Spaces of Successors
so that we can suppose from now that 𝜇 ≠ 𝜆. Let k, i1 , … , ik ∈ {1, … , n} with the property that 𝜆 = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik . We infer from Theorem 2.10 the existence of ih1 , … , ihk ∈ {1, … , n} with h
h
h(𝜆) = h(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik ) = h(𝜇) ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik and we can write h
h
d(h(𝜇), h(𝜆)) = d(h(𝜇), h(𝜇) ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik ) = k = d(𝜇, 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik ) = d(𝜇, 𝜆)
◽
2.5 Affine Spaces of Successors Theorem 2.11 Let Φ ∶ Bn −−→ Bn . For any 𝜇 ∈ Bn , (a) the following equivalence holds: 𝜇+ = {𝜇} ⇐⇒ Φ(𝜇) = 𝜇 ⇐⇒ O+ (𝜇) = {𝜇}; (b) we have 𝜇+ = [𝜇, Φ(𝜇)].
(2.13)
Proof: (a) We refer to the first equivalence. ⇒ If 𝜇+ = {𝜇}, then ∀𝜆 ∈ Bn , Φ𝜆 (𝜇) = 𝜇, thus Φ(1,…,1) (𝜇) = Φ(𝜇) = 𝜇. ⇐ We suppose that Φ(𝜇) = 𝜇. Then ∀𝜆 ∈ Bn , ∀i ∈ {1, … , n}, { 𝜇i , if 𝜆i = 0, = 𝜇i . Φ𝜆i (𝜇) = Φi (𝜇), if 𝜆i = 1 (b) For any 𝜆 ∈ Bn and any i ∈ {1, … , n}, { 𝜇i , if 𝜆i = 0, 𝜆 = 𝜇i ⊕ 𝜆i (𝜇i ⊕ Φi (𝜇)), Φi (𝜇) = Φi (𝜇), if 𝜆i = 1 thus Φ𝜆 (𝜇) = =
Ξ
Φ𝜆i (𝜇)𝜀i =
Ξ
𝜇i 𝜀 i ⊕
i∈{1,…,n}
i∈{1,…,n}
=𝜇⊕
Ξ
Ξ
(𝜇i ⊕ 𝜆i (𝜇i ⊕ Φi (𝜇)))𝜀i
i∈{1,…,n}
Ξ
𝜆i (𝜇i ⊕ Φi (𝜇))𝜀i
i∈{1,…,n}
𝜆i (𝜇i ⊕ Φi (𝜇))𝜀i .
i∈{1,…,n}
31
32
2 Affine Spaces Defined by Two Points
We obtain: 𝜇+ = {Φ𝜆 (𝜇)|𝜆 ∈ Bn } = {𝜇 ⊕ = {𝜇 ⊕
Ξ
i∈{1,…,n}
Ξ
i∈{1,…,n}∩{j|j∈{1,…,n},𝜇j ⊕Φj (𝜇)=1}
= {𝜇 ⊕ Ξ 𝜆i 𝜀i |𝜆 ∈ Bn} = {𝜇 ⊕ i∈Φ𝜇
= {𝜇 ⊕
𝜆i (𝜇i ⊕ Φi (𝜇))𝜀i |𝜆 ∈ Bn } 𝜆i 𝜀i |𝜆 ∈ Bn } Ξ
i∈{j|j∈{1,…,n},𝜆j =1}∩Φ𝜇
𝜀i |𝜆 ∈ Bn}
Ξ 𝜀i |A ⊂ {1, … , n}} = {𝜇 ⊕ Ξ 𝜀i |B ⊂ Φ𝜇 }
i∈A∩Φ𝜇
i∈B
= [𝜇, Φ(𝜇)]. We have used the fact that when 𝜆 runs in Bn , the set A = {j|j ∈ {1, … , n}, 𝜆j = 1} runs in the subsets of {1, … , n} and the set B = A ∩ Φ𝜇 runs ◽ in the set of the subsets of Φ𝜇 Remark 2.6 The three statements of Theorem 2.11(a) are also equivalent with + the statements 𝜇Φ∗ = {𝜇}, Φ∗ (𝜇) = 𝜇, O+Φ∗ (𝜇) = {𝜇}. Remark 2.7 The statement of Theorem 2.11(b), together with Theorem 1.11, page 17 give: +
[𝜇, Φ(𝜇)] = 𝜇Φ+ = 𝜇Φ∗ = [𝜇, Φ∗ (𝜇)]. Remark 2.8 Given Ψ ∶ Bn −−→ Bn , the statements Φ = Ψ and ∀𝜇 ∈ Bn , 𝜇Φ+ = 𝜇Ψ+ are equivalent, from (2.13) and Theorem 2.2 (e), page 23. Remark 2.9 Let Φ ∶ Bn −−→ Bn now and the function h ∶ Bn −−→ Bn , which is compatible with the affine structure of Bn . For any 𝜇 ∈ Bn , we have h(𝜇+ )
Theorem 2.11
=
h([𝜇, Φ(𝜇)]) = [h(𝜇), h(Φ(𝜇))].
Example 2.8 In Figure 2.1, we notice the existence of three fixed points (1, 0), (0, 1), (1, 1) ∈ [(0, 0), Φ(0, 0)] = B2 . Figure 2.1 [(0, 0), Φ(0, 0)] contains three fixed points of Φ ∶ (1, 0), (0, 1) and (1, 1).
2.5 Affine Spaces of Successors
By the use of (2.13), Eq. (1.30)page 16 becomes: ⋃ ⋃ O+ (𝜇) = [𝜇, Φ(𝜇)] ∪ [𝜆, Φ(𝜆)] ∪ [𝛿, Φ(𝛿)] ∪ … ⋃ 𝜆∈[𝜇,Φ(𝜇)]
Remark 2.10
𝛿∈
[𝜆,Φ(𝜆)]
𝜆∈[𝜇,Φ(𝜇)]
33
35
3 Morphisms The category As whose objects are the functions Φ ∶ Bn → Bn is introduced in the first Appendix, where we show that it has finite products, and the morphisms that we work with belong, in fact, to that category. The morphisms from Φ ∶ Bn → Bn to Ψ ∶ Bn → Bn are couples of functions such that a diagram is commutative. The existence of a morphism from Φ to Ψ shows that Ψ behaves similarly with Φ. The composition of morphisms is a morphism. The translations are special cases of morphisms. Defining the symmetry relative to translations allows, as an application, revisiting duality. We present in this context how the fixed points, the predecessors and the successors are transferred from Φ to Ψ in the presence of a morphism.
3.1 Definition Definition 3.1 We consider the functions Φ, Ψ ∶ Bn → Bn . If h, h′ ∶ Bn → Bn exist such that ∀𝜈 ∈ Bn , the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Ψh
′ (𝜈)
Bn −−→ Bn is commutative, then we denote (h, h′ ) ∶ Φ → Ψ and we say that the morphism (h, h′ ) is defined, from Φ to Ψ. If h, h′ are both bijections, then (h, h′ ) is called an isomorphism from Φ to Ψ. An isomorphism from Φ to Φ is called automorphism. Notation 3.1 The sets of morphisms from Φ to Ψ, of isomorphisms from Φ to Ψ and of automorphisms of Φ are denoted by Hom(Φ, Ψ), Iso(Φ, Ψ) and Aut(Φ).
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
36
3 Morphisms
Remark 3.1 The existence of a morphism from Φ to Ψ shows that Ψ behaves similarly with Φ, therefore we expect that there are properties of Φ which are transferred under some form to Ψ. Remark 3.2 Here are some ways of generalizing the previous definition that we shall NOT use in the following: • we can suppose the existence of three functions h, h′ , h′′ ∶ Bn → Bn (instead of two) such that ∀𝜈 ∈ Bn , the diagram Φ𝜈
Bn −−→ Bn h↓ ↓ h′′ Ψh
′ (𝜈)
Bn −−→ Bn commutes; • we can suppose that Φ ∶ Bn → Bn , Ψ ∶ Bm → Bm , and h, h′ ∶ Bn → Bm (see Appendix A); • we can have Φ ∶ Bm × Bn → Bn (the existence of an “input” 𝜔 ∈ Bm in addition to the “state” 𝜇 ∈ Bn , if Φ = Φ(𝜔, 𝜇)). Theorem 3.1 For the functions Φ, Ψ ∶ Bn → Bn , we have (h, h′ ) ∈ Hom(Φ, Ψ) ⇐⇒ (h∗ , h′ ) ∈ Hom(Φ∗ , Ψ∗ ). Proof: =⇒ Let (h, h′ ) ∈ Hom(Φ, Ψ) and 𝜇, 𝜈 ∈ Bn arbitrary. We can write, with the notation 𝛿 = 𝜇 ∶ h∗ (Φ∗𝜈 (𝜇)) = h(Φ𝜈∗ (𝛿)) = h(Φ𝜈 (𝛿)) = Ψh′ (𝜈) (h(𝛿)) = Ψh′ (𝜈) (h(𝛿)) ′
′
′
= Ψh (𝜈)∗ (h(𝛿)) = Ψ∗h (𝜈) (h∗ (𝛿)) = Ψ∗h (𝜈) (h∗ (𝜇)). ⇐= We take (h∗ , h′ ) ∈ Hom(Φ∗ , Ψ∗ ) and 𝜇, 𝜈 ∈ Bn arbitrary. We have, with the notation 𝛿 = 𝜇 ∶ h(Φ𝜈 (𝜇)) = h(Φ𝜈 (𝜇)) = h∗ (Φ𝜈 (𝛿)) = h∗ (Φ𝜈∗ (𝛿)) = h∗ (Φ∗𝜈 (𝛿)) ′
= Ψ∗h′ (𝜈) (h∗ (𝛿)) = Ψh′ (𝜈)∗ (h(𝛿)) = Ψh′ (𝜈) (h(𝜇)) = Ψh (𝜈) (h(𝜇))
3.2 Examples Example 3.1
We have the automorphism (1Bn , 1Bn ) ∶ Φ −−→ Φ.
◽
3.2 Examples
Example 3.2 For Ψ, h ∶ Bn −−→ Bn arbitrary and h′ ∶ Bn −−→ Bn defined by ∀𝜇 ∈ Bn , h′ (𝜇) = (0, … , 0), we have that (h, h′ ) ∶ 1Bn −−→ Ψ is a morphism, since ∀𝜇 ∈ Bn , ∀𝜈 ∈ Bn , Ψh (𝜈) (h(𝜇)) = Ψ(0,…,0) (h(𝜇)) = h(𝜇) = h((1Bn )𝜈 (𝜇)). ′
Example 3.3 Let 𝜇′ ∈ Bn fixed, Φ, Ψ ∶ Bn −−→ Bn such that Ψ(𝜇′ ) = 𝜇′ , h ∶ Bn −−→ Bn defined by ∀𝜇 ∈ Bn , h(𝜇) = 𝜇′ and h′ ∶ Bn −−→ Bn arbitrary. We have the morphism (h, h′ ) ∶ Φ −−→ Ψ since ∀𝜇 ∈ Bn , ∀𝜈 ∈ Bn , Ψh (𝜈) (h(𝜇)) = Ψh (𝜈) (𝜇′ ) = 𝜇′ = h(Φ𝜈 (𝜇)). ′
′
Example 3.4 We suppose that 𝜇′ ∈ Bn is fixed, Φ, Ψ ∶ Bn −−→ Bn are arbitrary, h ∶ Bn −−→ Bn is the constant function ∀𝜇 ∈ Bn , h(𝜇) = 𝜇′ , and h′ ∶ Bn −−→ Bn is the null function ∀𝜈 ∈ Bn , h′ (𝜈) = (0, … , 0). Then (h, h′ ) ∈ Hom(Φ, Ψ) ∶ ∀𝜇 ∈ Bn , ∀𝜈 ∈ Bn , Ψh (𝜈) (h(𝜇)) = Ψ(0,…,0) (𝜇′ ) = 𝜇′ = h(Φ𝜈 (𝜇)). ′
Example 3.5
The functions Φ, Ψ ∶ B2 −−→ B2 that are defined by ∀𝜇 ∈ B2 ,
Φ(𝜇) = (𝜇1 ∪ 𝜇2 , 𝜇2 ), Ψ(𝜇) = (𝜇1 ∪ 𝜇2 , 𝜇1 ∪ 𝜇2 ) have their state portraits drawn in Figures 3.1 and 3.2. For h, h′ ∶ B2 −−→ B2 given by ∀𝜇 ∈ B2 , h(𝜇) = 𝜇 and h′ (𝜇) = (𝜇1 , 0) we have that (h, h′ ) ∶ Φ −−→ Ψ is a morphism, since ∀𝜇 ∈ B2 , ∀𝜈 ∈ B2 , (h ⚬Φ𝜈 )(𝜇) = (𝜈1 𝜇1 ∪ 𝜈1 (𝜇1 ∪ 𝜇2 ), 𝜇2 ) = Ψ(𝜈1 ,0) (𝜇) = (Ψh (𝜈) ⚬h)(𝜇). ′
Remark 3.3 We infer from Example 3.1 that Aut(Φ) ≠ ∅ and Hom(Φ, Ψ), Iso(Φ, Ψ) may be empty. Figure 3.1 The function Φ(𝜇) = (𝜇1 ∪ 𝜇2 , 𝜇2 ).
Figure 3.2 The function Ψ(𝜇) = (𝜇1 ∪ 𝜇2 , 𝜇1 ∪ 𝜇2 ).
37
38
3 Morphisms
3.3 The Composition Theorem 3.2 The functions Φ, Ψ, Γ, h, g, h′ , g ′ ∶ Bn −−→ Bn are given such that (h, h′ ) ∶ Φ −−→ Ψ, (g, g ′ ) ∶ Ψ −−→ Γ are morphisms. (a) (g ⚬h, g ′ ⚬h′ ) ∶ Φ −−→ Γ is a morphism; (b) if h, h′ are bijections, then (h−1 , h′−1 ) ∶ Ψ −−→ Φ is a morphism. Proof: (a) This happens since ∀𝜈 ∈ Bn , the diagrams Φ𝜈
−−→
Bn h↓
Ψh
Bn
′ (𝜈)
−−→
Bn g↓
Γ(g
Bn ↓h
′ ⚬ h′ )(𝜈)
−−→
Bn ↓g Bn
are all commutative: ∀𝜇 ∈ Bn , (Γ(g
′
⚬ h′ )(𝜈)
⚬(g ⚬h))(𝜇) = ((Γg (h (𝜈)) ⚬g) ⚬h)(𝜇) = ((g ⚬Ψh (𝜈) ) ⚬h)(𝜇) ′
′
′
= (g ⚬(Ψh (𝜈) ⚬h))(𝜇) ′
= (g ⚬(h ⚬Φ𝜈 ))(𝜇) = ((g ⚬h) ⚬Φ𝜈 )(𝜇). (b) For any 𝜈 ∈ B , we notice that n
Ψh (𝜈) ⚬h = h ⚬Φ𝜈 ′
implies by multiplication with h−1 at the left and at the right h−1 ⚬Ψh (𝜈) = Φ𝜈 ⚬h−1 = Φh ′
thus (h−1 , h′−1 ) ∈ Hom(Ψ, Φ)
′−1
(h′ (𝜈))
⚬h−1 , ◽
Definition 3.2 The previous morphism (g ⚬h, g ′ ⚬h′ ) is by definition the composition of (g, g ′ ) and (h, h′ ) and its usual notation is (g, g ′ ) ⚬(h, h′ ). Theorem 3.3 Let the functions Φ, Ψ ∶ Bn −−→ Bn . The following statements are true: (a) ∀(g, g ′ ) ∈ Iso(Ψ, Γ), ∀(h, h′ ) ∈ Iso(Φ, Ψ), (g, g ′ ) ⚬(h, h′ ) ∈ Iso(Φ, Γ); (b) Aut(Φ) is a group relative to the composition of the morphisms, where the neuter element is (1Bn , 1Bn ) and ∀(h, h′ ) ∈ Aut(Φ), (h, h′ )−1 = (h−1 , h′−1 ). Proof: (a) If (g, g ′ ) and (h, h′ ) are both isomorphisms, then (g, g ′ ) ⚬(h, h′ ) = (g ⚬h, g ′ ⚬h′ ) is an isomorphism: the composition of morphisms is a morphism from Theorem 3.2 and, in addition, the composition of bijections is a bijection.
3.5 Symmetrical Functions Relative to Translations. Examples
(b) (1Bn , 1Bn ) is the neuter element relative to the composition of the morphisms, since it belongs to Aut(Φ) and for any (h, h′ ) ∈ Aut(Φ), we can write: (h, h′ ) ⚬(1Bn , 1Bn ) = (h ⚬1Bn , h′ ⚬1Bn ) = (h, h′ ) = (1Bn ⚬h, 1Bn ⚬h′ ) = (1Bn , 1Bn ) ⚬(h, h′ ). In addition, (h−1 , h′−1 ) exists, it is a morphism from Theorem 3.2 and (h, h′ ) ⚬(h−1 , h′−1 ) = (h ⚬h−1 , h′ ⚬h′−1 ) = (1Bn , 1Bn ) = (h−1 ⚬h, h′−1 ⚬h′ ) = (h−1 , h′−1 ) ⚬(h, h′ ), therefore the inverse of (h, h′ ) is (h−1 , h′−1 )
◽
3.4 A Fixed Point Property Theorem 3.4 The functions Φ, Ψ∶Bn −−→ Bn are given, together with 𝜇 ∈ Bn and (h, h′ ) ∈ Hom(Φ, Ψ). If Φ(𝜇) = 𝜇, then ∀𝜈 ∈ Bn , Ψh (𝜈) (h(𝜇)) = h(𝜇), ′
and if h′ is bijective, then Ψ(h(𝜇)) = h(𝜇). Proof: Indeed, for any 𝜈 ∈ Bn we can write that Ψh (𝜈) (h(𝜇)) = h(Φ𝜈 (𝜇)) = h(𝜇), and if h′ is bijective, then 𝜈 ′ ∈ Bn exists such that h′ (𝜈 ′ ) = (1, … , 1) ∈ Bn . We have: ′
Ψ(h(𝜇)) = Ψh (𝜈 ) (h(𝜇)) = h(Φ𝜈 (𝜇)) = h(𝜇) ′
′
′
◽
3.5 Symmetrical Functions Relative to Translations. Examples Definition 3.3 The functions Φ, Ψ ∶ Bn −−→ Bn are called symmetrical relative to the translation with 𝜏 ∈ Bn , if h′ ∶ Bn −−→ Bn exists such that (𝜃 𝜏 , h′ ) ∈ Iso(Φ, Ψ) and (𝜃 𝜏 , h′ ) ≠ (1Bn , 1Bn ). Definition 3.4 We say that the function Φ ∶ Bn −−→ Bn is symmetrical relative to the translation with 𝜏, if h′ ∶ Bn −−→ Bn exists such that (𝜃 𝜏 , h′ ) ∈ Aut(Φ) and (𝜃 𝜏 , h′ ) ≠ (1Bn , 1Bn ).
39
40
3 Morphisms
Remark 3.4 The translations 𝜃 𝜏 are bijections, therefore the statements (𝜃 𝜏 , h′ ) ∈ Iso(Φ, Ψ), (𝜃 𝜏 , h′ ) ∈ Aut(Φ) make sense. Example 3.6 The function Φ(𝜇1 , 𝜇2 ) = (𝜇2 , 𝜇1 ) has its state portrait drawn in Figure 3.3. If we translate with 𝜏 = (1, 0) the points of B2 from Figure 3.3 we get Figure 3.4, where the state portrait of Ψ(𝜇1 , 𝜇2 ) = (𝜇2 , 𝜇1 ) is drawn. Then Φ and Ψ are symmetrical relative to the translation with (1, 0), i.e.(𝜃 (1,0) , 1B2 ) ∈ Iso(Φ, Ψ) takes place. Indeed, for any 𝜇, 𝜈 ∈ B2 we can write: (𝜃 (1,0) ⚬Φ𝜈 )(𝜇) = 𝜃 (1,0) (𝜈1 𝜇1 ⊕ 𝜈1 Φ1 (𝜇), 𝜈2 𝜇2 ⊕ 𝜈2 Φ2 (𝜇)) = ((𝜈1 ⊕ 1)𝜇1 ⊕ 𝜈1 (𝜇2 ⊕ 1) ⊕ 1, (𝜈2 ⊕ 1)𝜇2 ⊕ 𝜈2 𝜇1 ) = (𝜇1 ⊕ 𝜇1 𝜈1 ⊕ 𝜇2 𝜈1 ⊕ 𝜈1 ⊕ 1, 𝜇2 ⊕ 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ) and on the other hand (Ψ𝜈 ⚬𝜃 (1,0) )(𝜇) = Ψ𝜈 (𝜇1 ⊕ 1, 𝜇2 ) = (𝜈1 (𝜇1 ⊕ 1) ⊕ 𝜈1 Ψ1 (𝜇1 ⊕ 1, 𝜇2 ), 𝜈2 𝜇2 ⊕ 𝜈2 Ψ2 (𝜇1 ⊕ 1, 𝜇2 )) = ((𝜈1 ⊕ 1)(𝜇1 ⊕ 1) ⊕ 𝜈1 𝜇2 , (𝜈2 ⊕ 1)𝜇2 ⊕ 𝜈2 𝜇1 ) = (𝜇1 ⊕ 1 ⊕ 𝜇1 𝜈1 ⊕ 𝜈1 ⊕ 𝜈1 𝜇2 , 𝜇2 ⊕ 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ) i.e. 𝜃 (1,0) ⚬Φ𝜈 = Ψ𝜈 ⚬𝜃 (1,0) . Example 3.7 We continue the reasoning with the function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) from Figure 3.5. We translate each point of that figure with (0, 1) and
(0,0)
(1,0)
(0,1)
(1,1)
(1,0)
(0,0)
(1,1)
(0,1)
Figure 3.3 The function Φ(𝜇1 , 𝜇2 ) = (𝜇2 , 𝜇1 ).
Figure 3.4 The function Ψ(𝜇1 , 𝜇2 ) = (𝜇2 , 𝜇1 ).
3.6 The Dual Functions Revisited
we get the function from Figure 3.6, that coincides with Φ. We prove that (𝜃 (0,1) , 1B2 ) ∈ Aut(Φ) in the following way: ∀𝜇 ∈ B2 , ∀𝜈 ∈ B2 , (𝜃 (0,1) ⚬Φ𝜈 )(𝜇) = 𝜃 (0,1) (𝜈1 𝜇1 ⊕ 𝜈1 𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ⊕ 𝜈1 𝜇1 , 𝜇2 ) and (Φ𝜈 ⚬𝜃 (0,1) )(𝜇) = Φ𝜈 (𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ⊕ 𝜈1 𝜇1 , 𝜇2 ). We have obtained that 𝜃 (0,1) ⚬Φ𝜈 = Φ𝜈 ⚬𝜃 (0,1) . Figure 3.5 The function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ).
Figure 3.6 The function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ).
3.6 The Dual Functions Revisited Remark 3.5 The translation with (1, … , 1) ∈ Bn has the meaning of complement, as we know. This allows revisiting the dual functions that prove to be isomorphic. Theorem 3.5 Let the functions Φ, Ψ ∶ Bn −−→ Bn ; Ψ is the dual of Φ if and only if (𝜃 (1,…,1) , 1Bn ) ∈ Iso(Φ, Ψ). Proof: We prove the if part first. From (𝜃 (1,…,1) , 1Bn ) ∈ Iso(Φ, Ψ) we can write 𝜃 (1,…,1) ⚬Φ = Ψ ⚬𝜃 (1,…,1) . We multiply (3.1) at the right with 𝜃 (1,…,1) and we get Ψ = 𝜃 (1,…,1) ⚬Φ ⚬𝜃 (1,…,1) ,
(3.1)
41
42
3 Morphisms
thus for any 𝜇 ∈ Bn we infer Ψ(𝜇) = (𝜃 (1,…,1) ⚬Φ ⚬𝜃 (1,…,1) )(𝜇) = Φ(𝜇), i.e. Ψ = Φ∗ . We prove the only if part now. The hypothesis states that Ψ = Φ∗ and let i ∈ {1, … , n}, 𝜆, 𝜇 ∈ Bn arbitrary. We have { 𝜇i , if 𝜆i = 0, (𝜃 (1,…,1) ⚬Φ∗𝜆 )i (𝜇) = Φ∗𝜆 (𝜇) = i Φ∗i (𝜇), if 𝜆i = 1 { 𝜇i , if 𝜆i = 0, = Φi (𝜇), if 𝜆i = 1 { 𝜇i , if 𝜆i = 0, = Φ𝜆i (𝜇) = (Φ𝜆 ⚬𝜃 (1,…,1) )i (𝜇), = Φi (𝜇), if 𝜆i = 1 in other words 𝜃 (1,…,1) ⚬Φ∗𝜆 = Φ𝜆 ⚬𝜃 (1,…,1) .
(3.2)
We multiply (3.2) at the left and at the right with 𝜃 (1,…,1) and we obtain Φ∗𝜆 ⚬𝜃 (1,…,1) = 𝜃 (1,…,1) ⚬Φ𝜆 , therefore (𝜃 (1,…,1) , 1Bn ) ∈ Iso(Φ, Φ∗ )
◽
3.7 Morphisms vs. Predecessors and Successors Theorem 3.6 The functions Φ, Ψ ∶ Bn −−→ Bn are given, together with 𝜇 ∈ Bn and (h, h′ ) ∈ Hom(Φ, Ψ). (a) We have h(𝜇Φ− ) ⊂ h(𝜇)−Ψ , h(𝜇Φ+ ) h(O−Φ (𝜇)) h(O+Φ (𝜇))
⊂ ⊂ ⊂
h(𝜇)+Ψ , O−Ψ (h(𝜇)), O+Ψ (h(𝜇)).
(3.3) (3.4) (3.5) (3.6)
′
(b) If (h, h ) ∈ Iso(Φ, Ψ), then h(𝜇Φ− ) = h(𝜇)−Ψ , h(𝜇Φ+ ) h(O−Φ (𝜇)) h(O+Φ (𝜇))
= = =
h(𝜇)+Ψ , O−Ψ (h(𝜇)), O+Ψ (h(𝜇)).
(3.7) (3.8) (3.9) (3.10)
3.7 Morphisms vs. Predecessors and Successors
Proof: (a) We take 𝜆 ∈ 𝜇Φ arbitrarily, i.e. 𝜈 ∈ Bn exists such that Φ𝜈 (𝜆) = 𝜇. From h(𝜇) = h(Φ𝜈 (𝜆)) = Ψh (𝜈) (h(𝜆)) ′
we infer that h(𝜆) ∈ h(𝜇)−Ψ . Statement (3.3) is proved. In order to prove (3.6), we take an arbitrary 𝜆 ∈ O+Φ (𝜇), meaning the existence ′ of 𝜈 ∈ Bn , … , 𝜈 ′ ∈ Bn with 𝜆 = (Φ𝜈 ⚬ … ⚬Φ𝜈 )(𝜇). Then h(𝜆) = h((Φ𝜈 ⚬ … ⚬Φ𝜈 )(𝜇)) = (h ⚬Φ𝜈 ⚬ … ⚬Φ𝜈 )(𝜇) ′
′
= (Ψh (𝜈) ⚬h ⚬ … ⚬Φ𝜈 )(𝜇) … ′
′
= (Ψh (𝜈) ⚬ … ⚬Ψh (𝜈 ) ⚬h)(𝜇) = (Ψh (𝜈) ⚬ … ⚬Ψh (𝜈 ) )(h(𝜇)), ′
′
′
′
′
′
thus h(𝜆) ∈ O+Ψ (h(𝜇)) and the truth of (3.6) follows. (b) We prove h(𝜇)+Ψ ⊂ h(𝜇Φ+ )
(3.11)
and we take an arbitrary 𝜆′ ∈ h(𝜇)+Ψ . This gives the existence of 𝜈 ′ ∈ Bn with ′ 𝜆′ = Ψ𝜈 (h(𝜇)). The fact that h′ is bijection shows the existence of 𝜈 ∈ Bn with 𝜈 ′ = h′ (𝜈). We can write: 𝜆′ = Ψ𝜈 (h(𝜇)) = Ψh (𝜈) (h(𝜇)) = h(Φ𝜈 (𝜇)) ′
′
where Φ𝜈 (𝜇) ∈ 𝜇Φ+ , thus 𝜆′ ∈ h(𝜇Φ+ ).Statement (3.11) is proved and, taking into account (3.4), we get the truth of (3.8). We show that O−Ψ (h(𝜇)) ⊂ h(O−Φ (𝜇)).
(3.12)
Let 𝜆 ∈ arbitrary, fixed. Then 𝜈 ∈ B , … , 𝛿 ∈ B exist such that ′ (Ψ𝜈 ⚬ · · · ⚬Ψ )(𝜆 ) = h(𝜇). As h, h′ are bijections, 𝜆, 𝜈, … , 𝛿 ∈ Bn exist having the property that 𝜆′ = h(𝜆), 𝜈 ′ = h′ (𝜈), … , 𝛿 ′ = h′ (𝛿). We infer ′
O−Ψ (h(𝜇)) 𝛿′ ′
n
′
′
n
h(𝜇) = (Ψ𝜈 ⚬ … ⚬Ψ𝛿 )(𝜆′ ) = (Ψh (𝜈) ⚬ … ⚬Ψh (𝛿) )(h(𝜆)) ′
′
′
′
= (Ψh (𝜈) ⚬ … ⚬Ψh (𝛿) ⚬h)(𝜆) = (Ψh (𝜈) ⚬ … ⚬h ⚬Φ𝛿 )(𝜆) = … ′
′
′
= (Ψh (𝜈) ⚬h ⚬ … ⚬Φ𝛿 )(𝜆) = (h ⚬Φ𝜈 ⚬ … ⚬Φ𝛿 )(𝜆) ′
= h((Φ𝜈 ⚬ … ⚬Φ𝛿 )(𝜆)), i.e. 𝜇 = (Φ𝜈 ⚬ … ⚬Φ𝛿 )(𝜆). We get from here that 𝜆 ∈ O−Φ (𝜇), thus 𝜆′ = h(𝜆) ∈ h(O−Φ (𝜇)). Statement (3.12) is true and, taking into account (3.5) also, we obtain the truth of (3.9) ◽ Corollary 3.1 We suppose that (h, h′ ) ∈ Iso(Φ, Ψ) and let 𝜇 ∈ Bn . (a) 𝜇 is a source of Φ if and only if h(𝜇) is a source of Ψ; (b) 𝜇 is an isolated fixed point of Φ if and only if h(𝜇) is an isolated fixed point of Ψ;
43
44
3 Morphisms
(c) 𝜇 is a transient point of Φ if and only if h(𝜇) is a transient point of Ψ; (d) 𝜇 is a sink of Φ if and only if h(𝜇) is a sink of Ψ. Proof: h is bijective and we use Eqs. (3.7) and (3.8) that imply: card(𝜇Φ− ) = card(h(𝜇Φ− )) = card(h(𝜇)−Ψ ), card(𝜇Φ+ ) = card(h(𝜇Φ+ )) = card(h(𝜇)+Ψ ) Remark 3.6 page 19.
◽
To be compared the previous corollary with Remark 1.22,
45
4 Antimorphisms The antimorphisms are defined like the morphisms, the antimorphisms from Φ ∶ Bn → Bn to Ψ ∶ Bn → Bn are couples of functions such that a diagram is commutative. In contradistinction to the morphisms, the cause–effect sense of Φ and Ψ is inversed, suggesting this way time reversal. The existence of an antimorphism from Φ to Ψ shows that some properties of Φ are transferred to Ψ. The composition of the antimorphisms is a morphism, and the composition of an antimorphism with a morphism is an antimorphism. The antisymmetry relative to translations is discussed, as well as the action of the antimorphisms on fixed points, predecessors and successors.
4.1 Definition Definition 4.1 Let us consider the functions Φ, Ψ ∶ Bn → Bn for which h, h′ ∶ Bn → Bn exist with the property that ∀𝜈 ∈ Bn , the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Ψh
′ (𝜈)
Bn ←−− Bn is commutative. We denote then (h, h′ )∽ ∶ Φ → Ψ and we say that the antimorphism (h, h′ )∽ is defined, from Φ to Ψ. If the functions h, h′ are both bijections and (h−1 , h′−1 )∽ ∶ Ψ −−→ Φ is antimorphism, then (h, h′ )∽ is called antiisomorphism from Φ to Ψ and if (h, h′ )∽ ∶ Φ → Φ is antiisomorphism, then we call it antiautomorphism. Notation 4.1 We denote the sets of the antimorphisms from Φ to Ψ, of the antiisomorphisms from Φ to Ψ and of the antiautomorphisms of Φ with Hom∽ (Φ, Ψ), Iso∽ (Φ, Ψ) and Aut ∽ (Φ).
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
46
4 Antimorphisms
Remark 4.1 The meaning of the existence of an antimorphism from Φ to Ψ is similar with that of the existence of a morphism, but with the cause-effect sense of Φ and Ψ inversed, suggesting that, when Φ and Ψ are computed (asynchronously), time flows in opposite senses. Reversing time is a topic in physics and its adaptation to asynchronicity (in this timeless framework) will be addressed later. If an antimorphism from Φ to Ψ exists, we expect that some properties of Φ be transferred under some form to Ψ. Remark 4.2 Like in the case of the morphisms, see Remark 3.2, page 36, several possibilities exist of generalizing Definition 4.1. Remark 4.3 be empty.
For arbitrary Φ, Ψ any of Hom∽ (Φ, Ψ), Iso∽ (Φ, Ψ), Aut ∽ (Φ) can
Theorem 4.1 We have (h, h′ ) ∈ Hom∽ (Φ, Ψ) ⇐⇒ (h∗ , h′ ) ∈ Hom∽ (Φ∗ , Ψ∗ ). Proof: =⇒ Let (h, h′ ) ∈ Hom∽ (Φ, Ψ) and 𝜇, 𝜈 ∈ Bn arbitrary. We denote 𝛿 = 𝜇. We have: ′
h∗ (𝜇) = h(𝛿) = Ψh′ (𝜈) (h(Φ𝜈 (𝛿))) = Ψh′ (𝜈) (h(Φ𝜈 (𝛿))) = Ψh (𝜈)∗ (h(Φ𝜈 (𝛿))) = Ψ∗h (𝜈) (h∗ (Φ𝜈 (𝛿))) = Ψ∗h (𝜈) (h∗ (Φ𝜈∗ (𝛿))) = Ψ∗h (𝜈) (h∗ (Φ∗𝜈 (𝜇))). ′
′
′
⇐= We take (h∗ , h′ ) ∈ Hom∽ (Φ∗ , Ψ∗ ), 𝜇, 𝜈 ∈ Bn arbitrary and we denote 𝛿 = 𝜇. We can write: h(𝜇) = h(𝜇) = h∗ (𝛿) = Ψ∗h′ (𝜈) (h∗ (Φ∗𝜈 (𝛿))) = Ψh′ (𝜈)∗ (h∗ (Φ𝜈∗ (𝛿))) = Ψh (𝜈) (h∗ (Φ𝜈∗ (𝛿))) = Ψh (𝜈) (h(Φ𝜈∗ (𝛿))) = Ψh (𝜈) (h(Φ𝜈 (𝛿))) ′
′
= Ψh (𝜈) (h(Φ𝜈 (𝜇))) ′
′
◽
4.2 Examples Example 4.1 The arbitrary functions h, h′ ∶ Bn → Bn fulfill the property that (h, h′ )∽ ∈ Hom∽ (1Bn , 1Bn ). If h, h′ are bijections, then (h, h′ )∽ is antiautomorphism. Example 4.2 We take the functions Ψ, h ∶ Bn → Bn arbitrary and h′ ∶ Bn → Bn defined by ∀𝜇 ∈ Bn , h′ (𝜇) = (0, … , 0). We show that (h, h′ )∽ ∶ 1Bn → Ψ is an antimorphism: for any 𝜇, 𝜈 ∈ Bn we infer Ψh (𝜈) (h((1Bn )𝜈 (𝜇))) = Ψ(0,…,0) (h(𝜇)) = h(𝜇). ′
4.2 Examples
Example 4.3 Let Φ ∶ B2 → B2 the function from Figure 4.1: ∀𝜇 ∈ B2 , ∀𝜈 ∈ B2 , Φ𝜈 (𝜇1 , 𝜇2 ) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) for which (Φ𝜈 ⚬ Φ𝜈 )(𝜇) = Φ𝜈 (𝜇1 , 𝜈2 𝜇2 ∪𝜈2 𝜇2 ) = (𝜇1 , 𝜈2 (𝜈2 𝜇2 ∪𝜈2 𝜇2 ) ∪ 𝜈2 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜈2 𝜇2 ∪𝜈2 (𝜈2 ∪𝜇2 )(𝜈2 ∪ 𝜇2 )) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 (𝜈2 ∪ 𝜇2 )𝜇2 ) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜇2 ) is true. We have obtained that (1B2 , 1B2 )∽ ∈ Aut ∽ (Φ). Figure 4.1 The function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ).
Example 4.4 By following the previous idea, we show that the function Φ from Figure 4.1 and the function Ψ ∶ B2 → B2 from Figure 4.2 are antiisomorphic. Indeed, we have ∀𝜇 ∈ B2 , Ψ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) and ∀𝜈 ∈ B2 , Ψ𝜈 (𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜇2 ). We define h, h′ ∶ B2 → B2 by ∀𝜇 ∈ B2 , h(𝜇) = h′ (𝜇) = (𝜇2 , 𝜇1 ) and we infer: Ψh (𝜈) (h(Φ𝜈 (𝜇))) = Ψ(𝜈2 ,𝜈1 ) (h(𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 )) = Ψ(𝜈2 ,𝜈1 ) (𝜈2 𝜇2 ∪ 𝜈2 𝜇2 , 𝜇1 ) = (𝜈2 (𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) ∪ 𝜈2 Ψ1 (𝜈2 𝜇2 ∪ 𝜈2 𝜇2 , 𝜇1 ), ′
𝜈1 𝜇1 ∪ 𝜈1 Ψ2 (𝜈2 𝜇2 ∪ 𝜈2 𝜇2 , 𝜇1 )) = (𝜈2 𝜇2 ∪ 𝜈2 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 , 𝜈1 𝜇1 ∪ 𝜈1 𝜇1 ) = (𝜈2 𝜇2 ∪ 𝜈2 (𝜈2 ∪ 𝜇2 )(𝜈2 ∪ 𝜇2 ), 𝜇1 ) = (𝜈2 𝜇2 ∪ 𝜈2 (𝜈2 ∪ 𝜇2 )𝜇2 , 𝜇1 ) = (𝜈2 𝜇2 ∪ 𝜈2 𝜇2 , 𝜇1 ) = (𝜇2 , 𝜇1 ) = h(𝜇), thus (h, h′ )∽ ∈ Hom∽ (Φ, Ψ). But h, h′ are bijections with h = h−1 , h′ = h′−1 and we can prove that (h−1 , h′−1 )∽ ∈ Hom∽ (Ψ, Φ). We have (h, h′ )∽ ∈ Iso∽ (Φ, Ψ). Figure 4.2 Function Ψ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) which is antiisomorphic with the function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ).
47
48
4 Antimorphisms
Example 4.5 Let Φ, Ψ ∶ Bn → Bn and 𝜇′ ∈ Bn with the property that Ψ(𝜇′ ) = 𝜇′ . We define h ∶ Bn → Bn by ∀𝜇 ∈ Bn , h(𝜇) = 𝜇′ and we take h′ ∶ Bn → Bn arbitrary. Then (h, h′ )∽ ∈ Hom∽ (Φ, Ψ) because for any 𝜇, 𝜈 ∈ Bn we have: Ψh (𝜈) (h(Φ𝜈 (𝜇))) = Ψh (𝜈) (𝜇′ ) = 𝜇′ = h(𝜇). ′
′
Example 4.6 We take h the constant function equal with 𝜇′ , h′ the constant function equal with (0, … , 0) ∈ Bn and Φ, Ψ arbitrary. Then (h, h′ )∽ ∈ Hom∽ (Φ, Ψ) ∶ ∀𝜇 ∈ Bn , ∀𝜈 ∈ Bn , Ψh (𝜈) (h(Φ𝜈 (𝜇))) = Ψ(0,…,0) (𝜇′ ) = 𝜇′ = h(𝜇) ′
is true. Example 4.7 We take Φ, Ψ ∶ Bn → Bn with ∀𝜇 ∈ Bn , Φ1 (𝜇) = 𝜇1 , Ψ(𝜇) = (𝜇1 , 𝜇2 , … , 𝜇n ) and we define h, h′ ∶ Bn → Bn by ∀𝜇 ∈ Bn , h(𝜇) = h′ (𝜇) = (𝜇1 , 𝜇1 , … , 𝜇1 ). For arbitrary 𝜇, 𝜈 ∈ Bn we infer 𝜈
𝜈
Ψh (𝜈) (h(Φ𝜈 (𝜇))) = Ψh (𝜈) (h(𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , Φ22 (𝜇), … , Φnn (𝜇)) ′
′
= Ψ(𝜈1 ,𝜈1 ,…,𝜈1 ) (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , … , 𝜈1 𝜇1 ∪ 𝜈1 𝜇1 ), and since 𝜈1 (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 ) ∪ 𝜈1 𝜈1 𝜇1 ∪ 𝜈1 𝜇1 = 𝜈1 𝜇1 ∪ 𝜈1 (𝜈1 ∪ 𝜇1 )(𝜈1 ∪ 𝜇1 ) = 𝜈1 𝜇1 ∪ 𝜈1 (𝜈1 ∪ 𝜇1 )𝜇1 = 𝜈1 𝜇1 ∪ 𝜈1 𝜇1 = 𝜇1 , we get Ψh (𝜈) (h(Φ𝜈 (𝜇))) = (𝜇1 , 𝜇1 , … , 𝜇1 ) = h(𝜇), ′
in other words (h, h′ )∽ ∈ Hom∽ (Φ, Ψ). Remark 4.4 In the previous examples, we note that (h, h′ ) ∈ Hom(Φ, Ψ), (h, h′ )∽ ∈ Hom∽ (Φ, Ψ) are both true. For this, we can compare Example 3.2, page 37 with Example 4.2, Example 3.3, page 37 with Example 4.5, Example 3.4, page 37 with Example 4.6, and notice also that this happens for Examples 4.1, 4.3, 4.4, 4.7 too. The only way of trying to state a rule for this is contained in the unexpected question: do we have Hom∽ (Φ, Ψ) ⊂ Hom(Φ, Ψ)?
4.3 The Composition Theorem 4.2 Let the functions Ω, Φ, Ψ, Γ ∶ Bn −−→ Bn , together with the antimorphisms (h, h′ )∽ ∶ Φ −−→ Ψ, (g, g ′ )∽ ∶ Ψ −−→ Γ and the morphisms (f , f ′ ) ∶ Ω −−→ Φ, (i, i′ ) ∶ Ψ −−→ Γ.
4.3 The Composition
(a) (h ⚬ f , h′ ⚬ f ′ )∽ ∶ Ω −−→ Ψ, (i ⚬ h, i′ ⚬ h′ )∽ ∶ Φ −−→ Γ are antimorphisms; (b) (g ⚬ h, g ′ ⚬ h′ ) ∶ Φ −−→ Γ is a morphism. Proof: (a) We see that ∀𝜈 ∈ Bn , the diagrams Ω𝜈
Bn f ↓
−−→
Bn h↓
−−→
′ (𝜈)
Φf
Ψ(h
Bn ↓f Bn ↓h
′ ⚬ f ′ )(𝜈)
←−−
Bn
Bn
are all commutative, since ∀𝜇 ∈ Bn , ′
(Ψ(h
⚬ f ′ )(𝜈)
⚬(h ⚬f ) ⚬Ω𝜈 )(𝜇) = (Ψ(h
′
⚬ f ′ )(𝜈)
⚬h)((f ⚬Ω𝜈 )(𝜇))
′
⚬ f )(𝜈)
⚬h)((Φf
= (Ψ(h = ((Ψ
′
(h ⚬ f )(𝜈) ′
′
⚬h ⚬Φ
(𝜈)
⚬f )(𝜇))
′
) ⚬f )(𝜇)
′
f (𝜈)
= (h ⚬f )(𝜇) and similarly for (i ⚬h, i ⚬h ). (b) This is true because ∀𝜈 ∈ Bn , the diagrams ′
′
Φ𝜈
−−→
Bn h↓
Ψh
Bn ↓h
′ (𝜈)
←−−
Bn g↓
Γ(g
′ ⚬ h′ )(𝜈)
−−→
Bn
Bn ↓g Bn
commute: ∀𝜇 ∈ Bn , (Γ(g
′
⚬ h′ )(𝜈)
⚬(g ⚬h))(𝜇) = ((Γ(g = (Γ
′
⚬ h′ )(𝜈)
(g ′ ⚬ h′ )(𝜈)
= ((Γ
⚬g) ⚬h)(𝜇) = (Γ(g
⚬g)((Ψ
(g ′ ⚬ h′ )(𝜈)
h′ (𝜈)
⚬g ⚬Ψ
h′ (𝜈)
′
⚬ h′ )(𝜈)
⚬g)(h(𝜇))
𝜈
⚬h ⚬Φ )(𝜇)) ) ⚬(h ⚬Φ𝜈 ))(𝜇)
= (g ⚬(h ⚬Φ𝜈 ))(𝜇) = ((g ⚬h) ⚬Φ𝜈 )(𝜇)
◽
Remark 4.5 It is not clear at this moment what happens if previously h, h′ are bijections: is (h−1 , h′−1 )∽ ∶ Ψ −−→ Φ an antimorphism? This would mean that for any 𝜈 ∈ Bn , the commutativity of the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Ψh
′ (𝜈)
Bn ←−− Bn
49
50
4 Antimorphisms
implies the commutativity of the diagram Bn −1 h ↑ Bn
Φ𝜈
−−→ Ψh
Bn ↑ h−1
′ (𝜈)
←−−
Bn
i.e. from h = Ψh (𝜈) ⚬h ⚬Φ𝜈 ′
we get, since Φ𝜈 and Ψh (𝜈) are invertible: ′
h−1 = (Φ𝜈 )−1 ⚬h−1 ⚬(Ψh (𝜈) )−1 = Φ𝜈 ⚬h−1 ⚬Ψh (𝜈) ′−1 ′ ′ = Φh (h (𝜈)) ⚬h−1 ⚬Ψh (𝜈) . ′
′
(4.1)
In (4.1), the surjectivity of h′ shows that h′ (𝜈) runs through all the values of Bn when 𝜈 runs through all the values of Bn . We cannot say when (4.1) holds. This would be the case if Φ𝜈 = (Φ𝜈 )−1 , ′ h′ (𝜈) = (Ψh (𝜈) )−1 . Ψ Definition 4.2 The previous antimorphisms (h ⚬f , h′ ⚬f ′ )∽ , (i ⚬h, i′ ⚬h′ )∽ are by definition the composition of the antimorphism (h, h′ )∽ with the morphism (f , f ′ ), denoted (h, h′ )∽ ⚬(f , f ′ ), and the composition of the morphism (i, i′ ) with the antimorphism (h, h′ )∽ , having the notation (i, i′ ) ⚬(h, h′ )∽ . Definition 4.3 The previous morphism (g ⚬h, g ′ ⚬h′ ) is by definition the composition of the antimorphisms (g, g ′ )∽ and (h, h′ )∽ and it is usually denoted by (g, g ′ )∽ ⚬(h, h′ )∽ . Remark 4.6 An asymmetry occurs by comparing Definition 3.1, page 35 with Definition 4.1, page 45 concerning the concepts of isomorphism and antiisomorphism: while (h, h′ ) ∈ Hom(Φ, Ψ) and the bijectivity of h, h′ imply (h−1 , h′−1 ) ∈ Hom(Ψ, Φ), see Theorem 3.2, page 38, (h, h′ )∽ ∈ Hom∽ (Φ, Ψ) and the bijectivity of h, h′ do not imply that (h−1 , h′−1 )∽ ∈ Hom∽ (Ψ, Φ), see Remark 4.5. Remark 4.7 When in Theorem 4.2 (f , f ′ ), (i, i′ ) are isomorphisms and (h, h′ )∽ is an antiisomorphism, (h ⚬f , h′ ⚬f ′ )∽ , (i ⚬h, i′ ⚬h′ )∽ are antiisomorphisms (since the composition of bijections is a bijection). In particular, the composition of an automorphism with an antiautomorphism is an antiautomorphism. Remark 4.8 If in Theorem 4.2, (g, g ′ )∽ and (h, h′ )∽ are antiisomorphisms, then (g ⚬h, g ′ ⚬h′ ) is an isomorphism, in particular the composition of antiautomorphisms is an automorphism.
4.5 Antisymmetrical Functions Relative to Translations. Examples
4.4 A Fixed Point Property Theorem 4.3 The functions Φ, Ψ ∶ Bn −−→ Bn are given and (h, h′ )∽ ∶ Φ −−→ ′ Ψ. If for 𝜇 ∈ Bn we have Φ(𝜇) = 𝜇, then ∀𝜈 ∈ Bn , Ψh (𝜈) (h(𝜇)) = h(𝜇) and if h′ is bijective, then we have that Ψ(h(𝜇)) = h(𝜇). Proof: For any 𝜈 ∈ Bn , we can write that h(𝜇) = (Ψh (𝜈) ⚬h ⚬Φ𝜈 )(𝜇) = Ψh (𝜈) (h(Φ𝜈 (𝜇))) = Ψh (𝜈) (h(𝜇)). ′
′
′
We suppose now that h′ is bijective. Then 𝜈 ′ ∈ Bn exists with h′ (𝜈 ′ ) = (1, … , 1) ∈ Bn and we infer ′
′
h(𝜇) = Ψh (𝜈 ) (h(𝜇)) = Ψ(1,…,1) (h(𝜇)) = Ψ(h(𝜇))
◽
4.5 Antisymmetrical Functions Relative to Translations. Examples Definition 4.4 The functions Φ, Ψ ∶ Bn −−→ Bn are called antisymmetrical relative to the translation with 𝜏 ∈ Bn , if h′ ∶ Bn −−→ Bn exists such that (𝜃 𝜏 , h′ )∽ ∈ Iso∽ (Φ, Ψ), where ∀𝜇 ∈ Bn , 𝜃 𝜏 (𝜇) = 𝜇 ⊕ 𝜏. Definition 4.5 We say that Φ ∶ Bn −−→ Bn is antisymmetrical relative to the translation with 𝜏 ∈ Bn , if h′ ∶ Bn −−→ Bn exists with the property that (𝜃 𝜏 , h′ )∽ ∈ Aut ∽ (Φ). Example 4.8 We consider first the function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 ⊕ 𝜇2 ⊕ 1) whose state portrait was drawn in Figure 4.3. We prove that it is antisymmetrical relative to the translation with (0, 1) ∶ for any 𝜇, 𝜈 ∈ B2 we can write (Φ𝜈 ⚬𝜃 (0,1) ⚬Φ𝜈 )(𝜇) = (Φ𝜈 ⚬𝜃 (0,1) )(𝜇1 , (𝜈2 ⊕ 1)𝜇2 ⊕ 𝜈2 (𝜇1 ⊕ 𝜇2 ⊕ 1)) = Φ𝜈 (𝜇1 , 𝜇2 ⊕ 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ⊕ 𝜇2 𝜈2 ⊕ 𝜈2 ⊕ 1) = Φ𝜈 (𝜇1 , 𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ⊕ 1) = (𝜇1 , (𝜈2 ⊕ 1)(𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ⊕ 1) ⊕ 𝜈2 (𝜇1 ⊕ 𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 )) = (𝜇1 , 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ⊕ 𝜈2 ⊕ 𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ⊕ 1 ⊕ 𝜇1 𝜈2 ⊕ 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ) = (𝜇1 , 𝜇2 ⊕ 1) = 𝜃 (0,1) (𝜇).
51
52
4 Antimorphisms
Figure 4.3 The function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 ⊕ 𝜇2 ⊕ 1).
We can try to anticipate the fact that (𝜃 (0,1) , 1B2 )∽ ∈ Aut ∽ (Φ) in the following way: if we add (0, 1) in Figure 4.3 to all the points of B2 we get Figure 4.3 again. So far, we have that (𝜃 (0,1) , 1B2 ) ∈ Aut(Φ). But ∀𝜈 ∈ B2 , Φ𝜈 = (Φ𝜈 )−1 , thus the property follows. Example 4.9 In order to construct a new function Ψ that is antisymmetrical with Φ from Figure 4.3, we add in that figure (1, 0) to all the points 𝜇 ∈ B2 ; we obtain Figure 4.4 and Ψ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 ⊕ 𝜇2 ). We prove that (𝜃 (1,0) , 1B2 )∽ ∈ Iso∽ (Φ, Ψ) ∶ for any 𝜇, 𝜈 ∈ B2 , we infer (Ψ𝜈 ⚬𝜃 (1,0) ⚬Φ𝜈 )(𝜇) = (Ψ𝜈 ⚬𝜃 (1,0) )(𝜇1 , (𝜈2 ⊕ 1)𝜇2 ⊕ 𝜈2 (𝜇1 ⊕ 𝜇2 ⊕ 1)) = Ψ𝜈 (𝜇1 ⊕ 1, 𝜇2 ⊕ 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ⊕ 𝜇2 𝜈2 ⊕ 𝜈2 ) = Ψ𝜈 (𝜇1 ⊕ 1, 𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ) = (𝜇1 ⊕ 1, (𝜈2 ⊕ 1)(𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ) ⊕ 𝜈2 (𝜇1 ⊕ 1 ⊕ 𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 )) = (𝜇1 ⊕ 1, 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ⊕ 𝜇2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ⊕ 𝜇2 𝜈2 ⊕ 𝜇1 𝜈2 ⊕ 𝜈2 ) = (𝜇1 ⊕ 1, 𝜇2 ) = 𝜃 (1,0) (𝜇). Once again, by adding (1, 0) to all the points 𝜇 ∈ B2 in Figure 4.3 we have obtained Ψ from Figure 4.4 with (𝜃 (1,0) , 1B2 ) ∈ Iso(Φ, Ψ). It happens that Ψ fulfills ∀𝜈 ∈ B2 , Ψ𝜈 = (Ψ𝜈 )−1 , wherefrom (𝜃 (1,0) , 1B2 )∽ ∈ Iso∽ (Φ, Ψ). Figure 4.4 The function Ψ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 ⊕ 𝜇2 ).
4.6 Antimorphisms vs Predecessors and Successors Theorem 4.4 The functions Φ, Ψ ∶ Bn → Bn are given, together with 𝜇 ∈ Bn and the antimorphism (h, h′ )∽ ∈ Hom∽ (Φ, Ψ).
4.6 Antimorphisms vs Predecessors and Successors
(a) We have: h(𝜇Φ− ) ⊂ h(𝜇)+Ψ ,
(4.2)
h(𝜇)−Ψ ,
(4.3)
h(𝜇Φ+ )
⊂
h(O−Φ (𝜇)) ⊂ O+Ψ (h(𝜇)),
(4.4)
⊂
(4.5)
h(O+Φ (𝜇))
O−Ψ (h(𝜇)).
(b) If (h, h′ )∽ ∈ Iso∽ (Φ, Ψ), then h(𝜇Φ− ) = h(𝜇)+Ψ ,
(4.6)
=
h(𝜇)−Ψ ,
(4.7)
=
O+Ψ (h(𝜇)), O−Ψ (h(𝜇)).
(4.8)
h(𝜇Φ+ ) h(O−Φ (𝜇))
h(O+Φ (𝜇)) =
(4.9)
Proof: (a) (4.2): We take 𝜆 ∈ 𝜇Φ− arbitrary, thus 𝜈 ∈ Bn exists with 𝜇 = Φ𝜈 (𝜆). As h(𝜆) = Ψh (𝜈) (h(Φ𝜈 (𝜆))) = Ψh (𝜈) (h(𝜇)), ′
′
we infer h(𝜆) ∈ h(𝜇)+Ψ . (4.5): Let 𝜆 ∈ O+Φ (𝜇) arbitrary, i.e. 𝜈 ∈ Bn , … , 𝜈 ′ ∈ Bn exist such that ′ 𝜆 = (Φ𝜈 ⚬ … ⚬Φ𝜈 )(𝜇). From h(𝜇) = (Ψh (𝜈 ) ⚬h ⚬Φ𝜈 )(𝜇) ′
′
′
= … = (Ψh (𝜈 ) ⚬ … ⚬Ψh (𝜈) ⚬h ⚬Φ𝜈 ⚬ … ⚬Φ𝜈 )(𝜇) ′
′
′
′
= (Ψh (𝜈 ) ⚬ … ⚬Ψh (𝜈) )(h((Φ𝜈 ⚬ … ⚬Φ𝜈 )(𝜇))) ′
′
′
′
= (Ψh (𝜈 ) ⚬ … ⚬Ψh (𝜈) )(h(𝜆)), ′
′
′
we get h(𝜆) ∈ O−Ψ (h(𝜇)). (b) We notice first of all that the bijectivity of h, h′ implies that ∀𝜈 ∈ Bn , Φ𝜈 , Ψ𝜈 are bijective. (4.6): We prove h(𝜇)+Ψ ⊂ h(𝜇Φ− ).
(4.10) 𝜈′
Let 𝜆 ∈ arbitrary, thus 𝜈 ∈ B exists such that 𝜆 = Ψ (h(𝜇)). The bijectivity of h shows the existence of 𝜈 ∈ Bn with 𝜈 ′ = h′ (𝜈). In addition, the bijectivity of Φ𝜈 gives the existence of 𝜆 ∈ Bn with 𝜇 = Φ𝜈 (𝜆), wherefrom 𝜆 ∈ 𝜇Φ− . We have ′
h(𝜇)+Ψ ′
′
n
′
𝜆′ = Ψ𝜈 (h(𝜇)) = Ψh (𝜈) (h(Φ𝜈 (𝜆))) = h(𝜆), ′
′
where h(𝜆) ∈ h(𝜇Φ− ). The inclusion (4.10) is proved and, if we take into account (4.2) also, (4.6) results.
53
54
4 Antimorphisms
(4.9): We prove O−Ψ (h(𝜇)) ⊂ h(O+Φ (𝜇))
(4.11)
and let 𝜆′ ∈ O−Ψ (h(𝜇)) arbitrary. We have the existence of 𝜈 ′ ∈ Bn , … , 𝛿 ′ ∈ ′ ′ Bn with h(𝜇) = (Ψ𝜈 ⚬ … ⚬Ψ𝛿 )(𝜆′ ). We define 𝜈, … , 𝛿, 𝜆 ∈ Bn by 𝜈 ′ = h′ (𝜈), … , 𝛿 ′ = h′ (𝛿), 𝜆′ = h(𝜆) and we can write: (Ψ𝜈 ⚬ … ⚬Ψ𝛿 )(𝜆′ ) = h(𝜇) = (Ψh (𝜈) ⚬h ⚬Φ𝜈 )(𝜇) = … ′
′
′
= (Ψh (𝜈) ⚬ … ⚬Ψh (𝛿) ⚬h ⚬Φ𝛿 ⚬ … ⚬Φ𝜈 )(𝜇) ′
′
= (Ψh (𝜈) ⚬ … ⚬Ψh (𝛿) )(h((Φ𝛿 ⚬ … ⚬Φ𝜈 )(𝜇))) ′
′
= (Ψ𝜈 ⚬ … ⚬Ψ𝛿 )(h((Φ𝛿 ⚬ … ⚬Φ𝜈 )(𝜇))) ′
′
thus h(𝜆) = 𝜆′ = h((Φ𝛿 ⚬ … ⚬Φ𝜈 )(𝜇)), 𝜆 = (Φ𝛿 ⚬ … ⚬Φ𝜈 )(𝜇) ∈ O+Φ (𝜇) (since Ψ𝜈 , … , Ψ𝛿 and h are bijections), and we infer that 𝜆′ ∈ h(O+Φ (𝜇)). The inclusion (4.11) is proved and, if we take into account (4.5), Eq. (4.9) follows ◽ ′
′
Corollary 4.1 We suppose that (h, h′ )∽ ∈ Iso∽ (Φ, Ψ) and let 𝜇 ∈ Bn . (a) 𝜇 is a source of Φ if and only if h(𝜇) is a sink of Ψ; (b) 𝜇 is an isolated fixed point of Φ if and only if h(𝜇) is an isolated fixed point of Ψ; (c) 𝜇 is a transient point of Φ if and only if h(𝜇) is a transient point of Ψ; (d) 𝜇 is a sink of Φ if and only if h(𝜇) is a source of Ψ. Proof: The function h is bijective and we use Eqs. (4.6) and (4.7) that give: card(𝜇Φ− ) = card(h(𝜇Φ− )) = card(h(𝜇)+Ψ ), card(𝜇Φ+ ) = card(h(𝜇Φ+ )) = card(h(𝜇)−Ψ )
◽
55
5 Invariant Sets In the dynamical systems theory (synchronicity, real time, real space), the set ⋅ A is (positively) invariant with respect to x = Φ(x) [14, 17] if x(0) ∈ A =⇒ ∀t ≥ 0, x(t) ∈ A; alternatively (synchronicity, discrete time, real space) the set A is [3, 11] (positively, or forward) invariant relatively to xk+1 = Φ(xk ) if x0 ∈ A =⇒ ∀k ≥ 0, xk ∈ A, in other words if Φ(A) ⊂ A. A different point of view on this concept gives what we might call strong invariance. The set A ⊂ X is [14], see also [1], invariant (synchronicity, real time, real space) if ∀t ≥ 0, Φt (A) = A, where Φt ∶ X −−→ X is a flow, t ∈ R. In the same interpretation of invariance we have that A is [11] invariant (synchronicity, discrete time, real space) if Φ(A) = A. Therefore, we have formalized in two versions the fact that the set A ⊂ Bn is invariant, i.e.that Φ brings the elements of A in A. The intersection and the union of the invariant sets is invariant. The sets of fixed points of Φ are invariant. The morphisms and the antimorphisms bring invariant sets in invariant sets, in particular if a function is symmetrical or antisymmetrical relative to a translation, then the translation of an invariant set is invariant. The sets A1 , … , Ak ⊂ Bn are called relatively isolated if they are invariant and disjoint two by two. The isomorphisms and the antiisomorphisms bring relatively isolated sets in relatively isolated sets.
5.1 Definition Lemma 5.1 We consider the function Ψ ∶ A −−→ A, where A ⊂ Bn , A ≠ ∅. The following statements are equivalent: (a) Ψ is bijective; (b) Ψ is injective; (c) Ψ is surjective.
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
56
5 Invariant Sets
Proof: (a) =⇒ (b) Obvious. (b) =⇒ (c) We suppose that Ψ is not surjective, i.e. ∃𝜇∗ ∈ A, ∀𝜇 ∈ A, Ψ(𝜇) ≠ ∗ 𝜇 , hence Ψ(A) ⊂ A, Ψ(A) ≠ A. In this situation, we have card(Ψ(A)) < card(A) and 𝜇, 𝜇 ′ ∈ A exist with the property that 𝜇 ≠ 𝜇′ and Ψ(𝜇) = Ψ(𝜇′ ), therefore Ψ is not injective, contradiction. (c) =⇒ (a) Let us suppose against all reason that this is false, meaning that Ψ is not injective. We infer the existence of 𝜇, 𝜇′ ∈ A with 𝜇 ≠ 𝜇′ and Ψ(𝜇) = Ψ(𝜇′ ). This implies that Ψ(A) ⊂ A, Ψ(A) ≠ A, thus Ψ is not surjective, contradiction ◽ Definition 5.1 The relations
Let the function Φ ∶ Bn −−→ Bn and the set A ⊂ Bn , A ≠ ∅.
∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A,
(5.1)
𝜈
∀𝜈 ∈ B , Φ (A) = A n
(5.2)
are called of invariance of A. We say that A is a k-invariant set, k ∈ {(5.1), (5.2)} (relative to Φ). Remark 5.1 Obviously the implication (5.2)=⇒(5.1) holds and we can think of (5.2) as of a strong version of (5.1), where for all 𝜈 ∈ Bn , the function A ∋ 𝜇 → Φ𝜈 (𝜇) ∈ A is surjective. Lemma 5.1 shows that surjectivity is equivalent with bijectivity. Remark 5.2 The (5.1)-invariance of Bn is true and this brings a triviality here. We have avoided in Definition 5.1, for convenience, the other triviality: A = ∅. Theorem 5.1 For ∅ ⊊ A ⊂ Bn and A = {𝜇|𝜇 ∈ A}, we have the equivalencies: ∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A ⇐⇒ ∀𝜈 ∈ Bn , Φ∗𝜈 (A) ⊂ A, 𝜈
∀𝜈 ∈ B , Φ (A) = A ⇐⇒ ∀𝜈 ∈ B , Φ (A) = A. n
n
∗𝜈
(5.3) (5.4)
Proof: (5.3) =⇒ Let 𝜈 ∈ Bn , 𝛿 ∈ A arbitrary and we denote 𝜇 = 𝛿. We see that 𝜇 ∈ A and Φ∗𝜈 (𝛿) = Φ𝜈∗ (𝛿) = Φ𝜈 (𝛿) = Φ𝜈 (𝜇) ∈ A. (5.4) ⇐= Let 𝜈 ∈ Bn , 𝜇′ ∈ A arbitrary and we use the notation 𝛿 ′ = 𝜇′ . Then 𝛿 ∈ A and the hypothesis states the existence of 𝛿 ∈ A with Φ∗𝜈 (𝛿) = 𝛿 ′ . We denote 𝜇 = 𝛿, thus 𝜇 ∈ A. We infer that ′
Φ𝜈 (𝜇) = Φ𝜈∗ (𝜇) = Φ∗𝜈 (𝛿) = 𝛿 ′ = 𝜇′ . The surjectivity of Φ𝜈 follows
◽
5.2 Examples
5.2 Examples Example 5.1 The identity 1Bn ∶ Bn −−→ Bn satisfies that any A ⊂ Bn , A ≠ ∅ is (5.1)-invariant and (5.2)-invariant. Example 5.2 In Figure 5.1, the only (5.1)-invariant set A ⊂ B2 is B2 itself. On the other hand, the (5.2)-invariance of B2 does not hold since, for example, Φ(1,1) (B2 ) = B2 and Φ(1,0) (B2 ) = {(1, 0), (0, 1)}. Figure 5.1 B2 is (5.1)-invariant.
Example 5.3 We consider Figure 5.2, where the sets {(0, 0)}, {(0, 1)} and {(0, 0), (0, 1)} are (5.1)-invariant and (5.2)-invariant. Note that these sets contain the fixed points of Φ. The sets {(1, 0), (1, 1), (0, 1)} and {(1, 1), (0, 1)} from the same figure are (5.1)-invariant only. Figure 5.2 The sets {(0, 0)}, {(0, 1)}, {(0, 0), (0, 1)} are (5.1)-invariant and (5.2)-invariant; {(1, 0), (1, 1), (0, 1)}, {(1, 1), (0, 1)} are (5.1)-invariant.
Example 5.4 The sets {(0, 0), (0, 1)}, {(1, 0), (1, 1)} and B2 from Figure 5.3 are (5.1)-invariant and (5.2)-invariant. There are no fixed points of Φ associated with the (5.2)-invariance of the three sets in this case. Figure 5.3 The sets {(0, 0), (0, 1)}, {(1, 0), (1, 1)} and B2 are (5.1)-invariant and (5.2)-invariant.
Remark 5.3 The previous example and many other examples of functions that fulfill (5.2) suggest that the satisfaction of (5.2) might imply ∀𝜇 ∈ A, ∀𝜈 ∈ Bn , (Φ𝜈 ⚬ Φ𝜈 )(𝜇) = 𝜇,
(5.5)
57
58
5 Invariant Sets
see Remark 4.5, page 49. This implication is false, for example the function Φ ∶ B2 −−→ B2 defined by ∀𝜇 ∈ B2 , Φ(𝜇) = (𝜇1 , 𝜇1 ⊕ 𝜇2 ) satisfies (5.2) for A = B2 ∶ ∀𝜈 ∈ Bn , Φ𝜈 (B2 ) = B2 , but Φ ⚬ Φ ≠ 1B2 , i.e. (5.5) is false for A = B2 .
5.3 Properties Theorem 5.2 Let A ⊂ Bn , A ≠ ∅ and the function Φ ∶ Bn −−→ Bn . Then the (5.1)-invariance property of A is equivalent with ∀𝜇 ∈ A, 𝜇+ ⊂ A.
(5.6)
Proof: (5.1) =⇒ (5.6) Let 𝜇 ∈ A and 𝜆 ∈ 𝜇+ arbitrary, thus 𝜈 ∈ Bn exists such that 𝜆 = Φ𝜈 (𝜇). The hypothesis states that 𝜆 ∈ A. (5.6) =⇒ (5.1) We take 𝜇 ∈ A and 𝜈 ∈ Bn arbitrary. We have Φ𝜈 (𝜇) ∈ 𝜇+ , thus 𝜈 ◽ Φ (𝜇) ∈ A Theorem 5.3 For any 𝜇 ∈ Bn , and any k ∈ {(5.1), (5.2)}, A = {𝜇} is k-invariant ⇐⇒ Φ(𝜇) = 𝜇. Proof: We choose to refer to the (5.1)-invariance. =⇒ ∀𝜈 ∈ Bn , Φ𝜈 ({𝜇}) ⊂ {𝜇} implies ∀𝜈 ∈ Bn , Φ𝜈 (𝜇) = 𝜇, i.e. for 𝜈 = (1, … , 1) we obtain Φ(𝜇) = 𝜇. ⇐= From Φ(𝜇) = 𝜇 we infer ∀𝜈 ∈ Bn , Φ𝜈 (𝜇) = 𝜇 thus ∀𝜈 ∈ Bn , 𝜈 ◽ Φ ({𝜇}) ⊂ {𝜇} Theorem 5.4 If A = {𝜇1 , … , 𝜇p } ⊂ Bn , p ≥ 2 then A is (5.1)-invariant if and only if {𝜇1 , … , 𝜇p } = 𝜇1+ ∪ … ∪ 𝜇p+ . Proof: If. We take i ∈ {1, … , p} and 𝜈 ∈ Bn arbitrary, thus Φ𝜈 (𝜇i ) ∈ 𝜇i+ . We infer Φ𝜈 (𝜇i ) ∈ {𝜇1 , … , 𝜇p }. Only if. {𝜇1 , … , 𝜇p } ⊂ 𝜇1+ ∪ … ∪ 𝜇p+ As {𝜇1 } ⊂ 𝜇1+ , … , {𝜇p } ⊂ 𝜇p+ we infer {𝜇1 , … , 𝜇p } = {𝜇1 } ∪ … ∪ {𝜇p } ⊂ 𝜇1+ ∪ … ∪ 𝜇p+ .
5.3 Properties
𝜇1+ ∪ … ∪ 𝜇p+ ⊂ {𝜇1 , … , 𝜇p } Let i ∈ {1, … , p} arbitrary. We know from Theorem 5.2 that 𝜇i+ ⊂ {𝜇1 , … , 𝜇p }, thus the inclusion follows ◽ Theorem 5.5 If for A ⊂ Bn , A ≠ ∅ we have ∀𝜇 ∈ A, Φ(𝜇) = 𝜇, then (5.2) is true. Proof: Let 𝜈 ∈ Bn arbitrary. For any 𝜇 ∈ A we have Φ𝜈 (𝜇) = Φ(𝜇) = 𝜇. This shows that (5.1) is true and, on the other hand, that the A −−→ A function A ∋ 𝜇 → Φ𝜈 (𝜇) ∈ A is injective. The surjectivity expressed by statement (5.2) holds from Lemma 5.1, page 55 ◽ Theorem 5.6 Let A, B ⊂ Bn , A ≠ ∅, B ≠ ∅. (a) We suppose that A and B are (5.1)-invariant; then1 A ∪ B is (5.1)-invariant and if A ∩ B ≠ ∅, then A ∩ B is (5.1)-invariant. (b) If A and B are (5.2)-invariant, then A ∪ B is (5.2)-invariant and if, in addition, A ∩ B ≠ ∅, then A ∩ B is (5.2)-invariant. Proof: (a) We take 𝜇 ∈ A ∪ B and 𝜈 ∈ Bn arbitrary. If 𝜇 ∈ A, then Φ𝜈 (A) ∈ A ⊂ A ∪ B due to the (5.1)-invariance of A and similarly for 𝜇 ∈ B. A ∪ B is (5.1)-invariant. We suppose now that A ∩ B ≠ ∅ and we take 𝜇 ∈ A ∩ B and 𝜈 ∈ Bn arbitrary. Φ𝜈 (𝜇) ∈ A, Φ𝜈 (𝜇) ∈ B result from the (5.1)-invariance of A, B, hence Φ𝜈 (𝜇) ∈ A ∩ B. We have obtained that A ∩ B is (5.1)-invariant. (b) We take 𝜈 ∈ Bn arbitrary; Φ𝜈 (A ∪ B) ⊂ A ∪ B follows from (a) and on the other hand the surjectivities of Ψ ∶ A −−→ A, Λ ∶ B −−→ B which are defined by ∀𝜇 ∈ A, Ψ(𝜇) = Φ𝜈 (𝜇), ∀𝜇 ∈ B, Λ(𝜇) = Φ𝜈 (𝜇) imply the surjectivity of Ω ∶ A ∪ B −−→ A ∪ B, ∀𝜇 ∈ A ∪ B, Ω(𝜇) = Φ𝜈 (𝜇), showing the (5.2)-invariance of A ∪ B. In addition, if A ∩ B ≠ ∅, the inclusion Φ𝜈 (A ∩ B) ⊂ A ∩ B follows from (a) and the injectivity of Ψ implies the injectivity of Γ ∶ A ∩ B −−→ A ∩ B, ∀𝜇 ∈ A ∩ B, Γ(𝜇) = Φ𝜈 (𝜇). This proves that A ∩ B is (5.2)-invariant 1 One notation “∪” for two different laws occurs in this book: the union of the binary numbers and the union of the sets, but no possibility of confusion exists.
◽
59
60
5 Invariant Sets
Remark 5.4 Two properties that are equivalent with the (5.1)-invariance of A = {𝜇1 , … , 𝜇p } are ∀𝜇 ∈ A, O+ (𝜇) ⊂ A, see Theorem 5.2 and {𝜇1 , … , 𝜇p } = O+ (𝜇1 ) ∪ … ∪ O+ (𝜇p ), see Theorem 5.4.
5.4 Homomorphic Functions vs Invariant Sets Theorem 5.7 The functions Φ, Ψ ∶ Bn −−→ Bn and the set A ⊂ Bn , A ≠ ∅ are given. We suppose that ∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A
(5.7)
′
holds and let (h, h ) ∈ Hom(Φ, Ψ). (a) We have ∀𝜈 ∈ Bn , Ψh (𝜈) (h(A)) ⊂ h(A); ′
(5.8)
(b) if h′ is bijective, then the invariance ∀𝜈 ∈ Bn , Ψ𝜈 (h(A)) ⊂ h(A)
(5.9)
holds. Proof: (a) We take 𝜇 ∈ h(A) and 𝜈 ∈ Bn arbitrary, thus 𝜆 ∈ A exists such that ′ h(𝜆) = 𝜇. We infer Φ𝜈 (𝜆) ∈ A, thus h(Φ𝜈 (𝜆)) ∈ h(A). But Ψh (𝜈) (𝜇) = h(Φ𝜈 (𝜆)), ′ wherefrom Ψh (𝜈) (𝜇) ∈ h(A). ◽ (b) Obvious, since (a) holds in this case with h′ surjective Theorem 5.8 We suppose that ∀𝜈 ∈ Bn , Φ𝜈 (A) = A
(5.10)
′
and let (h, h ) ∈ Iso(Φ, Ψ). Then ∀𝜈 ∈ Bn , Ψ𝜈 (h(A)) = h(A).
(5.11)
Proof: Let 𝜇, 𝜇′ ∈ h(A), 𝜇 ≠ 𝜇′ for which 𝜆, 𝜆′ ∈ A exist such that h(𝜆) = 𝜇, h(𝜆′ ) = 𝜇′ and, because h is bijective, we get 𝜆 ≠ 𝜆′ . We take 𝜈 ∈ Bn arbitrarily. As Φ𝜈 (A) = A we infer Φ𝜈 (𝜆) ≠ Φ𝜈 (𝜆′ ) and therefore h(Φ𝜈 (𝜆)) ≠ h(Φ𝜈 (𝜆′ )). We obtain Ψh (𝜈) (𝜇) = Ψh (𝜈) (h(𝜆)) = h(Φ𝜈 (𝜆)) ′
′
≠ h(Φ𝜈 (𝜆′ )) = Ψh (𝜈) (h(𝜆′ )) = Ψh (𝜈) (𝜇′ ). ′
′
As the inclusion Ψh (𝜈) (h(A)) ⊂ h(A) is true from Theorem 5.7, we get that the function Ω ∶ h(A) −−→ h(A) defined by ′
′
∀𝜇 ∈ h(A), Ω(𝜇) = Ψh (𝜈) (𝜇)
5.4 Homomorphic Functions vs Invariant Sets
is injective, therefore it is also surjective from Lemma 5.1, page 55. The statement of the theorem follows from the fact that h′ is bijective ◽ Example 5.5
Let the functions Φ, Ψ, h, h′ ∶ B2 −−→ B2 , given by ∀𝜇 ∈ B2 ,
Φ(𝜇) = (𝜇1 ∪ 𝜇2 , 𝜇1 ∪ 𝜇2 ), Ψ(𝜇) = (𝜇1 , 𝜇1 ∪ 𝜇2 ), h(𝜇) = (𝜇1 𝜇2 , 𝜇2 ), h′ (𝜇) = (𝜇1 , 𝜇2 ). The state portraits of Φ and Ψ were drawn in Figures 5.4 and 5.5. We compute for any 𝜇, 𝜈 ∈ B2 , (h ⚬ Φ𝜈 )(𝜇) = h(𝜈1 𝜇1 ∪ 𝜈1 (𝜇1 ∪ 𝜇2 ), 𝜈2 𝜇2 ∪ 𝜈2 (𝜇1 ∪ 𝜇2 )) = ((𝜈1 𝜇1 ∪ 𝜈1 (𝜇1 ∪ 𝜇2 ))𝜈2 𝜇2 ∪ 𝜈2 (𝜇1 ∪ 𝜇2 ), 𝜈2 𝜇2 ∪ 𝜈2 (𝜇1 ∪ 𝜇2 )) = ((𝜈1 𝜇1 ∪ 𝜈1 𝜇1 ∪ 𝜈1 𝜇2 )(𝜈2 ∪ 𝜇2 )(𝜈2 ∪ 𝜇1 𝜇2 ), 𝜈2 𝜇2 ∪ 𝜈2 𝜇1 ∪ 𝜈2 𝜇2 ) = ((𝜇1 ∪ 𝜈1 𝜇2 )(𝜈2 𝜇1 𝜇2 ∪ 𝜈2 𝜇2 ∪ 𝜇1 𝜇2 ), 𝜇2 ∪ 𝜈2 𝜇1 ) = (𝜇1 (𝜈2 𝜇1 𝜇2 ∪ 𝜈2 𝜇2 ∪ 𝜇1 𝜇2 ), 𝜇2 ∪ 𝜈2 𝜇1 ) = (𝜈2 𝜇1 𝜇2 ∪ 𝜈2 𝜇1 𝜇2 ∪ 𝜇1 𝜇2 , 𝜇2 ∪ 𝜈2 𝜇1 ) = (𝜇1 𝜇2 ∪ 𝜇1 𝜇2 , 𝜇2 ∪ 𝜈2 𝜇1 ) = (𝜇1 𝜇2 , 𝜇2 ∪ 𝜈2 𝜇1 ) Figure 5.4 The function Φ(𝜇) = (𝜇1 ∪ 𝜇2 , 𝜇1 ∪ 𝜇2 ).
Figure 5.5 The function Ψ(𝜇) = (𝜇1 , 𝜇1 ∪ 𝜇2 ).
61
62
5 Invariant Sets
and on the other hand (Ψ𝜈 ⚬ h)(𝜇) = Ψ𝜈 (𝜇1 𝜇2 , 𝜇2 ) = (𝜈1 𝜇1 𝜇2 ∪ 𝜈1 𝜇1 𝜇2 , 𝜈2 𝜇2 ∪ 𝜈2 (𝜇1 𝜇2 ∪ 𝜇2 )) = (𝜇1 𝜇2 , 𝜈2 𝜇2 ∪ 𝜈2 (𝜇1 ∪ 𝜇2 ∪ 𝜇2 )) = (𝜇1 𝜇2 , 𝜇2 ∪ 𝜈2 𝜇1 ). We have proved that (h, h′ ) ∶ Φ −−→ Ψ is a morphism. We take in Figure 5.4 A = {(0, 0), (0, 1), (1, 1)} and we see that h(A) = {(0, 0), (0, 1)}; as h′ is bijective, Eq. (5.9) is true and this is remarked in Figure 5.5. By taking A = {(1, 0)} in Figure 5.4, we notice that h(A) = A. Statement (5.10) is true and statement (5.11) is also true, even if h is not bijective.
5.5 Special Case of Homomorphic Functions vs Invariant Sets Corollary 5.1
For Φ ∶ Bn −−→ Bn , A ⊂ Bn , A ≠ ∅ and (h, h′ ) ∈ Hom(Φ, Φ), if
∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A, then ∀𝜈 ∈ Bn , Φh (𝜈) (h(A)) ⊂ h(A); ′
if in addition h′ is bijective, then the hypothesis implies the invariance ∀𝜈 ∈ Bn , Φ𝜈 (h(A)) ⊂ h(A). Proof: This follows from Theorem 5.7 for Ψ = Φ Corollary 5.2
◽
If
∀𝜈 ∈ Bn , Φ𝜈 (A) = A is true and (h, h′ ) ∈ Aut(Φ), then ∀𝜈 ∈ Bn , Φ𝜈 (h(A)) = h(A). Proof: This follows from Theorem 5.8 for Ψ = Φ
◽
Example 5.6 In Figure 5.3, page 57, the function Φ ∶ B2 −−→ B2 is defined by ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ). We take h ∶ B2 −−→ B2 defined by ∀𝜇 ∈ B2 ,h(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ). As for arbitrary 𝜇, 𝜈 ∈ B2 we get Φ𝜈 (𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 )
5.6 Symmetry Relative to Translations vs Invariant Sets
we can show the fact that (h, 1B2 ) ∈ Aut(Φ) in the following way: h(Φ𝜈 (𝜇)) = h(𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 Φ1 (𝜇1 , 𝜇2 ), 𝜈2 𝜇2 ∪ 𝜈2 Φ2 (𝜇1 , 𝜇2 )) = Φ𝜈 (𝜇1 , 𝜇2 ) = Φ𝜈 (h(𝜇)). For A = {(0, 0), (0, 1)} we have h(A) = {(1, 0), (1, 1)} and the invariance of A from the hypothesis of Corollary 5.2 implies the invariance of h(A) from the conclusion of the same corollary. Note that the reasoning is also true if we take A′ = {(1, 0), (1, 1)} and h(A′ ) = {(0, 0), (0, 1)}.
5.6 Symmetry Relative to Translations vs Invariant Sets Corollary 5.3 Let 𝜏 ∈ Bn , h′ ∶ Bn −−→ Bn such that (𝜃 𝜏 , h′ ) ∈ Aut(Φ), (𝜃 𝜏 , h′ ) ≠ (1Bn , 1Bn ) and A ⊂ Bn , A ≠ ∅. (a) If (5.12) ∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A then ∀𝜈 ∈ Bn , Φ𝜈 (A ⊕ 𝜏) ⊂ A ⊕ 𝜏
(5.13)
where we have denoted A ⊕ 𝜏 = 𝜃 𝜏 (A); (b) if ∀𝜈 ∈ Bn , Φ𝜈 (A) = A
(5.14)
then ∀𝜈 ∈ Bn , Φ𝜈 (A ⊕ 𝜏) = A ⊕ 𝜏.
(5.15)
Proof: Item (a) is a special case of Corollary 5.1, and item (b) is a special case of Corollary 5.2 ◽ Example 5.7 We can think in Example 5.6 that we have h(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) = 𝜃 (1,0) (𝜇1 , 𝜇2 ); then (𝜃 (1,0) , 1B2 ) ∈ Aut(Φ). Example 5.8 We show that the function Φ ∶ B2 −−→ B2 , ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) from Figure 5.3, page 57 is also symmetrical relative to the translation ∀𝜇 ∈ B2 , 𝜃 (1,1) (𝜇) = 𝜇 ⊕ (1, 1) = (𝜇1 , 𝜇2 ),
63
64
5 Invariant Sets
in the sense that (𝜃 (1,1) , 1B2 ) ∈ Aut(Φ), (𝜃 (1,1) , 1B2 ) ≠ (1B2 , 1B2 ). Indeed, for any 𝜇 ∈ B2 and any 𝜈 ∈ B2 , we can write that (𝜃 (1,1) ⚬ Φ𝜈 )(𝜇) = 𝜃 (1,1) (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = 𝜃 (1,1) (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , (𝜈2 ∪ 𝜇2 )(𝜈2 ∪ 𝜇2 )) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = Φ𝜈 (𝜇1 , 𝜇2 ) = (Φ𝜈 ⚬ 𝜃 (1,1) )(𝜇). The hypothesis of the corollary expressed by Eq. (5.14) is fulfilled by the set A = {(0, 0), (0, 1)}, thus for A ⊕ (1, 1) = {(1, 1), (1, 0)} the conclusion (5.15) is fulfilled. We note also the fact that for A′ = {(1, 1), (1, 0)} Eq. (5.14) is fulfilled, and this implies the fulfillment of (5.15) by the set A′ ⊕ (1, 1) = {(0, 0), (0, 1)}.
5.7 Antihomomorphic Functions vs Invariant Sets Theorem 5.9 The functions Φ, Ψ ∶ Bn −−→ Bn are given together with (h, h′ )∽ ∈ Hom∽ (Φ, Ψ) and let A ⊂ Bn , A ≠ ∅. We suppose that ∀𝜈 ∈ Bn , Φ𝜈 (A) = A. (a) We have
(5.16)
∀𝜈 ∈ Bn , Ψh (𝜈) (h(A)) ⊂ h(A); ′
(5.17)
(b) if h′ is bijection, then ∀𝜈 ∈ Bn , Ψ𝜈 (h(A)) ⊂ h(A); ′ ∽
(5.18)
∽
(c) if (h, h ) ∈ Iso (Φ, Ψ), then ∀𝜈 ∈ Bn , Ψ𝜈 (h(A)) = h(A)
(5.19)
holds. Proof: (a) From the hypothesis (h, h′ )∽ ∈ Hom∽ (Φ, Ψ), thus ∀𝜈 ∈ Bn the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Ψh
′ (𝜈)
Bn ←−− Bn is commutative. Let 𝜈 ∈ Bn and 𝜇 ∈ h(A) arbitrary. We get the existence of 𝜆 ∈ A such that h(𝜆) = 𝜇 and, from the hypothesis (5.16), 𝛿 ∈ A exists also with Φ𝜈 (𝛿) = 𝜆. We infer Ψh (𝜈) (𝜇) = Ψh (𝜈) (h(𝜆)) = Ψh (𝜈) (h(Φ𝜈 (𝛿))) = h(𝛿) ∈ h(A). (b) Obvious. ′
′
′
5.8 Special Case of Antihomomorphic Functions vs Invariant Sets
(c) We take 𝜈 ∈ Bn , 𝜇, 𝜇′ ∈ h(A) arbitrary such that 𝜇 ≠ 𝜇′ . We have the existence of 𝜆, 𝜆′ ∈ A with h(𝜆) = 𝜇, h(𝜆′ ) = 𝜇′ and we have 𝜆 ≠ 𝜆′ , since h is bijective. But (5.16) gives the existence of 𝛿, 𝛿 ′ ∈ A with Φ𝜈 (𝛿) = 𝜆, Φ𝜈 (𝛿 ′ ) = 𝜆′ and 𝛿 ≠ 𝛿 ′ , because Φ𝜈 is bijective itself. Therefore Ψh (𝜈) (𝜇) = Ψh (𝜈) (h(𝜆)) = Ψh (𝜈) (h(Φ𝜈 (𝛿))) = h(𝛿) ′
′
′
≠ h(𝛿 ′ ) = Ψh (𝜈) (h(Φ𝜈 (𝛿 ′ ))) = Ψh (𝜈) (h(𝜆′ )) = Ψh (𝜈) (𝜇′ ). ′
′
′
We conclude that the function h(A) ∋ 𝜇 → Ψh (𝜈) (𝜇) ∈ h(A) from (b) is injective, thus (5.19) is true ◽ ′
Remark 5.5 The hypothesis ∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A instead of (5.16) cannot produce a result of the type (5.17) for the following reason. Let 𝜈 ∈ Bn arbitrary for which Φ𝜈 (A) ≠ A and 𝜇 ∈ A∖Φ𝜈 (A). Then h(𝜇) ∈ h(A) and the situations ′ ′ Ψh (𝜈) (h(𝜇)) ∈ h(A), Ψh (𝜈) (h(𝜇)) ∉ h(A) are both possible.
5.8 Special Case of Antihomomorphic Functions vs Invariant Sets Corollary 5.4 Given Φ ∶ Bn −−→ Bn and the set A ⊂ Bn , A ≠ ∅, we suppose that ∀𝜈 ∈ Bn , Φ𝜈 (A) = A and we take (h, h′ )∽ ∈ Hom∽ (Φ, Φ). (a) We have ∀𝜈 ∈ Bn , Φh (𝜈) (h(A)) ⊂ h(A); ′
(b) if h′ is a bijection, then ∀𝜈 ∈ Bn , Φ𝜈 (h(A)) ⊂ h(A); (c) if (h, h′ )∽ ∈ Aut ∽ (Φ), we get ∀𝜈 ∈ Bn , Φ𝜈 (h(A)) = h(A). Proof: This is a consequence of Theorem 5.9
◽
Example 5.9 The function from Figure 4.2, page 47 that we have denoted by Ψ ∶ ∀𝜇 ∈ B2 , Ψ(𝜇) = (𝜇1 , 𝜇2 ) fulfills (h, 1B2 )∽ ∈ Aut ∽ (Ψ), where h ∶ B2 −−→ B2 is given by ∀𝜇 ∈ B2 , h(𝜇) = (𝜇1 , 𝜇2 ). In order to prove this assertion, we take some 𝜇, 𝜈 ∈ B2 resulting: Ψ𝜈 (𝜇) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜇2 ), Ψ𝜈 (h(Ψ𝜈 (𝜇))) = Ψ𝜈 (h(𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜇2 )) = Ψ𝜈 (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜇2 )
65
66
5 Invariant Sets
= (𝜈1 (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 ) ∪ 𝜈1 Ψ1 (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜇2 ), 𝜈2 𝜇2 ∪ 𝜈2 Ψ2 (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜇2 )) = (𝜈1 𝜇1 ∪ 𝜈1 𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 (𝜈1 ∪ 𝜇1 )(𝜈1 ∪ 𝜇1 ), 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 (𝜈1 ∪ 𝜇1 )𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) = h(𝜇). We denote A = {(0, 0), (1, 0)}, thus h(A) = {(0, 1), (1, 1)}. We have ∀𝜈 ∈ B2 , Ψ𝜈 (A) = A indeed, wherefrom ∀𝜈 ∈ B2 , Ψ𝜈 (h(A)) = h(A).
5.9 Antisymmetry Relative to Translations vs Invariant Sets Corollary 5.5 suppose that
The function Φ ∶ Bn −−→ Bn and A ⊂ Bn , A ≠ ∅ are given. We
∀𝜈 ∈ Bn , Φ𝜈 (A) = A
(5.20)
and 𝜏 ∈ Bn , h′ ∶ Bn −−→ Bn exist such that (𝜃 𝜏 , h′ )∽ ∈ Aut ∽ (Φ). Then ∀𝜈 ∈ Bn , Φ𝜈 (A ⊕ 𝜏) = A ⊕ 𝜏
(5.21)
where we have used the notation A ⊕ 𝜏 = {𝜇 ⊕ 𝜏|𝜇 ∈ A}. Proof: This is a special case of Corollary 5.4 (c), when h is the translation with 𝜏 ◽ Example 5.10 We get back to the function Φ ∶ B2 −−→ B2 , ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) from Figure 5.3, page 57 and we show that (𝜃 (1,1) , 1B2 )∽ ∈ Aut ∽ (Φ) ∶ for any 𝜇 ∈ B2 and any 𝜈 ∈ B2 we infer (Φ𝜈 ⚬ 𝜃 (1,1) ⚬ Φ𝜈 )(𝜇) = (Φ𝜈 ⚬ 𝜃 (1,1) )(𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = Φ𝜈 (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = Φ𝜈 (𝜇1 , (𝜈2 ∪ 𝜇2 )(𝜈2 ∪ 𝜇2 )) = Φ𝜈 (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜈2 (𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) ∪ 𝜈2 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 (𝜈2 ∪ 𝜇2 )(𝜈2 ∪ 𝜇2 )) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 (𝜈2 𝜇2 ∪ 𝜈2 𝜇2 )) = (𝜇1 , 𝜈2 𝜇2 ∪ 𝜈2 𝜇2 ) = (𝜇1 , 𝜇2 ) = 𝜃 (1,1) (𝜇).
5.10 Relatively Isolated Sets, Isolated Set
Similarly with the analysis that was made at Example 5.8, page 63 the hypothesis of the corollary expressed by Eq. (5.20) is satisfied by the set A = {(0, 0), (0, 1)}, therefore the conclusion (5.21) is satisfied by A ⊕ (1, 1) = {(1, 1), (1, 0)}; in addition, for A′ = {(1, 1), (1, 0)} Eq. (5.20) is true and this implies the satisfaction of (5.21) by the set A′ ⊕ (1, 1) = {(0, 0), (0, 1)}.
5.10 Relatively Isolated Sets, Isolated Set Definition 5.2 We consider the function Φ ∶ Bn −−→ Bn and the nonempty sets A1 , … , Ap ⊂ Bn , p ∈ {2, … , 2n } that are disjoint two by two: ∀i ∈ {1, … , p}, ∀j ∈ {1, … , p}, i ≠ j =⇒ Ai ∩ Aj = ∅.
(5.22)
If one of ∀i ∈ {1, … , p}, ∀𝜈 ∈ Bn , Φ𝜈 (Ai ) ⊂ Ai , 𝜈
∀i ∈ {1, … , p}, ∀𝜈 ∈ B , Φ (Ai ) = Ai n
(5.23) (5.24)
is true, then A1 , … , Ap are called k-relatively isolated, k ∈ {(5.23), (5.24)}. In particular, if ∅ ⊊ A ⊊ Bn and A, Bn ∖A are k-relatively isolated, we say that A is k-isolated. Example 5.11 (5.24)}.
In Figure 5.1, page 57 there are no k-isolated sets, k ∈ {(5.23),
Example 5.12 In Figure 5.2, page 57 the sets {(0, 0)} and {(1, 0), (1, 1), (0, 1)} are (5.23)-isolated. Example 5.13 In Figure 5.3, page 57 the sets {(0, 0), (0, 1)} and {(1, 0), (1, 1)} are k-isolated, k ∈ {(5.23), (5.24)}. Theorem 5.10 If 𝜇 ∈ Bn is an isolated fixed point of Φ ∶ Bn −−→ Bn , then {𝜇} is k-isolated, k ∈ {(5.23), (5.24)}. Proof: We choose to make the proof for (5.23). The hypothesis states that 𝜇− = 𝜇+ = {𝜇}. From 𝜇+ = {𝜇} we get ∀𝜈 ∈ Bn , Φ𝜈 (𝜇) = 𝜇, thus the invariance Φ𝜈 ({𝜇}) ⊂ {𝜇} holds. From 𝜇− = {𝜇}, we have ∀𝜈 ∈ Bn , Φ𝜈 (Bn ∖{𝜇}) ⊂ Bn ∖{𝜇}; indeed, (5.25) is equivalent with any of ∀𝜈 ∈ Bn , ∀𝜇′ ∈ Bn , 𝜇 ≠ 𝜇′ =⇒ Φ𝜈 (𝜇′ ) ≠ 𝜇, ∀𝜈 ∈ Bn , ∀𝜇′ ∈ Bn , 𝜇 = 𝜇′ or Φ𝜈 (𝜇′ ) ≠ 𝜇
(5.25)
67
68
5 Invariant Sets
and we suppose against all reason the falsity of the last statement. We have then the existence of 𝜈 ∈ Bn and 𝜇′ ∈ Bn , 𝜇′ ≠ 𝜇 with Φ𝜈 (𝜇′ ) = 𝜇, i.e. 𝜇′ ∈ 𝜇− , contradiction. Statement (5.25) is true, thus {𝜇} is (5.23)-isolated ◽ Theorem 5.11 If the sets A1 , … , Ap ⊂ Bn , p ∈ {3, … , 2n } are k-relatively isolated, k ∈ {(5.23), (5.24)}, then A1 ∪ A2 , A3 , … , Ap are k-relatively isolated. In particular, if A, B, Bn ∖(A ∪ B) are k-relatively isolated, then A ∪ B is k-isolated. Proof: We choose to refer to k = (5.23). In order to see the first statement, we notice that A1 ∪ A2 , A3 , … , Ap are disjoint two by two. The fact that ∀𝜈 ∈ Bn , Φ𝜈 (A1 ∪ A2 ) ⊂ A1 ∪ A2 has been proved at Theorem 5.6, page 59
◽
5.11 Isomorphic Functions vs Relatively Isolated Sets Theorem 5.12 Let the functions Φ, Ψ ∶ Bn −−→ Bn , the (5.23)-relatively isolated sets A1 , … , Ap ⊂ Bn , p ∈ {2, … , 2n }, in the sense that (5.22), (5.23) are true, and the isomorphism (h, h′ ) ∈ Iso(Φ, Ψ). Then the sets h(A1 ), … , h(Ak ) are (5.23)-relatively isolated, i.e. ∀i ∈ {1, … , p}, ∀j ∈ {1, … , p}, i ≠ j =⇒ h(Ai ) ∩ h(Aj ) = ∅, 𝜈
∀i ∈ {1, … , p}, ∀𝜈 ∈ B , Ψ (h(Ai )) ⊂ h(Ai ) n
(5.26) (5.27)
hold. Moreover, if (5.23) is replaced by (5.24), then (5.27) is replaced by ∀i ∈ {1, … , p}, ∀𝜈 ∈ Bn , Ψ𝜈 (h(Ai )) = h(Ai ).
(5.28)
Proof: We suppose against all reason that (5.26) is false, i.e. ∃i ∈ {1, … , p}, ∃j ∈ {1, … , p}, i ≠ j and h(Ai ) ∩ h(Aj ) ≠ ∅ and let 𝜇 ∈ h(Ai ) ∩ h(Aj ). Then 𝜇i ∈ Ai and 𝜇j ∈ Aj exist such that h(𝜇i ) = 𝜇 = h(𝜇j ).
(5.29)
But Ai ∩ Aj = ∅ implies 𝜇 ≠ 𝜇 . We have obtained a contradiction between (5.29) and the bijectivity of h. (5.26) is true. Statement (5.27) is a consequence of Theorem 5.7, page 60 and statement (5.28) results from Theorem 5.8, page 60 ◽ i
j
5.12 Antiisomorphic Functions vs Relatively Isolated Sets
5.12 Antiisomorphic Functions vs Relatively Isolated Sets Theorem 5.13 Let the functions Φ, Ψ ∶ Bn −−→ Bn , the (5.24)-relatively isolated sets A1 , … , Ap ⊂ Bn , p ∈ {2, … , 2n } and the antiisomorphism (h, h′ )∽ ∈ Iso∽ (Φ, Ψ). Then h(A1 ), … , h(Ap ) are (5.24)-relatively isolated, in the sense that ∀i ∈ {1, … , p}, ∀j ∈ {1, … , p}, i ≠ j =⇒ h(Ai ) ∩ h(Aj ) = ∅,
(5.30)
∀i ∈ {1, … , p}, ∀𝜈 ∈ Bn , Ψ𝜈 (h(Ai )) = h(Ai )
(5.31)
hold. Proof: The truth of (5.30) is proved similarly with proof of (5.26) from Theorem 5.12. Statement (5.31) follows from Theorem 5.9, page 64 ◽
69
71
6 Invariant Subsets Let ∅ ≠ A ⊂ X ⊂ Bn and Φ ∶ Bn −−→ Bn . If A is invariant, then it is called an invariant subset of X. The morphisms and the antimorphisms bring invariant subsets in invariant subsets. If X has invariant subsets, then their union is the maximal invariant subset of X. At the same time, if X has invariant subsets and if their intersection A is nonempty, then A is the minimal invariant subset of X. An invariant set X is disconnected if it has a proper invariant subset, and it is connected (or minimal) otherwise. The connected components X1 , … , Xp of X are a partition of connected sets.
6.1 Definition Definition 6.1
We consider ∅ ≠ A ⊂ X ⊂ Bn and Φ ∶ Bn −−→ Bn . If one of
∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A,
(6.1)
∀𝜈 ∈ Bn , Φ𝜈 (A) = A
(6.2)
is true, then A is called a k-invariant subset of X, k ∈ {(6.1), (6.2)}. Remark 6.1 The concept of invariance of a subset allows studying, for example the situation when X is not invariant and A is the greatest k-invariant subset of X, k ∈ {(6.1), (6.2)}. We can also think of situations like { ∀𝜈 ∈ Bn , Φ𝜈 (A) = A, (6.3) ∀𝜈 ∈ Bn , Φ𝜈 (X) ⊂ X when the properties of invariance of A and X differ.
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
72
6 Invariant Subsets
Remark 6.2 Note that the possibility when the invariance of A is weaker than the invariance of X: ⎧∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A, ⎪ n 𝜈 ⎨∃𝜈 ∈ B , Φ (A) ⊊ A, ⎪ ∀𝜈 ∈ Bn , Φ𝜈 (X) = X ⎩ does not exist. If the previous three statements would be true, then 𝜈 ∈ Bn would exist such that the restriction of Φ𝜈 at A would be injective and noninjective at the same time.
6.2 Examples Example 6.1 If X is k-invariant, for k ∈ {(6.1), (6.2)}, then it is also a k-invariant subset of itself. Example 6.2 Any k-invariant set A ⊂ Bn , k ∈ {(6.1), (6.2)} is a k-invariant subset of X = Bn . Example 6.3 In Figure 5.4, page 61, the subsets {(0, 0), (0, 1), (1, 1)}, {(0, 1), (1, 1)} of X = {(0, 0), (0, 1), (1, 1)} are (6.1)-invariant, and {(1, 1)} ⊂ X is (6.2)-invariant. Example 6.4 If 𝜇 ∈ X fulfills Φ(𝜇) = 𝜇, then A = {𝜇} is a (6.2)-invariant subset of X. Moreover, a subset A ⊂ X of fixed points of Φ is a (6.2)-invariant subset of X. Example 6.5 In Figure 5.3, page 57, the sets A = B2 , A′ = {(0, 0), (0, 1)}, A′′ = {(1, 0), (1, 1)} are (6.2)-invariant subsets of X = B2 .
6.3 Maximal Invariant Subset Definition 6.2 Let X ⊂ Bn arbitrary and A ⊂ X, A ≠ ∅. A is called the maximal invariant subset of X if one of { ∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A, (6.4) ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y ) =⇒ Y ⊂ A, { ∀𝜈 ∈ Bn , Φ𝜈 (A) = A, (6.5) ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) = Y ) =⇒ Y ⊂ A
6.3 Maximal Invariant Subset
holds. In these situations, we refer to the maximal k-invariant subset of X, k ∈ {(6.1), (6.2)}. Example 6.6 We take in Figure 5.5, page 61 X = {(0, 0), (0, 1), (1, 1)}. Then X is (6.1)-invariant, i.e. ∀𝜈 ∈ Bn , Φ𝜈 (X) ⊂ X, thus it is the maximal (6.1)-invariant subset of X. On the other hand, the (6.2)-invariant subsets of X are A = {(0, 1)}, A′ = {(1, 1)}, A′′ = {(0, 1), (1, 1)} and A′′ is the maximal (6.2)-invariant subset of X. Example 6.7 We take in Figure 3.2, page 37 X = {(0, 0), (0, 1)}. Then X does not fulfill any property of invariance and the only invariant subset of X is A = {(0, 1)} ((6.2) is true), which is also maximal. Theorem 6.1 For X ⊂ Bn , X ≠ ∅ and k ∈ {(6.1), (6.2)}, the following properties hold: (a) if X has a k-invariant subset, then it has a maximal k-invariant subset; (b) if X is k-invariant, then it is the maximal k-invariant subset of itself. Proof: In order to make a choice, we refer to k = (6.1). (a) Let A1 , … , Ap ⊂ X be the nonempty (6.1)-invariant subsets of X. In this situation, Theorem 5.6, page 59 states that the nonempty set A1 ∪ … ∪ Ap ⊂ X is (6.1)-invariant. We have Ai ⊂ A1 ∪ … ∪ Ap , i ∈ {1, … , p}. (b) The set X is the maximal subset of itself relative to the inclusion; if X is (6.1)-invariant, then it is the maximal (6.1)-invariant subset of itself ◽ Theorem 6.2 We consider the functions Φ, Ψ ∶ Bn −−→ Bn , the sets ∅ ⊊ A ⊂ X ⊂ Bn and (h, h′ ) ∈ Iso(Φ, Ψ). We have ∅ ⊊ h(A) ⊂ h(X) ⊂ Bn and (a) if the maximality property (6.4) of A holds, then the maximality property { ∀𝜈 ∈ Bn , Ψ𝜈 (h(A)) ⊂ h(A), (6.6) ∀Y , (∅ ⊊ Y ⊂ h(X) and ∀𝜈 ∈ Bn , Ψ𝜈 (Y ) ⊂ Y ) =⇒ Y ⊂ h(A) of h(A) holds also; (b) if the maximality property (6.5) of A holds, then the maximality property { ∀𝜈 ∈ Bn , Ψ𝜈 (h(A)) = h(A), (6.7) ∀Y , (∅ ⊊ Y ⊂ h(X) and ∀𝜈 ∈ Bn , Ψ𝜈 (Y ) = Y ) =⇒ Y ⊂ h(A) of h(A) holds too. Proof: (a) By Theorem 5.7, page 60, the (6.1)-invariance of A relative to Φ implies the (6.1)-invariance of h(A) relative to Ψ. Let now Y arbitrary such that ∅ ⊊ Y ⊂ h(X) and Y is (6.1)-invariant relative to Ψ. As (h−1 , h′−1 ) ∈ Iso(Ψ, Φ), we get from Theorem 5.7 that h−1 (Y ) satisfies
73
74
6 Invariant Subsets
∅ ⊊ h−1 (Y ) ⊂ X, and moreover it is (6.1)-invariant relative to Φ. The hypothesis (6.4) implies that h−1 (Y ) ⊂ A, in other words Y ⊂ h(A), therefore h(A) is the maximal (6.1)-invariant subset of h(X) relative to Ψ. (b) The proof is similar with the proof of (a) by replacing Theorem 5.7 with Theorem 5.8, page 60 ◽ Theorem 6.3 The functions Φ, Ψ ∶ Bn −−→ Bn and the sets ∅ ⊊ A ⊂ X ⊂ Bn are given, together with the antiisomorphism (h, h′ )∽ ∈ Iso∽ (Φ, Ψ). We have ∅ ⊊ h(A) ⊂ h(X) ⊂ Bn and if (6.5) is true, then the maximality (6.7) of h(A) is true. Proof: The fact that A is (6.2)-invariant relative to Φ makes from Theorem 5.9, page 64 that h(A) is (6.2)-invariant relative to Ψ. Let Y a nonempty arbitrary set such that Y ⊂ h(X) and Y is (6.2)-invariant relative to Ψ. Then h−1 (Y ) ⊂ X is nonempty and (6.2)-invariant relative to Φ, thus in accordance with the hypothesis (6.5), h−1 (Y ) ⊂ A. We infer from here that Y ⊂ h(A), i.e. h(A) is the maximal (6.2)-invariant subset of h(X) relative to Ψ ◽
6.4 Minimal Invariant Subset Definition 6.3 Let X ⊂ Bn and A ⊂ X nonempty. If one of { ∀𝜈 ∈ Bn , Φ𝜈 (A) ⊂ A, ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y ) =⇒ A ⊂ Y , { ∀𝜈 ∈ Bn , Φ𝜈 (A) = A, ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) = Y ) =⇒ A ⊂ Y
(6.8) (6.9)
holds, we use to say that A is the minimal k-invariant subset of X, k ∈ {(6.1), (6.2)}. Definition 6.4 If X is the minimal invariant subset of itself: { ∀𝜈 ∈ Bn , Φ𝜈 (X) ⊂ X, ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y ) =⇒ X ⊂ Y ,
{ ∀𝜈 ∈ Bn , Φ𝜈 (X) = X,
∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) = Y ) =⇒ X ⊂ Y
(6.10) (6.11)
then it is called k-minimal or k-connected, k ∈ {(6.1), (6.2)}. Remark 6.3 Definition 6.3 states nothing about the invariance of X, while in Definition 6.4 the invariance of X is essential.
6.4 Minimal Invariant Subset
Remark 6.4 If X has invariant subsets and if the intersection A of these sets is nonempty, then A is invariant and moreover it is the minimal invariant subset of X. Remark 6.5 Statements (6.10) and (6.11) may be written under the equivalent form { ∀𝜈 ∈ Bn , Φ𝜈 (X) ⊂ X, (6.12) ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y ) =⇒ X = Y , { ∀𝜈 ∈ Bn , Φ𝜈 (X) = X, (6.13) ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) = Y ) =⇒ X = Y . In order to notice the equivalence between the second statement (6.12) and the second statement (6.10), let Y arbitrary, fixed. We obtain the equivalent statements in succession: not (Y ≠ ∅ and Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y ) or (X ⊂ Y and Y ⊂ X), (Y = ∅ or Y ⊄ X or ∃𝜈 ∈ Bn , Φ𝜈 (Y ) ⊄ Y ) or (X ⊂ Y and Y ⊂ X), etc. Example 6.8 For the function 1Bn and X = Bn , any A ⊂ X, A ≠ ∅ is a (6.2)-invariant subset (Example 5.1, page 57) and X has no minimal invariant subset ((6.8), (6.9) are false, both of them, for any A ⊂ Bn ). Example 6.9 In Figure 5.2, page 57 the set X = {(1, 0), (1, 1), (0, 1)} is (6.1)-invariant, the subsets A = X, A′ = {(1, 1), (0, 1)}, A′′ = {(0, 1)} are all (6.1)-invariant and A′′ is the minimal (6.1)-invariant subset of X (it fulfills (6.8)). As (0, 1) is a fixed point, A′′ is also (6.2)-invariant; it is the only subset with this property, therefore it is the minimal (6.2)-invariant subset of X. Example 6.10 In Figure 5.1, page 57 X = B2 is (6.1)-minimal, i.e. it is (6.1)-invariant and it has no proper (6.1)-invariant subset. Example 6.11 In Figure 5.3, page 57: • X = {(0, 0)} is not k-invariant and it has no k-invariant subset, k ∈ {(6.1), (6.2)}. • X = {(0, 0), (0, 1), (1, 0)} is not k-invariant, k ∈ {(6.1), (6.2)}, A = {(0, 0), (0, 1)} is an invariant (6.2)-subset and it is the minimal (6.2)-invariant subset; • X = {(0, 0), (0, 1)} is (6.2)-invariant without proper k-invariant subsets, k ∈ {(6.1), (6.2)}, hence X is (6.2)-minimal; • X = B2 is (6.2)-invariant and a minimal k-invariant subset does not exist, k ∈ {(6.1), (6.2)} since A′ = {(0, 0), (0, 1)}, A′′ = {(1, 0), (1, 1)} are both (6.2)-invariant and disjoint.
75
76
6 Invariant Subsets
Remark 6.6 Statements dual to Theorems 6.2 and 6.3 hold for the minimality properties (6.8), (6.9). In particular, isomorphisms (h, h′ ) ∶ Φ −−→ Ψ and antiisomorphisms (h, h′ )∽ ∶ Φ −−→ Ψ bring the minimal set X of Φ in the minimal set h(X) of Ψ.
6.5 Connected Components Theorem 6.4 Let X ⊂ Bn nonempty and X1 , … , Xp ⊂ X, A1 , … , Aq ⊂ X two partitions of k-connected subsets of X, k ∈ {(6.1), (6.2)}. Then p = q and we have, modulo the order of these sets, X1 = A1 , … , Xp = Ap . Proof: For k = (6.1), the hypothesis states that ∀i ∈ {1, … , p}, { ∀𝜈 ∈ Bn , Φ𝜈 (Xi ) ⊂ Xi , ∀Y , (∅ ⊊ Y ⊂ Xi and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y ) =⇒ Xi = Y , and ∀j ∈ {1, … , q}, { ∀𝜈 ∈ Bn , Φ𝜈 (Aj ) ⊂ Aj , ∀Y , (∅ ⊊ Y ⊂ Aj and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y ) =⇒ Aj = Y
(6.14)
(6.15)
hold. The set X1 overlaps with one of A1 , … , Aq and we can suppose without loosing the generality that X1 ∩ A1 ≠ ∅. We infer that X1 ∩ A1 is a (6.1)-invariant subset of X1 , also a (6.1)-invariant subset of A1 and (6.14)
(6.15)
X1 = X1 ∩ A1 = A1 etc
◽
Definition 6.5 The sets X1 , … , Xp that are k-connected subsets of X, k ∈ {(6.1), (6.2)}, are called the k-connected components of X. Remark 6.7 The connected components of X are a special case of relatively isolated sets, see Definition 5.2, page 67, namely X1 , … , Xp are asked to be all minimal (without proper invariant subsets). Example 6.12 In Figure 6.1, we see that the (6.1)-connected components of B3 are X1 = {(0, 0, 0), (0, 0, 1), (0, 1, 1), (0, 1, 0)}, X2 = {(1, 0, 0), (1, 0, 1), (1, 1, 1), (1, 1, 0)}. In this example (6.2)-connected components do not exist. Example 6.13 The function from Figure 6.2 has the property that (6.2)-connected components of B2 exist, X1 = {(0, 0), (0, 1)} and X2 = {(1, 0), (1, 1)}. They are (6.1)-connected components of B2 also.
6.6 Disconnected Set
Figure 6.1 The sets X1 = {(0, 0, 0), (0, 0, 1), (0, 1, 1), (0, 1, 0)} and X2 = {(1, 0, 0), (1, 0, 1), (1, 1, 1), (1, 1, 0)} are the (6.1)-connected components of B3 . Figure 6.2 The sets X1 = {(0, 0), (0, 1)} and X2 = {(1, 0), (1, 1)} are the (6.2)-connected components of B2 .
Remark 6.8 The bijections h ∶ Bn −−→ Bn bring a partition X1 , … , Xp , p ≥ 2 of X in a partition h(X1 ), … , h(Xp ) of h(X). We get that the isomorphisms (h, h′ ) ∶ Φ −−→ Ψ and the antiisomorphisms (h, h′ )∽ ∶ Φ −−→ Ψ bring k-connected components of X relative to Φ in k-connected components of h(X) relative to Ψ, in a manner suggested by Theorems 6.2 and 6.3, page 73.
6.6 Disconnected Set Definition 6.6 Let Φ ∶ Bn −−→ Bn and the nonempty subset X ⊂ Bn . If either of { ∀𝜈 ∈ Bn , Φ𝜈 (X) ⊂ X, (6.16) ∃Y , ∅ ⊊ Y ⊊ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) ⊂ Y , { ∀𝜈 ∈ Bn , Φ𝜈 (X) = X, (6.17) ∃Y , ∅ ⊊ Y ⊊ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) = Y holds, we say that the set X is k-disconnected or k- separated and each Y like previously is called a k- separation of X, k ∈ {(6.1), (6.2)}. We use to say that X is k-separated by Y . Remark 6.9 The negation of the second statement of (6.12) is equivalent with the second statement of (6.16) and the negation of the second statement of (6.13) is equivalent with the second statement of (6.17). Remark 6.10 We notice that the k-invariant set X is k-connected if it has no proper k-invariant subset, see Definition 6.4, page 74.
77
78
6 Invariant Subsets
The k-invariant set X is k-disconnected, otherwise, i.e. if it has a proper k-invariant subset Y ; thus, there is no connection from Y to X∖Y . Remark 6.11 We suppose that Y ⊂ Bn is (5.23)page 67 isolated, see Definition 5.2, page 67. Then it is a (6.1)-separation of Bn , thus Bn is (6.1)disconnected. In this case, there is no connection from Y to Bn ∖Y and also no connection from Bn ∖Y to Y . The same is true for Y (5.24)page 67 -isolated and (6.2)-separation of Bn . Theorem 6.5 We suppose that X, Y , Z are k-invariant, k ∈ {(6.1), (6.2)}, where ∅ ⊊ Y ⊊ X, i.e. Y is a k-separation of X, and Z ⊂ X. If Z is k-minimal, then Z ⊂ Y or Z ⊂ X∖Y
(6.18)
holds. Proof: We fix k ∈ {(6.1), (6.2)} arbitrary. If, against all reason, (6.18) is false, then Z ∩ Y ≠ ∅,
(6.19)
Z ∩ (X∖Y ) ≠ ∅
(6.20)
are true. In this situation, Theorem 5.6, page 59 and (6.19) show that Z ∩ Y is k-invariant. Moreover, (6.19) and (6.20) show that Z ∩ Y ⊊ Z. We have obtained a contradiction with the supposition that Z is k-minimal ◽ Theorem 6.6 If X, X ′ ⊂ Bn nonempty are k-invariant, k ∈ {(6.1), (6.2)} and Y is a k-separation of X, then Y is a k-separation of X ∪ X ′ . Proof: Let k ∈ {(6.1), (6.2)} arbitrary. The hypothesis states that Y is k-invariant and in addition ∅ ⊊ Y ⊊ X. We have ∅ ⊊ Y ⊊ X ∪ X ′ and, as X ∪ X ′ is k-invariant, Y is a k-separation of X ∪ X ′ ◽ Theorem 6.7 (a) If X, X ′ are k-invariant, k ∈ {(6.1), (6.2)} and X ⊊ X ∪ X ′ , then X is a k-separation of X ∪ X ′ . (b) If in addition X, X ′ are k-connected, then X ∪ X ′ is k-disconnected. Proof: (a) For any k, we have ∅ ⊊ X ⊊ X ∪ X ′ and X, X ∪ X ′ are k-invariant, ◽ therefore X is a k-separation of X ∪ X ′
6.6 Disconnected Set
Theorem 6.8 We suppose that X ⊂ Bn , X ≠ ∅ is k-invariant, k ∈ {(6.1), (6.2)}∶ (a) if card(X) = 1, then X is k-connected; (b) if card(X) ≥ 2 and 𝜇 ∈ X exists with Φ(𝜇) = 𝜇, then {𝜇} is a k-separation of X; (c) if card(X) ≥ 2 and X is k-connected, then it contains no fixed points of Φ. Proof: We fix an arbitrary k. (b) As Φ(𝜇) = 𝜇 implies that {𝜇} is k-invariant and ∅ ⊊ {𝜇} ⊊ X, (b) follows. (c) If X would have, against all reason, a fixed point 𝜇 of Φ, then {𝜇} would be a k-separation of X, contradiction with the hypothesis that X is k-connected ◽ Theorem 6.9 Let the functions Φ, Ψ ∶ Bn −−→ Bn , the set X ⊂ Bn and (h, h′ ) ∈ Iso(Φ, Ψ). (a) We suppose that (6.16) is true, i.e. X is (6.1)-separated by Y . Then { ∀𝜈 ∈ Bn , Ψ𝜈 (h(X)) ⊂ h(X), (6.21) ∃Y , ∅ ⊊ Y ⊊ h(X) and ∀𝜈 ∈ Bn , Ψ𝜈 (Y ) ⊂ Y , i.e. h(X) is (6.1)-separated by Y . (b) If (6.17) is true, then { ∀𝜈 ∈ Bn , Ψ𝜈 (h(X)) = h(X), ∃Y , ∅ ⊊ Y ⊊ h(X) and ∀𝜈 ∈ Bn , Ψ𝜈 (Y ) = Y .
(6.22)
Proof: (a) The (6.1)-invariance of X relative to Φ implies from Theorem 5.7, page 60 that h(X) is (6.1)-invariant relative to Ψ. Moreover, the hypothesis (6.16) states the existence of a (6.1)-separation Y ′ of X relative to Φ. The bijectivity of h shows that ∅ ⊊ h(Y ′ ) ⊊ h(X), and Theorem 5.7 shows that h(Y ′ ) is (6.1)-invariant relative to Ψ, thus it is a (6.1)-separation of h(X) relative to Ψ. (b) The proof is similar with the proof of (a) where Theorem 5.7 is replaced by Theorem 5.8, page 60 ◽ Theorem 6.10 The antiisomorphism (h, h′ )∽ ∈ Iso∽ (Φ, Ψ) is given and X nonempty, X ⊂ Bn . If (6.17) holds, we infer the truth of (6.22). Proof: This follows from Theorem 5.9, page 64
◽
79
81
7 Path Connected Set Under the influence of graph theory, we consider paths1 as representing finite sequences of distinct points 𝜇0 , 𝜇1 , … , 𝜇k ∈ Bn with the property that 𝜇i+1 is an immediate successor of 𝜇i for each i ∈ {0, 1, … , k − 1}. By definition X ⊂ Bn nonempty is path connected if for any 𝜇 ∈ X, 𝜇′ ∈ X a path exists from 𝜇 to 𝜇′ . X is path connected if and only if any A ⊂ X nonempty is path connected. If X1 , … , Xk is a partition of path connected sets of X, these sets are called path connected components of X. The morphisms and the antimorphisms bring path connected sets to path connected sets.
7.1 Definition Definition 7.1 Let Φ ∶ Bn −−→ Bn and X ⊂ Bn nonempty. We suppose ′ that the points 𝜇, 𝜇′ ∈ X are related by the equation 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇), where 𝜈, … , 𝜈 ′ ∈ Bn (finitely many such tuples). A path from 𝜇 to 𝜇′ is by definition: the point 𝜇, if 𝜇 = 𝜇′ , respectively, the finite sequence ′ ′ 𝜇, Φ𝜈 (𝜇), … , (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) of distinct values otherwise. Remark 7.1 We note that several paths may exist from 𝜇 to 𝜇′ . On the other ′ hand, in the equation 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) written for 𝜇 ≠ 𝜇′ all of 𝜈, … , 𝜈 ′ ′ should be chosen non null in order that 𝜇, Φ𝜈 (𝜇), … , (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) are distinct.
1 In a directed graph, a directed path is a sequence of edges that connect a sequence of vertices, with the added restriction that the edges all be directed in the same direction. Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
82
7 Path Connected Set
Theorem 7.1 For X ⊂ Bn , X ≠ ∅, the properties ∀𝜇 ∈ X, X ⊂ O+ (𝜇), ′ ∀𝜇 ∈ X, ∀𝜇′ ∈ X, ∃𝜈 ∈ Bn , … , ∃𝜈 ′ ∈ Bn , 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇)
(7.1) (7.2)
are equivalent. Proof: (7.1)=⇒(7.2) Let 𝜇 ∈ X, 𝜇′ ∈ X arbitrary. The hypothesis states that ′ 𝜇′ ∈ O+ (𝜇), i.e. ∃𝜈 ∈ Bn , … , ∃𝜈 ′ ∈ Bn , 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇), etc ◽ Definition 7.2
If one of (7.1), (7.2) is true, we say that X is path connected.
Remark 7.2 Intuitively, X is path connected if for any 𝜇 ∈ X, 𝜇′ ∈ X, we have that 𝜇′ is accessible from 𝜇, i.e. a path exists, from 𝜇 to 𝜇′ . We underline the symmetry of the previous definition, in the sense that if 𝜇′ is accessible from 𝜇, then 𝜇 is accessible from 𝜇′ also. Remark 7.3 In Definitions 7.1 and 7.2, no request of invariance of X has been made, i.e. some intermediate points of a path from 𝜇 to 𝜇′ may not belong to X. The option of defining paths and path connectedness like this intends to relate the conjunction of invariance and path connectedness with the attractors, which are the topic of the next chapter. Theorem 7.2 XΦ is path connected⇐⇒ X Φ∗ = {𝜇|𝜇 ∈ X} is path connected. In the previous notations, the inferior indexes Φ, Φ∗ indicate the functions that path connectedness refers to. Proof: We refer to (7.2) and we prove =⇒ . We take 𝜇, 𝜇′ ∈ X arbitrary, therefore 𝜇, 𝜇′ ∈ X. The hypothesis states the existence of 𝜈 ∈ Bn , … , 𝜈 ′ ∈ Bn such ′ that 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇), wherefrom 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 ′ )(𝜇) = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )∗ (𝜇) ′
Theorem 1.3, page 8
=
(Φ∗𝜈 ⚬ … ⚬ Φ∗𝜈 )(𝜇).
The implication ⇐= is proved similarly
′
◽
7.2 Examples Example 7.1 The function from Figure 7.1 fulfills the property that ∀𝜇 ∈ B2 , O+ (𝜇) = B2 . In such circumstances, any nonempty subset X ⊂ B2 is path connected.
7.2 Examples
Figure 7.1 The nonempty subsets X ⊂ B2 are path connected.
Example 7.2 In Figure 7.2, we have a function with ∀𝜇 ∈ {(0, 0), (0, 1)}, O+ (𝜇) = {(0, 0), (0, 1)} and ∀𝜇 ∈ {(1, 0), (1, 1)}, O+ (𝜇) = {(1, 0), (1, 1)}. We infer in this case that any nonempty X ⊂ {(0, 0), (0, 1)} and any nonempty X ⊂ {(1, 0), (1, 1)} is path connected. Figure 7.2 The nonempty subsets X ⊂ {(0, 0), (0, 1)} and X ⊂ {(1, 0), (1, 1)} are path connected.
Example 7.3 We have in Figure 7.3 a function for which O+ (0, 0) = O+ (1, 1) = B2 . A nonempty set X ⊂ {(0, 0), (1, 1)} fulfills ∀𝜇 ∈ X, X ⊂ B2 , i.e. X is path connected. Figure 7.3 The nonempty subsets X ⊂ {(0, 0), (1, 1)} are path connected.
Example 7.4 In Figure 7.4, we have O+ (0, 0) = O+ (1, 1) = O+ (0, 1) = B2 , and any nonempty set X ⊂ {(0, 0), (1, 1), (0, 1)} is path connected. Figure 7.4 The nonempty subsets X ⊂ {(0, 0), (1, 1), (0, 1)} are path connected.
Example 7.5 In Figures 3.3 and 3.4, page 40, the set B2 is path connected. Any nonempty subset X of B2 is path connected also, even if some paths have intermediate points that do not belong to X.
83
84
7 Path Connected Set
7.3 Properties Theorem 7.3 Let X ⊂ Bn , X ≠ ∅. (a) If card(X) = 1, then X is path connected; (b) if card(X) ≥ 2 and X contains a fixed point of Φ, then it is not path connected; (c) we suppose that card(X) ≥ 2 and X is path connected; then X does not contain a fixed point of Φ. Proof: (a) For X = {𝜇}, (7.1) takes the form {𝜇} ⊂ O+ (𝜇). (b) We suppose against all reason that 𝜇, 𝜇′ ∈ X exist with 𝜇 ≠ 𝜇′ and Φ(𝜇) = 𝜇. We obtain 𝜇′ ∉ {𝜇} = O+ (𝜇), contradiction with (7.1). (c) The supposition against all reason that X contains a fixed point of Φ contradicts (7.1), like at (b) ◽ Theorem 7.4 Let ∅ ⊊ X ⊂ Bn . (a) If X is path connected, then any A ⊂ X, A ≠ ∅ is path connected, in particular a nonempty intersection of path connected sets is path connected. (b) If any A ⊂ X, A ≠ ∅ is path connected, then X is path connected. Proof: (a) If A ⊂ X is nonempty, then for any 𝜇 ∈ A we have A ⊂ X ⊂ O+ (𝜇), thus A is path connected ◽ Theorem 7.5 If X1 , X2 ⊂ Bn are path connected and X1 ∩ X2 ≠ ∅, then X1 ∪ X2 is path connected. Proof: We take 𝜇, 𝜇′ ∈ X1 ∪ X2 arbitrary. If 𝜇, 𝜇′ ∈ X1 , then 𝜈, … , 𝜈 ′ ∈ Bn ′ obviously exist such that 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) and the situation is similar ′ for 𝜇, 𝜇 ∈ X2 . We suppose now that 𝜇 ∈ X1 , 𝜇′ ∈ X2 and let 𝜇′′ ∈ X1 ∩ X2 arbitrary. From the path connectedness of X1 and X2 , we have the existence of ′ ′ 𝜈, … , 𝜈 ′ , 𝜔, … , 𝜔′ ∈ Bn with 𝜇′′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇), 𝜇′ = (Φ𝜔 ⚬ … ⚬ Φ𝜔 )(𝜇′′ ). ′ 𝜔 𝜔′ 𝜈 𝜈′ We conclude that 𝜇 = (Φ ⚬ … ⚬ Φ ⚬ Φ ⚬ … ⚬ Φ )(𝜇) ◽
7.4 Path Connected Components Definition 7.3 We consider the nonempty set X ⊂ Bn and the partition X1 , … , Xk ⊂ X of path connected subsets of X, k ≥ 2. Then X1 , … , Xk are called path connected components of X.
7.6 Antimorphisms vs Path Connectedness
Remark 7.4 Note that in Definition 7.3, X is not necessarily path connected and, on the other hand, that the partition X1 , … , Xk is not unique. Example 7.6 We have in Figure 7.5, the two sets X1 = {(0, 0, 0), (0, 0, 1), (0, 1, 0), (0, 1, 1)} and X2 = {(1, 0, 0), (1, 0, 1), (1, 1, 0), (1, 1, 1)}, which are path connected components of B3 . We can partition X1 and X2 and get new path connected components of B3 . Figure 7.5 The sets X1 = {(0, 0, 0), (0, 0, 1), (0, 1, 0), (0, 1, 1)}, X2 = {(1, 0, 0), (1, 0, 1), (1, 1, 0), (1, 1, 1)} are path connected components of B3 .
7.5 Morphisms vs Path Connectedness Theorem 7.6 Let Φ, Ψ ∶ Bn −−→ Bn and X ⊂ Bn nonempty. If XΦ is path connected and (h, h′ ) ∈ Hom(Φ, Ψ), then h(X)Ψ is path connected. Proof: We take 𝜆, 𝜆′ ∈ h(X) arbitrary, thus 𝜇, 𝜇′ ∈ X exist with h(𝜇) = ′ 𝜆, h(𝜇′ ) = 𝜆′ . Then 𝜈 ∈ Bn , … , 𝜈 ′ ∈ Bn exist with (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) = 𝜇′ , wherefrom 𝜆′ = h(𝜇′ ) = h((Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇)) = (h ⚬ Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) ′
′
= (Ψh (𝜈) ⚬ h ⚬ … ⚬ Φ𝜈 )(𝜇) = … = (Ψh (𝜈) ⚬ … ⚬ h ⚬ Φ𝜈 )(𝜇) ′
′
′
′
= (Ψh (𝜈) ⚬ … ⚬ Ψh (𝜈 ) ⚬ h)(𝜇) = (Ψh (𝜈) ⚬ … ⚬ Ψh (𝜈 ) )(h(𝜇)) ′
′
′
′
′
′
◽
= (Ψh (𝜈) ⚬ … ⚬ Ψh (𝜈 ) )(𝜆) ′
′
′
7.6 Antimorphisms vs Path Connectedness Theorem 7.7 If XΦ is path connected and (h, h′ )∽ ∈ Hom∽ (Φ, Ψ), then h(X)Ψ is path connected. Proof: We take some arbitrary 𝜆, 𝜆′ ∈ h(X). This gives the existence of 𝜇, 𝜇′ ∈ X such that h(𝜇′ ) = 𝜆 and h(𝜇) = 𝜆′ . The path connectedness of XΦ implies the ′ existence of 𝜈 ∈ Bn , … , 𝜈 ′ ∈ Bn with (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) = 𝜇′ , and we get: 𝜆′ = h(𝜇) = (Ψh (𝜈 ) ⚬ h ⚬ Φ𝜈 )(𝜇) = … ′
′
′
= (Ψh (𝜈 ) ⚬ … ⚬ Ψh (𝜈) ⚬ h ⚬ Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) ′
′
′
′
= (Ψh (𝜈 ) ⚬ … ⚬ Ψh (𝜈) )(h((Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇))) ′
′
′
′
= (Ψh (𝜈 ) ⚬ … ⚬ Ψh (𝜈) )(h(𝜇′ )) = (Ψh (𝜈 ) ⚬ … ⚬ Ψh (𝜈) )(𝜆) ′
′
′
′
′
′
◽
85
87
8 Attractors In [16], the attractors X are defined (with different notations) by Andrew Ilachinski in a real space, real time, synchronous context with the following words: ‘Although there is no universally accepted definition of an attractor, it is intuitively reasonable to demand that it satisfies the following three properties: (i) Invariance, X is invariant under the map Φ ∶ Φ(X) = X; (ii) Attractivity, there is an open neighborhood U containing X such that all points x(t) ∈ U −−→ X as t −−→ ∞. The set of initial points x∗i (t = 0) such that x∗i (t) approaches X is called the basin of attraction of X, (iii) Irreducibility, X cannot be partitioned into two nonoverlapping invariant and attracting pieces. A more technical demand is that of topological transitivity: there must exist a point x∗ ∈ X such that for all x ∈ X there exists a positive time T such that x∗ (T) is arbitrarily close to x’ (the author cites David Ruelle, Floris Takens, Jean-Pierre Eckmann, and Robert Devaney in this definition). In a Boolean asynchronous frame, attractivity is trivial since we can take U = X 1 and invariance refers to the strong version ∀𝜈 ∈ Bn , Φ𝜈 (X) = X. Adding to invariance either of: minimality (which is (iii) from above), topological transitivity and path connectedness proves to bring equivalent definitions of attractors. In [23], John Milnor refers (his notations are different from ours) to real space, discrete time synchronous dynamical systems, consisting of a locally compact metric space together with a function Φ from the metric space to itself which describes the evolution of the system in one time step. He mentions that there are completely analogous definitions for systems with continuous time, which are usually defined by autonomous differential equations: ‘Let H be a compact set such that Φ(H) is contained in the interior of H. Then the intersection X of the nested sequence of sets H ⊃ Φ(H) ⊃ (Φ ⚬ Φ)(H) ⊃ … will be called a trapped attractor, with H as trapping neighborhood’ (or trapped attracting set)…‘This intersection is always invariant, Φ(X) = X.’ We have adopted so far the Boolean weak invariance request ∀𝜈 ∈ Bn , Φ𝜈 (H) ⊂ H 1 In the discrete topology of Bn , all its subsets are open and closed at the same time. Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
88
8 Attractors
and X = H ∩
⋂
Φ𝜈 (H) ∩ … ∩
𝜈∈Bn
⋂
(Φ𝜈 ⚬ … ⚬ Φ𝜈 )(H) ∩ … and we shall ′
𝜈∈Bn ,…,𝜈 ′ ∈Bn
prove at Theorem 8.1 that ∀𝜈 ∈ Bn , Φ𝜈 (X) = X. Milnor continues: ‘The word attractor is usually reserved for an attracting set that contains a dense orbit. (This condition insures that it is not just the union of smaller attracting sets.)’ Things are similar with the previous irreducibility of Ilachinski and with our demand of minimality. Several other authors [1, 3, 13, 17] define the attractors in a manner that proves to be equivalent to Milnor’s definition. Such suggestions that we have grouped around the ideas of Ilachinski and Milnor bring us a unique concept of attractor and its study continues the previous research on invariance and path connectedness. We prove that any X ⊂ Bn , X ≠ ∅ with ∀𝜈 ∈ Bn , Φ𝜈 (X) = X accepts a partition of attractors.
8.1 Preliminaries Theorem 8.1 The function Φ ∶ Bn −−→ Bn and the set H ⊂ Bn , H ≠ ∅ are considered. We suppose that ∀𝜈 ∈ Bn , Φ𝜈 (H) ⊂ H,
(8.1)
and we define the sequence of sets: X0 = H, ⋂ X1 = Φ𝜈 (H), 𝜈∈Bn
⋮ ⋂ ⋂ 1 k Xk = ... (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(H), 𝜈 1 ∈Bn
⋮
(8.2)
𝜈 k ∈Bn
Xk is descending and convergent toward a limit X = lim Xk . If X ≠ ∅, we have k→∞
∀𝜈 ∈ Bn , Φ𝜈 (X) = X.
(8.3)
Proof: We have indeed ⋂ (8.1) Φ𝜈 (H) ⊂ H,
(8.4)
𝜈∈Bn
thus X1 ⊂ X0 . Moreover, ⋂ ⋂ 1 2 X2 = (Φ𝜈 ⚬ Φ𝜈 )(H) 𝜈 1 ∈Bn 𝜈 2 ∈Bn
=
⋂
𝜈 1 ∈Bn
Φ𝜈 ( 1
⋂
𝜈 2 ∈Bn
(8.4)
Φ𝜈 (H)) ⊂ 2
⋂
Φ𝜈 (H) = X1 1
𝜈 1 ∈Bn
and the fact that Xk is descending is proved by induction on k.
8.2 Definition
Let now k1 ∈ N with the property that ∀k ≥ k1 , Xk = Xk1 and the hypothesis states that X = Xk1 is nonempty. We can write that ⋂ ⋂ ⋂ 1 2 k1 +1 Xk1 +1 = … (Φ𝜈 ⚬ Φ𝜈 ⚬ … ⚬ Φ𝜈 )(H) 𝜈 1 ∈Bn 𝜈 2 ∈Bn
=
⋂
Φ (
𝜈 1 ∈Bn
therefore ⋂ 𝜈 1 ∈Bn
𝜈1
𝜈 k1 +1 ∈Bn
⋂
𝜈 2 ∈Bn
…
⋂
(Φ𝜈 ⚬ … ⚬ Φ𝜈
𝜈 k1 +1 ∈Bn
Φ𝜈 (Xk1 ) = Xk1 . 1
Equation (8.5) is equivalent with (8.3)
2
k1 +1
)(H)) =
⋂ 𝜈 1 ∈Bn
Φ𝜈 (Xk1 ), 1
(8.5) ◽
Theorem 8.2 Let X ⊂ Bn nonempty. The following properties are equivalent: (a) H exists, X ⊂ H ⊂ Bn such that the invariance (8.1) holds and the sequence Xk defined at (8.2) has the limit X, (b) X satisfies the invariance property (8.3). Proof: (a) =⇒ (b) We suppose the existence of H such that X ⊂ H ⊂ Bn and (8.1) is true. The fact that Xk that are defined by (8.2) have the limit X implies (8.3) was proved at Theorem 8.1. (b) =⇒ (a) If X satisfies (8.3), then the sequence (8.2) defined for H = X is ◽ constant Xk = X and has the limit X. (8.3) implies also (8.1) Remark 8.1 The previous reasoning allows thinking of attractors as defined by Milnor, translated in a Boolean context, as sets X fulfilling (8.3) and also minimality. This gives the same point of view on attractors like Ilachinski’s.
8.2 Definition Definition 8.1 We consider the function Φ ∶ Bn −−→ Bn and the nonempty set X ⊂ Bn . If X fulfills one of { ∀𝜈 ∈ Bn , Φ𝜈 (X) = X, (8.6) ′ ∃𝜇∗ ∈ X, ∀𝜇 ∈ X, ∃𝜈 ∈ Bn , … , ∃𝜈 ′ ∈ Bn , (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇∗ ) = 𝜇, { ∀𝜈 ∈ Bn , Φ𝜈 (X) = X, (8.7) ′ ∀𝜇 ∈ X, ∀𝜇′ ∈ X, ∃𝜈 ∈ Bn , … , ∃𝜈 ′ ∈ Bn , (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) = 𝜇′ , { ∀𝜈 ∈ Bn , Φ𝜈 (X) = X, (8.8) ∀Y , (∅ ⊊ Y ⊂ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) = Y ) =⇒ X = Y , it is called attractor.
89
90
8 Attractors
Remark 8.2 The concept of attractor has many definitions in literature and for this reason its binary translation can be made in different ways. We shall prove later, in Theorem 8.6, that (8.6)–(8.8) are equivalent. We notice for the moment that • in (8.6) we have topological transitivity; • in (8.7) we have path connectedness; • in (8.8) we have minimality (connectedness). Example 8.1 We have drawn in Figure 8.1 the state portrait of the function Φ ∶ B3 −−→ B3 , Φ(𝜇1 , 𝜇2 , 𝜇3 ) = (𝜇1 ⊕ 𝜇3 , 𝜇2 , 𝜇2 ⊕ 𝜇3 ). X = {(0, 1, 0), (0, 1, 1), (1, 1, 1), (1, 1, 0)} fulfills all of (8.6), … , (8.8). Figure 8.1 The set X = {(0, 1, 0), (0, 1, 1), (1, 1, 1), (1, 1, 0)} is an attractor.
8.3 Properties Theorem 8.3 Let X ⊂ Bn nonempty and we ask that ∀𝜈 ∈ Bn , Φ𝜈 (X) = X. The following statements are equivalent: (a) X is disconnected: ∃X1 , ∅ ⊊ X1 ⊊ Xand ∀𝜈 ∈ Bn , Φ𝜈 (X1 ) = X1 ,
(8.9)
(b) X1 ⊂ X, X2 ⊂ X nonempty exist with X1 ∩ X2 = ∅, X1 ∪ X2 = X and Xi are invariant: ∀i ∈ {1, 2}, ∀𝜈 ∈ Bn , Φ𝜈 (Xi ) = Xi . Proof: (a) =⇒ (b) Let X1 a separation of X, thus (8.9) is true. As X∖X1 ≠ ∅, studying its invariance makes sense. Let us suppose that (b) is false, namely that ∃𝜈 ∈ Bn , Φ𝜈 (X∖X1 ) ≠ X∖X1 .
(8.10)
8.3 Properties
As Φ𝜈 restricted to X is bijective, we infer that Φ𝜈 restricted to X∖X1 is injective and (8.10) implies ∃𝜇 ∈ X, 𝜇 ∉ X1 , Φ𝜈 (𝜇) ∈ X1 . From the invariance of X1 , we infer that 𝜇 = (Φ𝜈 )−1 (Φ𝜈 (𝜇)) ∈ X1 , contradiction. The statement of the theorem is true for X2 = X∖X1 . ◽ (b) =⇒ (a) X1 is a separation of X, thus X is disconnected Remark 8.3 Theorem 8.3 cannot be stated for the ∀𝜈 ∈ Bn , Φ𝜈 (X) ⊂ X invariance of X ∶ note that in the proof of (a)=⇒(b) we have used the bijectivity of Φ𝜈 restricted to X. Theorem 8.4 Let X ⊂ Bn nonempty such that ∀𝜈 ∈ Bn , Φ𝜈 (X) = X
(8.11)
is true. Then (a) ∀𝜈 ∈ Bn , ∀𝜇 ∈ X, the sequence 𝜇, (Φ𝜈 )(𝜇), (Φ𝜈 )(2) (𝜇), … is periodic. (b) p ≥ 1 exists such that ∀𝜈 ∈ Bn , ∀𝜇 ∈ X, (Φ𝜈 )(p) (𝜇) = 𝜇,
(8.12) 𝜈
i.e. if we denote abusively with the same symbol Φ the restriction of this function to X, we have (Φ𝜈 )−1 = (Φ𝜈 )(p−1) . Proof: (a) We take 𝜈 ∈ Bn , 𝜇 ∈ X arbitrary and fixed. As X is a finite set, the values of the sequence 𝜇, (Φ𝜈 )(𝜇), (Φ𝜈 )(2) (𝜇), … are finitely many, they repeat. We denote with 𝜇′ the first value that repeats and we claim that 𝜇 = 𝜇′ . If this would not be true, then we would have the existence of p ≥ 1, p′ ≥ 1 with 𝜇′ = (Φ𝜈 )(p) (𝜇) = (Φ𝜈 )(p+p ) (𝜇), ′
meaning that (Φ𝜈 )(p−1) (𝜇) ≠ (Φ𝜈 )(p+p −1) (𝜇) ′
and
Φ𝜈 ((Φ𝜈 )(p−1) (𝜇)) = Φ𝜈 ((Φ𝜈 )(p+p −1) (𝜇)) ′
are true, representing a contradiction with the bijectivity of Φ𝜈 restricted to X. It has resulted that 𝜇 = 𝜇′ and p ≥ 1 exists with 𝜇 = (Φ𝜈 )(p) (𝜇). The sequence from the statement of the theorem is periodic with the period p.
91
92
8 Attractors
(b) Let 𝜈 ∈ Bn , 𝜇 ∈ X arbitrary for which the sequence 𝜇, (Φ𝜈 )(𝜇), (Φ𝜈 )(2) (𝜇), … is periodic from item (a) and we denote with p𝜈,𝜇 its least period. The set P = {p𝜈,𝜇 |𝜈 ∈ Bn , 𝜇 ∈ X} is finite and we use the notation p for the least common multiple of p𝜈,𝜇 ∈ P. p satisfies equation (8.12) for all 𝜈 ∈ Bn and 𝜇 ∈ X ◽ Theorem 8.5 We suppose that ∀𝜈 ∈ Bn , (8.11) holds and we take an arbitrary 𝜇 ∈ X. The set O+ (𝜇) satisfies: (a) ∀𝜈 ∈ Bn , Φ𝜈 (O+ (𝜇)) = O+ (𝜇), (b) it is path connected: ∀𝜇′ ∈ O+ (𝜇), ∀𝜇′′ ∈ O+ (𝜇), ∃𝜈 ∈ Bn , … , ∃𝜈 ′ ∈ Bn , 𝜇′′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇′ ). ′
Proof: (a) Let 𝜈 ∈ Bn arbitrary, fixed. We prove Φ𝜈 (O+ (𝜇)) ⊂ O+ (𝜇) and we take for this 𝜇′ ∈ O+ (𝜇) arbitrary. We infer the existence of ′ ′′ ′ 𝜈 ′ ∈ Bn , … , 𝜈 ′′ ∈ Bn with 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇). Obviously (Φ𝜈 ⚬ Φ𝜈 ′′ ⚬ … ⚬ Φ𝜈 )(𝜇) ∈ O+ (𝜇). We prove now O+ (𝜇) ⊂ Φ𝜈 (O+ (𝜇)) and we take for this 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) ∈ O+ (𝜇) arbitrary, where 𝜈 ′ ∈ Bn , … , 𝜈 ′′ ∈ Bn . From Theorem 8.4, we get the existence of p ≥ 1 with the property that ∀𝜇 ∈ X, ′
′′
(Φ𝜈 )(p) (𝜇) = 𝜇. We have 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) = (Φ𝜈 ⚬ (Φ𝜈 )−1 )(Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) ′
′′
′
′′
= (Φ𝜈 ⚬ (Φ𝜈 )(p−1) ⚬ Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) ∈ Φ𝜈 (O+ (𝜇)). ′
′′
(b) We take 𝜇′ ∈ O+ (𝜇), 𝜇′′ ∈ O+ (𝜇) arbitrary, fixed. From the way that O+ (𝜇) was defined, 𝜈, … , 𝜈 ′ , 𝜔, … , 𝜔′ ∈ Bn exist such that 𝜇′ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇), ′
𝜇′′ = (Φ𝜔 ⚬ … ⚬ Φ𝜔 )(𝜇). ′
We infer that 𝜇′′ = ((Φ𝜔 ⚬ … ⚬ Φ𝜔 ) ⚬ (Φ𝜈 ⚬ … ⚬ Φ𝜈 )−1 )(𝜇′ ) ′
′
= (Φ𝜔 ⚬ … ⚬ Φ𝜔 ⚬ (Φ𝜈 )−1 ⚬ … ⚬ (Φ𝜈 )−1 )(𝜇′ ). ′
′
8.3 Properties
From Theorem 8.4, we have the existence of p ≥ 1 with (Φ𝜈 )−1 = (Φ𝜈 )(p−1) , … , (Φ𝜈 )−1 = (Φ𝜈 )(p−1) , therefore ′
′
𝜇′′ = (Φ𝜔 ⚬ … ⚬ Φ𝜔 ⚬ (Φ𝜈 )(p−1) ⚬ … ⚬ (Φ𝜈 )(p−1) )(𝜇′ ) ′
◽
′
Theorem 8.6 We consider the function Φ ∶ Bn −−→ Bn . For X ⊂ Bn , X ≠ ∅ the statements (8.6), (8.7) and (8.8) are equivalent. Proof: (8.6) =⇒ (8.7) Let 𝜇∗ ∈ X with the property that for arbitrary, fixed 𝜇 ∈ X, we have the existence of 𝜈, … , 𝜈 ′ ∈ Bn such that (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇∗ ) = 𝜇. ′
The restrictions of Φ𝜈 , … , Φ𝜈 to X are bijective, thus we can write: ′
𝜇∗ = (Φ𝜈 ⚬ … ⚬ Φ𝜈 )−1 (𝜇) = ((Φ𝜈 )−1 ⚬ … ⚬ (Φ𝜈 )−1 )(𝜇) ′
′
and p ≥ 1 exists with the property that (Φ𝜈 )−1 = (Φ𝜈 )(p−1) , … , (Φ𝜈 )−1 = ′ (Φ𝜈 )(p−1) . We have ′
𝜇∗ = ((Φ𝜈 )(p−1) ⚬ … ⚬ (Φ𝜈 )(p−1) )(𝜇). ′
We take now an arbitrary 𝜇′ ∈ X, for which 𝜔, … , 𝜔′ ∈ Bn exist with 𝜇′ = (Φ𝜔 ⚬ … ⚬ Φ𝜔 )(𝜇∗ ). ′
We conclude that 𝜇′ = (Φ𝜔 ⚬ … ⚬ Φ𝜔 )(((Φ𝜈 )(p−1) ⚬ … ⚬ (Φ𝜈 )(p−1) )(𝜇)) ′
′
= (Φ𝜔 ⚬ … ⚬ Φ𝜔 ⚬ (Φ𝜈 )(p−1) ⚬ … ⚬ (Φ𝜈 )(p−1) )(𝜇). ′
′
(8.7)=⇒(8.6) Obvious. (8.7)=⇒(8.8) We suppose against all reason the existence of Y with ∅ ⊊ Y ⊊ X and ∀𝜈 ∈ Bn , Φ𝜈 (Y ) = Y . Theorem 8.3 shows that X∖Y is invariant. Let 𝜇 ∈ Y and 𝜇′ ∈ X∖Y , for which we have the existence of 𝜈 ∈ Bn , … , 𝜈 ′ ∈ Bn with 𝜇′ = ′ (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇). This equation together with the invariance of Y gives 𝜇′ ∈ Y , contradiction. Such a 𝜇′ does not exist, thus X = Y . (8.8)=⇒(8.7) We suppose the contrary, namely that 𝜇, 𝜇′ ∈ X exist such that ∀𝜈 ∈ Bn , … , ∀𝜈 ′ ∈ Bn , 𝜇′ ≠ (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇). ′
But the set O+ (𝜇) = {(Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇)|𝜈 ∈ Bn , … , 𝜈 ′ ∈ Bn } ′
satisfies ∀𝜈 ∈ Bn , Φ𝜈 (O+ (𝜇)) = O+ (𝜇) from Theorem 8.5, therefore 𝜇′ ∈ X∖ O+ (𝜇). A contradiction has resulted with the supposition that X is minimal ◽
93
94
8 Attractors
Corollary 8.1 Let X ⊂ Bn , X ≠ ∅. The fact that ∀𝜈 ∈ Bn , the invariance (8.11) holds, implies the existence of the partition X1 , … , Xp of X, which is unique modulo the order of these sets, such that (a) ∀𝜈 ∈ Bn , ∀i ∈ {1, … , p}, Φ𝜈 (Xi ) = Xi , (b) X1 , … , Xp are minimal, path connected and topologically transitive. Proof: We take 𝜇 ∈ X arbitrary and define X1 = O+ (𝜇). Theorem 8.5 shows that X1 is invariant and path connected. On the other hand Theorem 8.3 (a)=⇒ (b), page 90 shows that X∖X1 is invariant, thus we can take 𝜇′ ∈ X∖X1 arbitrary for which we define X2 = O+ (𝜇′ ). As X2 is invariant and path connected, we continue the reasoning with X∖(X1 ∪ X2 ). In p steps we obtain the partition X1 , … , Xp of X that satisfies the requirements of invariance and path connectedness. By Theorem 8.6, path connectedness implies minimality and topological transitivity. The uniqueness of the partition X1 , … , Xp follows from Theorem 6.4, page 76 ◽
8.4 Morphisms vs Attractors Theorem 8.7 The functions Φ, Ψ ∶ Bn −−→ Bn are considered together with (h, h′ ) ∈ Iso(Φ, Ψ) and we take X ⊂ Bn , X ≠ ∅. If X is attractor, then h(X) is attractor. Proof: We suppose that (8.7) is true. The invariance ∀𝜈 ∈ Bn , Φ𝜈 (X) = X
(8.13)
implies from Theorem 5.8, page 60 the invariance ∀𝜈 ∈ Bn , Ψ𝜈 (h(X)) = h(X).
(8.14)
On the other hand, the path connectedness of XΦ : ∀𝜇 ∈ X, ∀𝜇′ ∈ X, ∃𝜈 ∈ Bn , … , ∃𝜈 ′ ∈ Bn , (Φ𝜈 ⚬ … ⚬ Φ𝜈 )(𝜇) = 𝜇′ ′
implies from Theorem 7.6, page 85 the path connectedness of h(X)Ψ
◽
8.5 Antimorphisms vs Attractors
8.5 Antimorphisms vs Attractors Theorem 8.8 Let Φ, Ψ ∶ Bn −−→ Bn , (h, h′ )∽ ∈ Iso∽ (Φ, Ψ) nonempty. If X is attractor, then h(X) is also attractor.
and
X ⊂ Bn
Proof: If (8.13) is true, then the invariance (8.14) takes place, from Theorem 5.9, page 64. If in addition, XΦ is path connected, then h(X)Ψ is path connected, from Theorem 7.7, page 85 ◽
95
97
9 The Technical Condition of Proper Operation We suppose that the model of a circuit is represented by the function Φ ∶ Bn −−→ Bn . The situation when 𝜇 ∈ Bn exists such that card({i|i ∈ {1, … , n}, Φi (𝜇) ≠ 𝜇i }) > 1 is called a race, the coordinates i, j with Φi (𝜇) ≠ 𝜇i , Φj (𝜇) ≠ 𝜇j are “racing” to see which one can change first and this generates an unpredictable behavior of the circuit, since the speeds of computation of Φi and Φj are not known. To avoid the races that could occur, Φ is sometimes specified so that for any 𝜇, at most one its coordinates can change when Φ is computed; such a circuit is called race-free and we also say that Φ fulfills the technical condition of proper operation (tcpo). We have that Φ fulfills tcpo⇐⇒ ∀𝜈 ∈ Bn , Φ𝜈 fulfills tcpo⇐⇒ ∀𝜇 ∈ Bn , 𝜇− = {𝜇} ∪ Φ−1 (𝜇) ⇐⇒ ∀𝜇 ∈ Bn , 𝜇+ = {𝜇} ∪ {Φ(𝜇)}. Certain special forms of Φ−1 (𝜇) and 𝜇− give also equivalent conditions with the fact that Φ fulfills tcpo. The sources, the isolated fixed points, the transient points and the sinks are characterized in terms of Φ−1 (𝜇) when tcpo is satisfied. We show that, in certain circumstances, the isomorphisms and the antiisomorphisms bring functions that fulfill tcpo in functions that fulfill tcpo.
9.1 Definition Theorem 9.1 For Φ ∶ Bn −−→ Bn , the following statements (a), (b), (c) are equivalent: (a) ∀𝜇 ∈ Bn , (9.1) card(Φ𝜇 ) ∈ {0, 1}, see Definition 1.12 and Remark 1.16, page 12, where Φ𝜇 is the set of the unstable coordinates of 𝜇; (b) ∀𝜇 ∈ Bn , one of the following properties is true: Φ(𝜇) = 𝜇,
(9.2)
∃i ∈ {1, … , n}, Φ(𝜇) = 𝜇 ⊕ 𝜀 ; i
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
(9.3)
98
9 The Technical Condition of Proper Operation
(c) ∀𝜇 ∈ Bn , one of the following properties is true: Φ−1 (𝜇) = ∅,
(9.4)
Φ−1 (𝜇) = {𝜇},
(9.5)
∃i ∈ {1, … , n}, Φ (𝜇) = {𝜇 ⊕ 𝜀 },
(9.6)
∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ 𝜀i },
(9.7)
−1
i
∃i ∈ {1, … , n}, ∃j ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i , 𝜇 ⊕ 𝜀j },
(9.8)
∃i ∈ {1, … , n}, ∃j ∈ {1, … , n}, Φ (𝜇) = {𝜇, 𝜇 ⊕ 𝜀 , 𝜇 ⊕ 𝜀 }, −1
i
j
(9.9)
⋮ ∃i1 ∈ {1, … , n}, … , ∃in ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀in },
(9.10)
∃i1 ∈ {1, … , n}, … , ∃in ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀in }.
(9.11)
Proof: (a)⇐⇒(b) For any 𝜇 ∈ Bn , card({i|i ∈ {1, … , n}, Φi (𝜇) ≠ 𝜇i }) = 0 is equivalent with (9.2) (all the coordinates of 𝜇 are stable) and card({i|i ∈ {1, … , n}, Φi (𝜇) ≠ 𝜇i }) = 1 is equivalent with (9.3) (𝜇 has exactly one unstable coordinate). (b)=⇒(c) Let us fix an arbitrary 𝜇 ∈ Bn and we suppose against all reason that (9.4)–(9.11) are all false. This means the existence of p ∈ {2, … , n} and i1 , … , ip ∈ {1, … , n} distinct such that 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ∈ Φ−1 (𝜇). Then Φ(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ) = 𝜇 and (9.2), (9.3) are both false for 𝜇′ = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip , contradiction. (c)=⇒(b) We suppose against all reason that (b) is false. This means the existence of 𝜇 ∈ Bn , p ∈ {2, … , n} and i1 , … , ip ∈ {1, … , n} distinct such that Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip . We infer that 𝜇 ∈ Φ−1 (𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ), i.e. ◽ (9.4)–(9.11) are all false for 𝜇′ = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip , contradiction Definition 9.1 The function Φ is said to fulfill the technical condition of proper operation (tcpo), or that it is race-free, if one of the previous properties (a), (b), (c) holds. Remark 9.1 Intuitively, tcpo states that for all 𝜇, the n-tuples 𝜇 and Φ(𝜇) differ on at most one coordinate. When Φ models a circuit, this is a sufficient property for the predictability of the circuit, taking into account the unknown parameters that occur: for any 𝜇 and any order (any speed) of computation of Φ1 (𝜇), … , Φn (𝜇), we have that Φ(𝜇) is computed. Theorem 9.2 Φ fulfills tcpo if and only if Φ∗ fulfills tcpo.
9.1 Definition
Proof: We take 𝜇 ∈ Bn and i ∈ {1, … , n} arbitrary. We have 𝜇i ⊕ Φi (𝜇) = (1 ⊕ 𝜇i ) ⊕ (1 ⊕ Φi (𝜇)) = 𝜇i ⊕ Φi (𝜇) = 𝜇i ⊕ Φi (𝜇) = 𝜇i ⊕ Φ∗i (𝜇), therefore Φ𝜇 = {j|j ∈ {1, … , n}, 𝜇j ⊕ Φj (𝜇) = 1} = {j|j ∈ {1, … , n}, 𝜇j ⊕ Φ∗j (𝜇) = 1} = Φ∗𝜇 . This means that the equivalence ∀𝜇 ∈ Bn , card(Φ𝜇 ) ∈ {0, 1} ⇐⇒ ∀𝜇 ∈ Bn , card(Φ∗𝜇 ) ∈ {0, 1} ◽
holds
Theorem 9.3 If Φ is bijective, then the following statements are equivalent: (a) Φ fulfills tcpo; (b) ∀𝜇 ∈ Bn , (9.5) or (9.6) is true. Proof: We take 𝜇 ∈ Bn arbitrary and fixed. (a)=⇒(b) The hypothesis states the truth of the disjunction of (9.4)–(9.11). Case (1), (9.4) We have two possibilities: Φ(𝜇) = 𝜇, giving the contradiction 𝜇 ∈ Φ−1 (𝜇) with hypothesis (9.4), and ∃i ∈ {1, … , n}, Φ(𝜇) = 𝜇 ⊕ 𝜀i . We suppose that the last possibility is fulfilled and we have two other possibilities: Φ(2) (𝜇) = Φ(𝜇), giving the contradiction 𝜇, Φ(𝜇) ∈ Φ−1 (Φ(𝜇)), and ∃j ∈ {1, … , n}, Φ(2) (𝜇) = Φ(𝜇) ⊕ 𝜀j . If the last possibility is fulfilled, we have two new possibilities: Φ(3) (𝜇) = Φ(2) (𝜇), contradiction since and ∃k ∈ {1, … , n}, Φ(3) (𝜇) = Φ(2) (𝜇) ⊕ Φ(𝜇), Φ(2) (𝜇) ∈ Φ−1 (Φ(2) (𝜇)), k 𝜀 . We continue the reasoning and we obtain a sequence 𝜇 = Φ(0) (𝜇), Φ(1) (𝜇), Φ(2) (𝜇), … where Φ(k+1) (𝜇) = Φ(k) (𝜇) ⊕ 𝜀ik , k ∈ N, as indicated by the bijectivity of Φ. But this sequence has finitely many distinct values and let k1 ≥ 2 be the rank which is defined like this: Φ(0) (𝜇), Φ(1) (𝜇), … , Φ(k1 −1) (𝜇) are distinct, ∃k2 ∈ {0, … , k1 − 1}, Φ(k1 ) (𝜇) = Φ(k2 ) (𝜇). If k2 = 0, thus Φ(k1 ) (𝜇) = Φ(0) (𝜇) = 𝜇, then Φ(k1 −1) (𝜇) ∈ Φ−1 (𝜇), representing a contradiction with (9.4), and this implies that k2 ≥ 1. In this last situation, we have Φ(k2 −1) (𝜇) ≠ Φ(k1 −1) (𝜇), Φ(Φ(k2 −1) (𝜇)) = Φ(k2 ) (𝜇) = Φ(k1 ) (𝜇) = Φ(Φ(k1 −1) (𝜇)), contradiction again with the bijectivity of Φ. It has resulted that (9.4) is false.
99
100
9 The Technical Condition of Proper Operation
Case (2), (9.5) This is true if (9.2) is true. Case (3), (9.6) This is true if (9.3) is true, under the form: ∃i ∈ {1, … , n}, Φ(𝜇 ⊕ 𝜀i ) = 𝜇. Case (4), (9.7) 𝜇 ≠ 𝜇 ⊕ 𝜀i and Φ(𝜇) = Φ(𝜇 ⊕ 𝜀i )(= 𝜇) is a contradiction; Case (5), (9.8) 𝜇 ⊕ 𝜀i ≠ 𝜇 ⊕ 𝜀j and Φ(𝜇 ⊕ 𝜀i ) = Φ(𝜇 ⊕ 𝜀j )(= 𝜇) is a contradiction; … At this moment, any of (9.9)–(9.11) gives a contradiction. (b)=⇒(a) The truth of the disjunction of (9.5), (9.6) implies the truth of the disjunction of (9.4)–(9.11) ◽
9.2 Examples Example 9.1 The identity 1Bn ∶ Bn −−→ Bn fulfills tcpo, since all 𝜇 ∈ Bn are fixed points of 1Bn (equation (9.2) is satisfied). Example 9.2 In Figure 9.1, tcpo is satisfied under the form: in (0, 0), (0, 1) equation (9.3) is true and in the points (1, 1), (1, 0) equation (9.2) is true. Figure 9.1 Φ fulfills tcpo.
Example 9.3 The function whose state portrait is drawn in Figure 9.2 fulfills tcpo also: in (1, 0), (1, 1), (0, 1) equation (9.2) holds, and in (0, 0) we have the truth of (9.3). Figure 9.2 Φ fulfills tcpo.
Example 9.4 Let us get back to the function from Figure 5.1, page 57, where tcpo is also true; in all the points (9.3) holds. Example 9.5 In Figure 5.2, page 57 tcpo holds in the following manner: (9.2) is true in (0, 0), (0, 1) and (9.3) is true in (1, 0), (1, 1). Example 9.6 In Figure 5.3, page 57, tcpo is true under the form: in all 𝜇 ∈ B2 , (9.3) is satisfied.
9.4 The Sets of Predecessors and Successors
Example 9.7 The functions Φ from Examples 9.1, 9.4, and 9.6 are bijective and we can take a look how Theorem 9.3 works.
9.3 Iterates Remark 9.2 If Φ ∶ Bn −−→ Bn fulfills tcpo, then Φ ⚬ Φ might not fulfill the same property. We give the example from Figure 9.1, in which (Φ ⚬ Φ)(0, 0) = Φ(0, 1) = (1, 1). More general, if Ψ ∶ Bn −−→ Bn is another function that fulfills tcpo, then Φ ⚬ Ψ might not fulfill tcpo. Theorem 9.4 For Φ ∶ Bn −−→ Bn , we have (a) ∀𝜇 ∈ Bn , ∀𝜈 ∈ Bn , Φ𝜈𝜇 ⊂ Φ𝜇 ; (b) Φ fulfills tcpo⇐⇒ ∀𝜈 ∈ Bn , Φ𝜈 fulfills tcpo. Proof: (a) Let 𝜇, 𝜈 ∈ Bn arbitrary and fixed. We infer Φ𝜈𝜇 = {i|i ∈ {1, … , n}, Φ𝜈i (𝜇) ≠ 𝜇i } = {i|i ∈ {1, … , n}, 𝜈i = 1 and Φi (𝜇) ≠ 𝜇i } ⊂ {i|i ∈ {1, … , n}, Φi (𝜇) ≠ 𝜇i } = Φ𝜇 . (b) =⇒ We take 𝜇, 𝜈 ∈ Bn arbitrary. From (a) we get card(Φ𝜈𝜇 ) ≤ card(Φ𝜇 ) and as card(Φ𝜇 ) ∈ {0, 1}, we infer card(Φ𝜈𝜇 ) ∈ {0, 1}. ◽ ⇐= The implication is obvious if we take 𝜈 = (1, … , 1) ∈ Bn
9.4 The Sets of Predecessors and Successors Theorem 9.5 Φ fulfills tcpo if and only if ∀𝜇 ∈ Bn , 𝜇− = {𝜇} ∪ Φ−1 (𝜇),
(9.12)
and also if and only if ∀𝜇 ∈ Bn , 𝜇+ = {𝜇} ∪ {Φ(𝜇)}.
(9.13)
Proof: Let 𝜇 ∈ Bn arbitrary. (9.12). If. We take 𝜈 ∈ 𝜇− , 𝜈 ≠ 𝜇 arbitrary also and, from (9.12), we get Φ(𝜈) = 𝜇. We suppose against all reason that tcpo does not hold, thus p ≥ 2 and i1 , … , ip ∈ {1, … , n} exist such that 𝜈 = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip and, on the other hand, 𝜆 ∈ Bn exists also with (see Theorem 1.5 (b), page 9) Φ𝜆 (𝜈) = 𝜇 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip = 𝜇, where 𝜆i1 = … = 𝜆ip = 1.
101
102
9 The Technical Condition of Proper Operation
We define 𝛽 ∈ Bn by ∀i ∈ {1, … , n}, { 𝜆i , if i ≠ i1 , 𝛽i = 0, if i = i1 and we have Φ𝛽 (𝜈) = 𝜇 ⊕ 𝜀i1 . The hypothesis (𝜇 ⊕ 𝜀i1 )− = {𝜇 ⊕ 𝜀i1 } ∪ Φ−1 (𝜇 ⊕ 𝜀i1 ), together with 𝜈 ∈ (𝜇 ⊕ 𝜀i1 )− imply Φ(𝜈) = 𝜇 ⊕ 𝜀i1 , contradiction. Only if. The inclusion {𝜇} ∪ Φ−1 (𝜇) ⊂ 𝜇− holds, see Theorem 1.8, page 16. We prove 𝜇− ⊂ {𝜇} ∪ Φ−1 (𝜇). We take an arbitrary 𝛿 ∈ 𝜇− and we have two possibilities. Case 𝛿 = 𝜇 The inclusion is obvious. Case 𝛿 ≠ 𝜇 Some 𝜆 ∈ Bn exists with Φ𝜆 (𝛿) = 𝜇 and some i ∈ {1, … , n} exists also such that Φ(𝛿) = 𝛿 ⊕ 𝜀i (9.14) (otherwise, Φ(𝛿) = 𝛿 and 𝛿 = Φ𝜆 (𝛿) = 𝜇 are in contradiction with the fact that 𝛿 ≠ 𝜇). We infer from Theorem 1.5 (a), page 9 that Φ𝜆 (𝛿) = 𝛿 ⊕ 𝜆i 𝜀i .
(9.15)
As 𝛿 ≠ 𝜇, Eq. (9.15) corresponds to 𝜆i = 1 wherefrom 𝜇 = 𝛿 ⊕ 𝜀i . We get from (9.14) that 𝛿 ∈ Φ−1 (𝛿 ⊕ 𝜀i ) = Φ−1 (𝜇). (9.13). If. We suppose against all reason that tcpo is false, i.e. i1 , … , ip ∈ {1, … , n} distinct exist, p ≥ 2 with Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip . Then 𝜇+ = [𝜇, Φ(𝜇)] gives card(𝜇+ ) ≥ 4, contradiction with (9.13) that implies card(𝜇+ ) ∈ {1, 2}. Only if. The possibility Φ(𝜇) = 𝜇 implies 𝜇+ = [𝜇, Φ(𝜇)] = {𝜇} = {𝜇} ∪ {Φ(𝜇)} and the possibility ∃i ∈ {1, … , n}, Φ(𝜇) = 𝜇 ⊕ 𝜀i implies 𝜇+ = [𝜇, Φ(𝜇)] = [𝜇, 𝜇 ⊕ 𝜀i ] = {𝜇, 𝜇 ⊕ 𝜀i } = {𝜇} ∪ {𝜇 ⊕ 𝜀i } ◽
= {𝜇} ∪ {Φ(𝜇)} Theorem 9.6 Φ fulfills tcpo if and only if ∀𝜇 ∈ Bn , one of 𝜇− = {𝜇},
(9.16)
∃i ∈ {1, … , n}, 𝜇 = {𝜇, 𝜇 ⊕ 𝜀 }, −
i
(9.17)
∃i ∈ {1, … , n}, ∃j ∈ {1, … , n}, 𝜇 = {𝜇, 𝜇 ⊕ 𝜀 , 𝜇 ⊕ 𝜀 }, −
i
j
(9.18)
⋮ ∃i1 ∈ {1, … , n}, … , ∃in ∈ {1, … , n}, 𝜇− = {𝜇, 𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀in } (9.19) holds.
9.5 Source, Isolated Fixed Point, Transient Point, Sink
Proof: If. We suppose against all reason that this is not true, namely that 𝜇 ∈ Bn , p ≥ 2 and i1 , … , ip ∈ {1, … , n} exist such that Φ(𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ) = 𝜇. This means that 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ∈ 𝜇− , and in this situation (9.16)–(9.19) are all false, contradiction. Only if. The statements (9.16)–(9.19) follow from Theorem 9.1, page 97 and Theorem 9.5: we replace in (9.12) the possible values of Φ−1 (𝜇) resulting from (9.4)–(9.11) ◽ Theorem 9.7 If Φ fulfills tcpo, then ∀𝜇 ∈ Bn , we have O− (𝜇) = {𝜇} ∪ Φ−1 (𝜇) ∪ Φ−1 (Φ−1 (𝜇)) ∪ … ,
(9.20)
O+ (𝜇) = {𝜇} ∪ {Φ(𝜇)} ∪ {Φ(2) (𝜇)} ∪ …
(9.21)
Proof: (9.20). We start from (1.29)page 16 and we apply (9.12). We compute: ⋃ ⋃ ⋃ ⋃ 𝜆− = {𝜆} ∪ Φ−1 (𝜆) = {𝜆} ∪ Φ−1 (𝜆) 𝜆∈𝜇−
𝜆∈{𝜇}∪Φ−1 (𝜇) −1
𝜆∈{𝜇}∪Φ−1 (𝜇) −1
−1
𝜆∈{𝜇}∪Φ−1 (𝜇)
−1
= ({𝜇} ∪ Φ (𝜇)) ∪ (Φ (𝜇) ∪ Φ (Φ (𝜇))) = {𝜇} ∪ Φ−1 (𝜇) ∪ Φ−1 (Φ−1 (𝜇)) etc. (9.21). We start from (1.30)page 16 and we use (9.13). We can see that ⋃ ⋃ ⋃ ⋃ 𝜆+ = {𝜆} ∪ {Φ(𝜆)} = {𝜆} ∪ {Φ(𝜆)} 𝜆∈𝜇+
𝜆∈{𝜇}∪{Φ(𝜇)}
𝜆∈{𝜇}∪{Φ(𝜇)}
𝜆∈{𝜇}∪{Φ(𝜇)}
= ({𝜇} ∪ {Φ(𝜇)}) ∪ ({Φ(𝜇)} ∪ {Φ(2) (𝜇)}) = {𝜇} ∪ {Φ(𝜇)} ∪ {Φ(2) (𝜇)} etc
◽
9.5 Source, Isolated Fixed Point, Transient Point, Sink Theorem 9.8 We suppose that Φ ∶ Bn −−→ Bn fulfills tcpo. Then ∀𝜇 ∈ Bn , the following possibilities exist: (i) Φ−1 (𝜇) = ∅, when 𝜇 is a source, 𝜇− = {𝜇} and ∃i ∈ {1, … , n}, 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀i }; (ii) Φ−1 (𝜇) = {𝜇}, when 𝜇 is an isolated fixed point, 𝜇− = {𝜇} and 𝜇+ = {𝜇}; (iii) ∃k ∈ {1, … , n}, ∃i1 ∈ {1, … , n}, … , ∃ik ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀ik }, when 𝜇 is a transient point, 𝜇− = {𝜇, 𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀ik } and ∃j ∈ {1, … , n}, 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀j }; (iv) ∃k ∈ {1, … , n}, ∃i1 ∈ {1, … , n}, … , ∃ik ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ i1 𝜀 , … , 𝜇 ⊕ 𝜀ik }, when 𝜇 is a sink, 𝜇− = {𝜇, 𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀ik } and 𝜇+ = {𝜇}.
103
104
9 The Technical Condition of Proper Operation
Proof: We fix an arbitrary 𝜇 ∈ Bn and we make use, when stating the possibilities (i)–(iv), of (9.4)page 98 ,…, (9.11)page 98 . (i) Φ−1 (𝜇) = ∅; We get from Theorem 9.5, page 101 that 𝜇− = {𝜇}. In order to show the second statement, we know that two possibilities exist, from the fact that Φ fulfills tcpo: either Φ(𝜇) = 𝜇, which is not the case, since 𝜇 ∈ Φ−1 (𝜇) and then we get a contradiction with the supposition that Φ−1 (𝜇) = ∅, or ∃i ∈ {1, … , n}, Φ(𝜇) = 𝜇 ⊕ 𝜀i , which proves that 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀i }. (ii) Φ−1 (𝜇) = {𝜇}; We infer from Theorem 9.5 that 𝜇− = {𝜇}. The fact that 𝜇+ = [𝜇, Φ(𝜇)] = [𝜇, 𝜇] = {𝜇} is obvious. (iii) ∃k ∈ {1, … , n}, ∃i1 ∈ {1, … , n}, … , ∃ik ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀ik }; We have from Theorem 9.5 that 𝜇− = {𝜇, 𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀ik }. The satisfaction of tcpo gives the next cases. Case Φ(𝜇) = 𝜇 This is impossible, since it implies 𝜇 ∈ Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀ik }. Case ∃j ∈ {1, … , n}, Φ(𝜇) = 𝜇 ⊕ 𝜀j We infer that 𝜇+ = [𝜇, Φ(𝜇)] = {𝜇, 𝜇 ⊕ 𝜀j } holds indeed. (iv) ∃k ∈ {1, … , n}, ∃i1 ∈ {1, … , n}, … , ∃ik ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ i1 𝜀 , … , 𝜇 ⊕ 𝜀ik }; Theorem 9.5 gives that 𝜇− = {𝜇, 𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀ik }. As 𝜇 ∈ Φ−1 (𝜇), we get Φ(𝜇) = 𝜇 and 𝜇+ = [𝜇, Φ(𝜇)] = {𝜇} ◽ Corollary 9.1 If Φ is bijective and fulfills tcpo, then ∀𝜇 ∈ Bn , one the following possibilities is true: (j) Φ−1 (𝜇) = {𝜇}, when 𝜇 is an isolated fixed point, 𝜇− = {𝜇} and 𝜇+ = {𝜇}; (jj) ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i }, when 𝜇 is a transient point, − 𝜇 = {𝜇, 𝜇 ⊕ 𝜀i } and ∃j ∈ {1, … , n}, 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀j }. Proof: This statement follows from Theorem 9.3, page 99 and Theorem 9.8 ◽
9.6 Isomorphisms vs tcpo Theorem 9.9 We consider two functions Φ, Ψ ∶ Bn −−→ Bn and we suppose that (h, h′ ) ∈ I so(Φ, Ψ). If Φ fulfills tcpo and h is Lipschitz, i.e. ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn , d(h(𝜇), h(𝜆)) ≤ d(𝜇, 𝜆)
(9.22)
is true, where d is the Hamming distance (see Definition 2.3, page 28), then Ψ fulfills tcpo.
9.7 Antiisomorphisms vs tcpo
Proof: For any 𝜇, 𝜈 ∈ Bn , we can write h (𝜈) ) = d(h(𝜇), Ψh (𝜈) (h(𝜇))) = d(h(𝜇), h(Φ𝜈 (𝜇))) card(Ψh(𝜇) ′
′
≤ d(𝜇, Φ𝜈 (𝜇)) = card(Φ𝜈𝜇 ) ∈ {0, 1}. The statement card(Φ𝜈𝜇 ) ∈ {0, 1} follows from the fact that Φ fulfills tcpo and from Theorem 9.4 (b), page 101, implication =⇒. We have the existence of 𝜈 ′ h′ (𝜈 ′ ) such that h′ (𝜈 ′ ) = (1, … , 1), for which card(Ψh(𝜇) ) = card(Ψh(𝜇) ) ∈ {0, 1}. When 𝜇 runs in Bn , h(𝜇) runs in Bn also and therefore Ψ fulfills tcpo ◽
9.7 Antiisomorphisms vs tcpo Theorem 9.10 Let the functions Φ, Ψ ∶ Bn −−→ Bn and (h, h′ )∽ ∈ I so∽ (Φ, Ψ). We suppose that Φ fulfills tcpo, that h is Lipschitz and that the invariance property ∀𝜈 ∈ Bn , Φ𝜈 (Bn ) = Bn
(9.23)
holds. Then Ψ satisfies tcpo and ∀𝜈 ∈ Bn , Ψ𝜈 (Bn ) = Bn .
(9.24)
Proof: For any 𝜇, 𝜈 ∈ Bn , we can write that h (𝜈) 𝜈 h (𝜈) (h(Φ𝜈 (𝜇)))) = d(h(Φ𝜈 (𝜇)), h(𝜇)) card(Ψh(Φ 𝜈 (𝜇)) ) = d(h(Φ (𝜇)), Ψ ′
′
≤ d(𝜇, Φ𝜈 (𝜇)) = card(Φ𝜈𝜇 ) ∈ {0, 1}, where card(Φ𝜈𝜇 ) ∈ {0, 1} results from the fact that Φ satisfies tcpo and from Theorem 9.4. We get the existence of 𝜈 ′ such that h′ (𝜈 ′ ) = (1, … , 1), for which ′ h′ (𝜈 ′ ) we have card(Ψh(Φ𝜈′ (𝜇)) ) = card(Ψh(Φ ) ∈ {0, 1}. When 𝜇 runs in Bn , Φ𝜈 (𝜇) 𝜈 ′ (𝜇)) ′ runs in Bn from (9.23), h(Φ𝜈 (𝜇)) runs itself in Bn since h is bijection and conse′ quently Ψ satisfies tcpo. From the equation h(𝜇) = Ψh (𝜈) (h(Φ𝜈 (𝜇))) with 𝜇, 𝜈 ∈ ◽ Bn arbitrary and h, h′ , Φ𝜈 bijections, we infer the truth of (9.24)
105
107
10 The Strong Technical Condition of Proper Operation Strengthening tcpo is useful in discussing symmetry issues (see Chapter 14). The properties of the functions that satisfy tcpo are adapted to this context.
10.1 Definition Theorem 10.1 For the function Φ ∶ Bn −−→ Bn , the following statements are equivalent: (a) Φ fulfills tcpo and ∀𝜇 ∈ Bn , ∀i ∈ {1, … , n}, ∀j ∈ {1, … , n}, (Φ(𝜇 ⊕ 𝜀i ) = 𝜇 and Φ(𝜇 ⊕ 𝜀j ) = 𝜇) =⇒ (i = j);
(10.1)
(b) ∀𝜇 ∈ B , the disjunction of the following four properties holds: n
Φ−1 (𝜇) = ∅,
(10.2)
−1
(10.3)
Φ (𝜇) = {𝜇}, ∃i ∈ {1, … , n}, Φ (𝜇) = {𝜇 ⊕ 𝜀 }, i
−1
(10.4)
∃i ∈ {1, … , n}, Φ (𝜇) = {𝜇, 𝜇 ⊕ 𝜀 }. i
−1
(10.5)
Proof: Let 𝜇 ∈ Bn arbitrary and fixed. (a) ⇒ (b) As Φ fulfills tcpo, the disjunction of (10.2)–(10.5) or the disjunction of ∃i ∈ {1, … , n}, ∃j ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i , 𝜇 ⊕ 𝜀j },
(10.6)
∃i ∈ {1, … , n}, ∃j ∈ {1, … , n}, Φ (𝜇) = {𝜇, 𝜇 ⊕ 𝜀 , 𝜇 ⊕ 𝜀 }, −1
i
j
(10.7)
⋮ ∃i1 ∈ {1, … , n}, … , ∃in ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀in },
(10.8)
∃i1 ∈ {1, … , n}, … , ∃in ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ 𝜀i1 , … , 𝜇 ⊕ 𝜀in } (10.9)
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
108
10 The Strong Technical Condition of Proper Operation
holds. We suppose against all reason that (10.6) is true, thus ∃i ∈ {1, … , n}, ∃j ∈ {1, … , n} such that Φ(𝜇 ⊕ 𝜀i ) = 𝜇, Φ(𝜇 ⊕ 𝜀j ) = 𝜇. The hypothesis states that i = j, contradiction. Similarly for (10.7). ⋮ Let us suppose against all reason that (10.8) is true, thus ∃i1 ∈ {1, … , n}, … , ∃in ∈ {1, … , n} such that Φ(𝜇 ⊕ 𝜀i1 ) = 𝜇, … , Φ(𝜇 ⊕ 𝜀in ) = 𝜇. The hypothesis implies that i1 = … = in , contradiction. Similarly for (10.9). Statement (b) holds. (b) ⇒ (a) The disjunction of (10.2)–(10.5) implies the satisfaction of (10.2) or …or (10.5) or (10.6) or …or (10.9) i.e. tcpo holds. Furthermore, we suppose against all reason that ∃i ∈ {1, … , n}, ∃j ∈ {1, … , n} with Φ(𝜇 ⊕ 𝜀i ) = 𝜇 and Φ(𝜇 ⊕ 𝜀j ) = 𝜇 and i ≠ j. This means the truth of 𝜇 ⊕ 𝜀i , 𝜇 ⊕ 𝜀j ∈ Φ−1 (𝜇), contradiction with the hypothesis. Statement (a) takes place ◽ Definition 10.1 If one of the previous properties (a), (b) is true, we say that Φ fulfills the strong technical condition of proper operation. Remark 10.1 The strong tcpo is useful in treating symmetry issues of the Boolean functions, as we shall see later. Theorem 10.2 Φ fulfills the strong tcpo if and only if Φ∗ fulfills the strong tcpo. Proof: Only if. We take 𝜇 ∈ Bn , i, j ∈ {1, … , n} arbitrary and the hypothesis states the truth of (10.1), that is equivalent in succession with not (Φ(𝜇 ⊕ 𝜀i ) = 𝜇 and Φ(𝜇 ⊕ 𝜀j ) = 𝜇) or (i = j), Φ(𝜇 ⊕ 𝜀i ) ≠ 𝜇 or Φ(𝜇 ⊕ 𝜀j ) ≠ 𝜇 or i = j, Φ(𝜇 ⊕ 𝜀i ) ≠ 𝜇 or Φ(𝜇 ⊕ 𝜀j ) ≠ 𝜇 or i = j, Φ∗ (𝜇 ⊕ 𝜀i ) ≠ 𝜇 or Φ∗ (𝜇 ⊕ 𝜀j ) ≠ 𝜇 or i = j, Φ∗ (𝜇 ⊕ 𝜀i ) ≠ 𝜇 or Φ∗ (𝜇 ⊕ 𝜀j ) ≠ 𝜇 or i = j, Φ∗ (𝜇 ⊕ 𝜀i ) ≠ 𝜇 or Φ∗ (𝜇 ⊕ 𝜀j ) ≠ 𝜇 or i = j, not (Φ∗ (𝜇 ⊕ 𝜀i ) = 𝜇 and Φ∗ (𝜇 ⊕ 𝜀j ) = 𝜇) or (i = j), (Φ∗ (𝜇 ⊕ 𝜀i ) = 𝜇 and Φ∗ (𝜇 ⊕ 𝜀j ) = 𝜇) ⇒ (i = j). When 𝜇 runs in Bn , we have that 𝜇 runs in Bn thus Φ∗ fulfills the strong tcpo, if we take in consideration Theorem 9.2, page 98 also. If. We run the previous proof conversely ◽
10.2 Examples
Theorem 10.3 If Φ is bijective, then the following statements are equivalent: (a) ∀𝜇 ∈ Bn , (10.3) or (10.4) is true; (b) Φ fulfills tcpo; (c) Φ fulfills the strong tcpo. Proof: Theorem 9.3, page 99 shows that (a) ⇐⇒ (b). On the other hand, the implications (a) =⇒ (c) =⇒ (b) are obvious ◽
10.2 Examples Example 10.1 The identity 1Bn ∶ Bn −−→ Bn fulfills the strong tcpo. Example 10.2 The function Φ ∶ B2 −−→ B2 from Figure 10.1 fulfills also the strong tcpo: Φ−1 (0, 1) = Φ−1 (1, 1) = ∅, Eq. (10.2), Φ−1 (0, 0) = {(0, 0), (0, 1)}, Eq. (10.5), Φ−1 (1, 0) = {(1, 0), (1, 1)}, Eq. (10.5). Figure 10.1 Φ fulfills the strong tcpo.
Example 10.3 The function Φ ∶ B2 −−→ B2 from Figure 10.2 has the property that in all the points of B2 equation (10.4) holds, thus it fulfills the strong tcpo too. Figure 10.2 Φ fulfills the strong tcpo.
Example 10.4 We notice the fulfillment of the strong tcpo in the case of the function Φ from Figure 9.1, page 100: Φ−1 (0, 0) = ∅, Eq. (10.2), Φ−1 (0, 1) = {(0, 0)}, Eq. (10.4), Φ−1 (1, 1) = {(0, 1), (1, 1)}, Eq. (10.5), Φ−1 (1, 0) = {(1, 0)}, Eq. (10.3).
109
110
10 The Strong Technical Condition of Proper Operation
Example 10.5 The function Φ from Figure 10.3 fulfills tcpo, but it does not fulfill the strong tcpo because Φ−1 (0, 1) = {(0, 0), (1, 1), (0, 1)}, therefore all of (10.2)–(10.5) are false in (0, 1). Figure 10.3 Φ fulfills tcpo but it does not fulfill the strong tcpo.
10.3 Iterates Remark 10.2 If Φ fulfills the strong tcpo, then Φ ⚬ Φ does not necessarily fulfill the strong tcpo, see Remark 9.2, page 101. Theorem 10.4 Φ fulfills the strong tcpo⇐⇒ ∀𝜈 ∈ Bn , Φ𝜈 fulfills the strong tcpo. Proof: ⇒ We take 𝜈 ∈ Bn arbitrary and fixed. From Theorem 9.4 (b), page 101 we get that Φ𝜈 satisfies tcpo. Let us suppose now that 𝜇 ∈ Bn is arbitrary and i ∈ {1, … , n}, j ∈ {1, … , n} exist such that Φ𝜈 (𝜇 ⊕ 𝜀i ) = 𝜇, Φ𝜈 (𝜇 ⊕ 𝜀j ) = 𝜇. We infer { 𝜇i ⊕ 1, if 𝜈i = 0, 𝜈 i Φi (𝜇 ⊕ 𝜀 ) = = 𝜇i , Φi (𝜇 ⊕ 𝜀i ), if 𝜈i = 1 wherefrom 𝜈i = 1 and Φi (𝜇 ⊕ 𝜀i ) = 𝜇i are true. As Φ fulfills tcpo from the hypothesis, we obtain that Φ(𝜇 ⊕ 𝜀i ) = 𝜇. The reasoning for getting Φ(𝜇 ⊕ 𝜀j ) = 𝜇 is similar. We apply the hypothesis now that Φ fulfills the strong tcpo and the conclusion is i = j. ◽ ⇐= This is obvious if we take 𝜈 = (1, … , 1) ∈ Bn
10.4 The Sets of Predecessors and Successors Corollary 10.1 We suppose that Φ fulfills the strong tcpo. For any 𝜇 ∈ Bn , (a) we have 𝜇− = {𝜇} ∪ Φ−1 (𝜇), 𝜇+ = {𝜇} ∪ {Φ(𝜇)}, O− (𝜇) = {𝜇} ∪ Φ−1 (𝜇) ∪ Φ−1 (Φ−1 (𝜇)) ∪ … , O+ (𝜇) = {𝜇} ∪ {Φ(𝜇)} ∪ {Φ(2) (𝜇)} ∪ … ;
10.6 Isomorphisms vs Strong tcpo
(b) either 𝜇− = {𝜇}, or i ∈ {1, … , n} exists such that 𝜇− = {𝜇, 𝜇 ⊕ 𝜀i }. In a similar way, either 𝜇+ = {𝜇}, or i ∈ {1, … , n} exists such that 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀i }. Proof: These assertions follow from Theorem 9.5, page 101, Theorem 9.7, page 103, and Theorem 10.1, page 107. ◽
10.5 Source, Isolated Fixed Point, Transient Point, Sink Corollary 10.2 We suppose that Φ fulfills the strong tcpo. Then ∀𝜇 ∈ Bn , one of the following statements is true: (i) Φ−1 (𝜇) = ∅, 𝜇 is a source, 𝜇− = {𝜇} and ∃i ∈ {1, … , n}, 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀i }; (ii) Φ−1 (𝜇) = {𝜇}, 𝜇 is an isolated fixed point, 𝜇− = {𝜇} and 𝜇+ = {𝜇}; (iii) ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i }, 𝜇 is a transient point, 𝜇− = {𝜇, 𝜇 ⊕ i 𝜀 } and ∃j ∈ {1, … , n}, 𝜇+ = {𝜇, 𝜇 ⊕ 𝜀j }; (iv) ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ 𝜀i }, 𝜇 is a sink, 𝜇− = {𝜇, 𝜇 ⊕ 𝜀i } and + 𝜇 = {𝜇}. Proof: This follows from Theorem 9.8, page 103 and (10.2)–(10.5). We use the ◽ fact that 𝜇− = {𝜇} ∪ Φ−1 (𝜇) Corollary 10.3 We suppose that Φ is bijective and it fulfills the strong tcpo. Then ∀𝜇 ∈ Bn , one of (ii), (iii) from Corollary 10.2 holds. Proof: This follows from Theorem 10.3, page 109.
◽
Example 10.6 In Figure 4.3, page 52 we have the example of a bijective function Φ that fulfills the strong tcpo: (1, 0), (1, 1) are isolated fixed points and (0, 0), (0, 1) are transient points.
10.6 Isomorphisms vs Strong tcpo Theorem 10.5 Let the functions Φ, Ψ ∶ Bn −−→ Bn and we suppose that an isomorphism (h, h′ ) ∶ Φ −−→ Ψ exists such that h is Lipschitz. If Φ satisfies the strong tcpo, then Ψ satisfies the strong tcpo. Proof: Ψ satisfies tcpo from Theorem 9.9, page 104, thus Ψ𝜈 satisfies tcpo for any 𝜈 ∈ Bn , from Theorem 9.4, page 101. Let 𝜇 ∈ Bn , 𝜈 ∈ Bn arbitrary and we suppose that i ∈ {1, … , n}, j ∈ {1, … , n} exist such that Ψh (𝜈) (𝜇 ⊕ 𝜀i ) = 𝜇 and Ψh (𝜈) (𝜇 ⊕ 𝜀j ) = 𝜇 ′
′
(10.10)
111
112
10 The Strong Technical Condition of Proper Operation
holds. We denote with 𝜇′ , 𝜇′′ , 𝜇′′′ ∈ Bn the n-tuples defined by h(𝜇′ ) = 𝜇 ⊕ 𝜀i , h(𝜇′′ ) = 𝜇 ⊕ 𝜀j , h(𝜇′′′ ) = 𝜇, in other words, from the commutativity of the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Ψh
′ (𝜈)
Bn −−→ Bn we infer that 𝜇′ , 𝜇′′ ∈ (Φ𝜈 )−1 (𝜇′′′ ). We suppose against all reason that Ψh (𝜈) does not satisfy the strong tcpo property, thus in (10.10) we have i ≠ j. This implies 𝜇 ⊕ 𝜀i ≠ 𝜇 ⊕ 𝜀j , thus 𝜇′ ≠ 𝜇′′ , since h is a bijection. As Φ𝜈 satisfies the strong tcpo from Theorem 10.4, the only possibility is given by the existence of k ∈ {1, … , n} with (Φ𝜈 )−1 (𝜇′′′ ) = {𝜇′′′ , 𝜇′′′ ⊕ 𝜀k }, see Corollary 10.2. We can presume at this moment, without loosing the generality, that 𝜇′ = 𝜇′′′ . We infer the contradiction ′
𝜇 = h(𝜇′′′ ) = h(𝜇′ ) = 𝜇 ⊕ 𝜀i . The conclusion is that Ψh (𝜈) satisfies the strong tcpo. When 𝜈 runs in Bn , as h′ is bijective, h′ (𝜈) runs in Bn , therefore Ψ𝜈 satisfies the strong tcpo for any 𝜈. We conclude from Theorem 10.4 that Ψ fulfills the strong tcpo ◽ ′
10.7 Antiisomorphisms vs Strong tcpo Theorem 10.6 We consider the functions Φ, Ψ ∶ Bn −−→ Bn and the antiisomorphism (h, h′ )∽ ∈ Iso∽ (Φ, Ψ). We suppose that Φ fulfills the strong tcpo, that h is Lipschitz and that the invariance property ∀𝜈 ∈ Bn , Φ𝜈 (Bn ) = Bn
(10.11)
is also satisfied. Then Ψ satisfies the strong tcpo and ∀𝜈 ∈ Bn , Ψ𝜈 (Bn ) = Bn .
(10.12)
Proof: Theorem 9.10, page 105 shows that Ψ fulfills tcpo and (10.12), thus from Theorem 9.4, page 101 we get that Ψ𝜈 satisfies tcpo for any 𝜈 ∈ Bn . We take 𝜇 ∈ Bn , 𝜈 ∈ Bn arbitrary for which Ψh (𝜈) (𝜇 ⊕ 𝜀i ) = 𝜇 and Ψh (𝜈) (𝜇 ⊕ 𝜀j ) = 𝜇 ′
′
(10.13)
holds, with i ∈ {1, … , n}, j ∈ {1, … , n}. From the commutativity of the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Bn
Ψh
′ (𝜈)
← Bn
10.7 Antiisomorphisms vs Strong tcpo
in which h and Φ𝜈 are bijections, we get that Ψh (𝜈) is a bijection, thus in (10.13) ′ we have 𝜇 ⊕ 𝜀i = 𝜇 ⊕ 𝜀j , wherefrom i = j. It has resulted that Ψh (𝜈) satisfies the strong tcpo. Similarly with the proof of Theorem 10.5, when 𝜈 runs in Bn , the bijectivity of h′ implies that h′ (𝜈) runs in Bn , therefore Ψ𝜈 satisfies the strong tcpo for any 𝜈. In these circumstances, Theorem 10.4 states that Ψ fulfills the strong tcpo ◽ ′
113
115
11 The Generalized Technical Condition of Proper Operation If Φ fulfills tcpo, then the modeled circuit has a predictable behavior: O+ (𝜇) = {𝜇} ∪ {Φ(𝜇)} ∪ {Φ(2) (𝜇)} ∪ … Our purpose in this chapter is to generalize tcpo by allowing the existence of races, and still get predictability, under the form: O+ (𝜇) = [𝜇, Φ(𝜇)] ∪ [Φ(𝜇), Φ(2) (𝜇)] ∪ … Φ fulfills the generalized tcpo⇐⇒ ∀𝜈 ∈ Bn , Φ𝜈 fulfills the generalized tcpo. If Φ fulfills the generalized tcpo, then ∀𝜇 ∈ Bn , ∀𝜈 ∈ 𝜇− , [𝜈, 𝜇] ⊂ 𝜇− holds. The form of Φ−1 (𝜇) specific to the generalized tcpo characterizes the sources, the isolated fixed points, the transient points, and the sinks. The isomorphisms and the antiisomorphisms bring, in certain circumstances, functions that fulfill the generalized tcpo, in functions that fulfill the generalized tcpo.
11.1 Definition Theorem 11.1 For Φ ∶ Bn −−→ Bn , the following statements (11.1)–(11.4) are equivalent: ∀𝜇 ∈ Bn , ∀𝜔 ∈ [𝜇, Φ(𝜇)), Φ(𝜇) = Φ(𝜔),
(11.1)
∀𝜇 ∈ Bn , [𝜇, Φ(𝜇)) ⊂ Φ−1 (Φ(𝜇)),
(11.2)
∀𝜈 ∈ Bn , ∀𝜇 ∈ Φ−1 (𝜈), [𝜇, 𝜈) ⊂ Φ−1 (𝜈),
(11.3)
∀𝜇 ∈ Bn , ∀k ∈ {2, … , n}, ∀i1 ∈ {1, … , n}, … , ∀ik ∈ {1, … , n}, Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik ⇒ ∀𝜆 ∈ Bk ∖ {(1, … , 1)}, Φ(𝜇) = Φ(𝜇 ⊕ 𝜆1 𝜀i1 ⊕ … ⊕ 𝜆k 𝜀ik )
(11.4)
and any of them is equivalent with: ∀𝜈 ∈ B , one of the following properties n
Φ−1 (𝜈) = ∅, −1
(11.5)
Φ (𝜈) = {𝜈},
(11.6)
∃𝜆 ∈ B , Φ (𝜈) = [𝜆, 𝜈),
(11.7)
n
−1
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
116
11 The Generalized Technical Condition of Proper Operation
∃𝜆 ∈ Bn , Φ−1 (𝜈) = [𝜆, 𝜈],
(11.8)
∃𝜆 ∈ B , ∃𝜆 ∈ B , Φ (𝜈) = [𝜆 , 𝜈) ∪ [𝜆 , 𝜈),
(11.9)
∃𝜆 ∈ B , ∃𝜆 ∈ B , Φ (𝜈) = [𝜆 , 𝜈] ∪ [𝜆 , 𝜈],
(11.10)
1 1
2
n
n
2
n
n
1
−1
2
1
−1
2
⋮ ∃k ≥ 2, ∃𝜆1 ∈ Bn , … , ∃𝜆k ∈ Bn , Φ−1 (𝜈) = [𝜆1 , 𝜈) ∪ … ∪ [𝜆k , 𝜈),
(11.11)
∃k ≥ 2, ∃𝜆 ∈ B , … , ∃𝜆 ∈ B , Φ (𝜈) = [𝜆 , 𝜈] ∪ … ∪ [𝜆 , 𝜈]
(11.12)
1
n
k
n
−1
1
k
is true. Proof: The scheme of the proof is: (11.1) =⇒ (11.2) =⇒ (11.3) =⇒ (11.4) =⇒ (11.1), (11.3) =⇒ ∀𝜈 ∈ Bn , ((11.5) or (11.6) or…or (11.12)) =⇒ (11.3). (11.1) =⇒ (11.2) We take 𝜇 ∈ Bn arbitrary. If Φ(𝜇) = 𝜇, then (11.2) is trivially true, thus we suppose that Φ(𝜇) ≠ 𝜇 and let 𝜔 ∈ [𝜇, Φ(𝜇)) arbitrary. As Φ(𝜇) = Φ(𝜔), we obtain 𝜔 ∈ Φ−1 (Φ(𝜇)). (11.2) =⇒ (11.3) We take an arbitrary 𝜈 ∈ Bn . If Φ−1 (𝜈) = ∅, then (11.3) is trivially true, thus we can suppose that Φ−1 (𝜈) ≠ ∅ and we take an arbitrary 𝜇 ∈ Φ−1 (𝜈). In the situation when 𝜇 = 𝜈, [𝜇, 𝜈) = ∅ and the property (11.3) holds trivially again, therefore we can suppose that 𝜇 ≠ 𝜈 and let 𝜔 ∈ [𝜇, 𝜈) = [𝜇, Φ(𝜇)) arbitrary. We get 𝜔 ∈ Φ−1 (Φ(𝜇)) = Φ−1 (𝜈). (11.3) =⇒ (11.4) Let 𝜇 ∈ Bn arbitrary. We denote 𝜈 = Φ(𝜇) and we suppose that for k ∈ {2, … , n}, i1 ∈ {1, … , n}, … , ik ∈ {1, … , n} we have Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik . We fix an arbitrary 𝜆 ∈ Bk ∖ {(1, … , 1)}. Then 𝜇 ⊕ 𝜆1 𝜀i1 ⊕ … ⊕ 𝜆k 𝜀ik ∈ [𝜇, 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik ) = [𝜇, Φ(𝜇)), thus (11.3)
𝜈 = Φ(𝜇) = Φ(𝜇 ⊕ 𝜆1 𝜀i1 ⊕ … ⊕ 𝜆k 𝜀ik ). (11.4) =⇒ (11.1) We take an arbitrary 𝜇 ∈ Bn . Case Φ(𝜇) = 𝜇 We have [𝜇, Φ(𝜇)) = ∅ and the property ∀𝜔 ∈ [𝜇, Φ(𝜇)), Φ(𝜇) = Φ(𝜔)
(11.13)
is trivially true. Case Φ(𝜇) = 𝜇 ⊕ 𝜀i , i ∈ {1, … , n} In this case, [𝜇, Φ(𝜇)) = [𝜇, 𝜇 ⊕ 𝜀i ) = {𝜇} and (11.13) is trivially true once again. Case Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ik , k ∈ {2, … , n}, i1 , … , ik ∈ {1, … , n} Let 𝜔 ∈ [𝜇, Φ(𝜇)) arbitrary and fixed. We get the existence of 𝜆 ∈ Bk ∖ {(1, … , 1)} with the property 𝜔 = 𝜇 ⊕ 𝜆1 𝜀i1 ⊕ … ⊕ 𝜆k 𝜀ik and we can write (11.4)
Φ(𝜇) = Φ(𝜇 ⊕ 𝜆1 𝜀i1 ⊕ … ⊕ 𝜆k 𝜀ik ) = Φ(𝜔).
11.1 Definition
We show now that (11.3) implies the fact that ∀𝜈 ∈ Bn , the disjunction of (11.5)–(11.12) holds and let 𝜈 arbitrary, fixed. (a) Case Φ(𝜈) ≠ 𝜈 If Φ−1 (𝜈) = ∅, then (11.5) is true and the implication holds, thus we can suppose that Φ−1 (𝜈) ≠ ∅. Let 𝜇1 ∈ Φ−1 (𝜈) arbitrary, thus [𝜇1 , 𝜈) ⊂ Φ−1 (𝜈). We infer from the hypothesis the existence of p ≥ 1 and 𝜇2 , … , 𝜇p ∈ Bn such that [𝜇1 , 𝜈) ⊊ [𝜇2 , 𝜈) ⊊ … ⊊ [𝜇p , 𝜈) ⊂ Φ−1 (𝜈), ∀𝜇 ∈ Bn , not ([𝜇p , 𝜈) ⊊ [𝜇, 𝜈) ⊂ Φ−1 (𝜈)). In such conditions, we define 𝜆1 = 𝜇p . If Φ−1 (𝜈) = [𝜆1 , 𝜈), then the implication holds, thus we can suppose that Φ−1 (𝜈) ≠ [𝜆1 , 𝜈) and let 𝜔1 ∈ Φ−1 (𝜈) ∖ [𝜆1 , 𝜈) arbitrary. We get [𝜔1 , 𝜈) ⊂ Φ−1 (𝜈) and, moreover, we infer from the hypothesis ′ the existence of p′ ≥ 1 and 𝜔2 , … , 𝜔p ∈ Bn such that [𝜔1 , 𝜈) ⊊ [𝜔2 , 𝜈) ⊊ … ⊊ [𝜔p , 𝜈) ⊂ Φ−1 (𝜈), ′
∀𝜇 ∈ Bn , not ([𝜔p , 𝜈) ⊊ [𝜇, 𝜈) ⊂ Φ−1 (𝜈)), ′
therefore we can define 𝜆2 = 𝜔p . If Φ−1 (𝜈) = [𝜆1 , 𝜈) ∪ [𝜆2 , 𝜈) then the implication holds, thus we can suppose that Φ−1 (𝜈) ≠ [𝜆1 , 𝜈) ∪ [𝜆2 , 𝜈) and let 𝛿 1 ∈ Φ−1 (𝜈) ∖ ([𝜆1 , 𝜈) ∪ [𝜆2 , 𝜈)) arbitrary. We get [𝛿 1 , 𝜈) ⊂ Φ−1 (𝜈) … In finitely many steps, we get the existence of 𝜆k ∈ Bn such that Φ−1 (𝜈) = [𝜆1 , 𝜈) ∪ … ∪ [𝜆k , 𝜈) and the implication holds. (b) Case Φ(𝜈) = 𝜈 If Φ−1 (𝜈) = {𝜈}, then (11.6) is true and the implication holds, thus we can suppose that Φ−1 (𝜈) ≠ {𝜈}. Let 𝜇1 ∈ Φ−1 (𝜈) ∖ {𝜈} arbitrary, thus [𝜇1 , 𝜈] ⊂ Φ−1 (𝜈). The hypothesis shows the existence of p ≥ 1 and 𝜇2 , … , 𝜇p ∈ Bn such that ′
[𝜇1 , 𝜈] ⊊ [𝜇2 , 𝜈] ⊊ … ⊊ [𝜇p , 𝜈] ⊂ Φ−1 (𝜈), ∀𝜇 ∈ Bn , not ([𝜇p , 𝜈] ⊊ [𝜇, 𝜈] ⊂ Φ−1 (𝜈)) and we define 𝜆1 = 𝜇p … The proof continues similarly with Case (a), until we get all of 𝜆1 ∈ Bn , … , 𝜆k ∈ Bn such that Φ−1 (𝜈) = [𝜆1 , 𝜈] ∪ … ∪ [𝜆k , 𝜈]. The implication is proved. We show that ∀𝜈 ∈ Bn , the disjunction of (11.5)–(11.12) implies (11.3). Let for this 𝜈 ∈ Bn arbitrary, fixed. If (11.5) is true, then the implication ∀𝜇 ∈ ∅, [𝜇, 𝜈) ⊂ ∅ is trivially true. We suppose that (11.6) is true, when the only choice of 𝜇 ∈ Φ−1 (𝜈) is 𝜇 = 𝜈 and (11.3) is true under the form ∅ ⊂ {𝜈}.
117
118
11 The Generalized Technical Condition of Proper Operation
The rest of the possibilities is represented by the disjunction of (11.7)–(11.12), when we choose 𝜇 ∈ Φ−1 (𝜈) arbitrarily. In this case, 𝜆 ∈ Bn exists such that 𝜇 ∈ [𝜆, 𝜈) and [𝜇, 𝜈) ⊂ [𝜆, 𝜈) ⊂ Φ−1 (𝜈) are true, thus (11.3) holds
◽
Definition 11.1 If one of the equivalent statements from Theorem 11.1 holds, we say that Φ fulfills the generalized technical condition of proper operation. Remark 11.1 For any 𝜇, a unique 𝜆 exists in (11.7), (11.8) such that Φ−1 (𝜇) = [𝜆, 𝜇), Φ−1 (𝜇) = [𝜆, 𝜇] take place (see Theorem 2.2, page 23). The unique existence of distinct 𝜆1 , 𝜆2 , … , 𝜆k is also true in (11.9)–(11.12), modulo their order. Remark 11.2 For any 𝜇, the generalized tcpo refers to the situation when 𝜇 and 𝜈 = Φ(𝜇) differ on k ≥ 2 coordinates, i1 , … , ik ; then the value Φ(𝜇) is asked to be equal with the value of Φ in any intermediate value 𝜔 = 𝜇 ⊕ 𝜆1 𝜀i1 ⊕ … ⊕ 𝜆k 𝜀ik , 𝜆 ≠ (1, … , 1) ∈ Bk that might result by the computation of ≤ k − 1 unstable coordinates 𝜇i , i ∈ {i1 , … , ik }. Remark 11.3 We see that tcpo is indeed a special case of the generalized tcpo. This happens since, if 𝜇 and Φ(𝜇) differ on 0 or 1 coordinates, then the hypothesis of (11.4) is false and the generalized tcpo is fulfilled. Remark 11.4 Statement (11.5) is a special case of (11.7), when 𝜆 = 𝜈 and [𝜆, 𝜈) = ∅; similarly, (11.6) is a special case of (11.8) when 𝜆 = 𝜈 and [𝜆, 𝜈] = {𝜈}. Such remarks may continue, since (11.7) is a special case of (11.9) when 𝜆1 = 𝜆2 , etc. We have written (11.5)–(11.12) under that form in order to state the generalized tcpo in a most intuitive manner. Theorem 11.2 Φ fulfills the generalized tcpo if and only if Φ∗ fulfills the generalized tcpo. Proof: Only if. For any 𝜇 ∈ Bn , 𝜔 ∈ [𝜇, Φ(𝜇)), we notice first of all, see Remark 2.3, page 25, that [𝜇, Φ(𝜇)) = [𝜇, Φ(𝜇)] ∖ {Φ(𝜇)} = [𝜇, Φ(𝜇)] ∖ {Φ(𝜇)} = [𝜇, Φ(𝜇)] ∖ {Φ(𝜇)} = [𝜇, Φ(𝜇)) = [𝜇, Φ∗ (𝜇)). We take 𝜇 ∈ Bn , 𝜔 ∈ [𝜇, Φ(𝜇)) arbitrary, fixed and we have Φ∗ (𝜔) = Φ(𝜔) = Φ(𝜇) = Φ∗ (𝜇). Moreover, when 𝜇 runs in Bn and 𝜔 runs in [𝜇, Φ(𝜇)), 𝜇 runs in Bn and 𝜔 runs in [𝜇, Φ∗ (𝜇)). Φ∗ fulfills the generalized tcpo. If. The inverse reasoning is clear now ◽
11.2 Examples
Theorem 11.3 If the function Φ ∶ Bn −−→ Bn is bijective, then the following statements are equivalent: (a) ∀𝜇 ∈ Bn , (Φ−1 (𝜇) = {𝜇} or ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i }); (b) Φ satisfies tcpo; (c) Φ satisfies the strong tcpo; (d) Φ satisfies the generalized tcpo. Proof: (a) ⇐⇒ (b) ⇐⇒ (c) coincides with Theorem 10.3, page 109. (b) =⇒ (d) obvious (see Remark 11.3). (d) =⇒ (b) We take 𝜇 ∈ Bn arbitrary and fixed. If we would have, against all reason, card([𝜇, Φ(𝜇))) ≥ 2, then 𝜔 ∈ [𝜇, Φ(𝜇)) would exist, 𝜔 ≠ 𝜇, with Φ(𝜔) = Φ(𝜇), contradiction with the bijectivity of Φ, thus card([𝜇, Φ(𝜇))) ∈ {0, 1}. We have: card([𝜇, Φ(𝜇))) = card([𝜇, Φ(𝜇)]) − 1 = 2d(𝜇,Φ(𝜇)) − 1 = 2card(Φ𝜇 ) − 1. From 2card(Φ𝜇 ) ∈ {1, 2}, we infer that card(Φ𝜇 ) ∈ {0, 1}, thus Φ satisfies tcpo ◽
11.2 Examples Example 11.1 The identity 1Bn ∶ Bn −−→ Bn satisfies ∀𝜇 ∈ Bn , (1Bn )−1 (𝜇) = {𝜇} therefore (11.6) is true.
Figure 11.1 Φ fulfills the generalized tcpo.
Example 11.2 We give in Figure 11.1 an example of function Φ that fulfills the generalized tcpo. The most interesting computation here is Φ(0, 0, 0) = (0, 1, 1), which can take place in three different ways, as Φ3 (0, 0, 0) is computed first, and (0, 0, 1) is an intermediate value; Φ2 (0, 0, 0) is computed first, and (0, 1, 0) is an intermediate value; or Φ2 (0, 0, 0), Φ3 (0, 0, 0) are computed at the same time, and no intermediate values exist. All the other computations take place in similar conditions with tcpo. Example 11.3 The function from Figure 11.2 fulfills the generalized tcpo. Example 11.4 We have the example of the function from Figure 11.3 that fulfills also the generalized tcpo.
119
120
11 The Generalized Technical Condition of Proper Operation
Figure 11.2 Φ fulfills the generalized tcpo.
Figure 11.3 Φ fulfills the generalized tcpo.
Example 11.5 In Figure 1.4, page 13 we have the example of the function Φ ∶ B2 −−→ B2 , ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) that does not fulfill the generalized tcpo. This is seen from the counterexample: Φ(0, 0) = (1, 1), but Φ(0, 1) = (1, 0).
11.3 Iterates Remark 11.5 We notice that if Φ ∶ Bn −−→ Bn fulfills the generalized tcpo, then Φ ∘ Φ might not fulfill the same property. For this, we denote with Φ the function from Figure 11.1. In (11.1) written for Φ ∘ Φ and 𝜇 = (1, 1, 1) ∶ ∀𝜔 ∈ [(1, 1, 1), (1, 0, 0)), (Φ ∘ Φ)(1, 1, 1) = (Φ ∘ Φ)(𝜔), we take 𝜔 = (1, 0, 1). We get (Φ ∘ Φ)(1, 1, 1) = (1, 0, 0) ≠ (1, 0, 1) = (Φ ∘ Φ)(1, 0, 1). More general, if Φ, Ψ ∶ Bn −−→ Bn fulfill the generalized tcpo, then Φ ∘ Ψ might not fulfill the generalized tcpo. Theorem 11.4 Φ fulfills the generalized tcpo if and only if for any 𝜆 ∈ Bn , Φ𝜆 fulfills the generalized tcpo. Proof: Only if. We fix 𝜆 ∈ Bn , 𝜇 ∈ Bn arbitrarily and we prove that ∀𝜔 ∈ [𝜇, Φ(𝜇)), Φ(𝜇) = Φ(𝜔)
(11.14)
11.4 The Sets of Predecessors and Successors
implies ∀𝜔 ∈ [𝜇, Φ𝜆 (𝜇)), Φ𝜆 (𝜇) = Φ𝜆 (𝜔).
(11.15)
We suppose that p ∈ {1, … , n}, i1 ∈ {1, … , n}, … , ip ∈ {1, … , n} exist such that Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip and, from Theorem 1.5, page 9 we get Φ𝜆 (𝜇) = 𝜇 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip . In order that Φ𝜆 (𝜇) ≠ 𝜇, for nontriviality, we have the existence of j ∈ {1, … , p} with 𝜆ij = 1. An element 𝜔 ∈ [𝜇, Φ𝜆 (𝜇)) fulfills 𝜔 = 𝜇 ⊕ 𝛿 i 1 𝜆i 1 𝜀 i 1 ⊕ … ⊕ 𝛿 i p 𝜆i p 𝜀 i p ,
(11.16)
where 𝛿 ∈ Bn and at least a j ∈ {1, … , p} exists such that 𝛿ij = 0, 𝜆ij = 1. As 𝜔 ∈ [𝜇, 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ), we can apply (11.14) and we infer: ∀k ∈ {1, … , n}, { { (11.14),(11.16) 𝜔k , if 𝜆k = 0, 𝜇k , if 𝜆k = 0, 𝜆 = Φk (𝜔) = = Φ𝜆k (𝜇). Φk (𝜔), if 𝜆k = 1 Φk (𝜇), if 𝜆k = 1 If. This implication is obvious if we take 𝜆 = (1, … , 1) ∈ Bn
◽
11.4 The Sets of Predecessors and Successors Remark 11.6
The properties ∀𝜇 ∈ Bn ,
𝜇 ⊃ {𝜇} ∪ Φ−1 (𝜇), −
𝜇+ ⊃ {𝜇} ∪ {Φ(𝜇)}, see Theorem 1.8, page 16, which are to be compared with Theorem 9.5, page 101, do not hold as equality. In order to see this, we take a look for the first inclusion at Figure 11.1, page 119 where (0, 1, 0)− = {(0, 0, 0), (0, 1, 0)} and Φ−1 (0, 1, 0) = ∅, thus (0, 1, 0)− ⊂ {(0, 1, 0)} ∪ Φ−1 (0, 1, 0) is false. In the same figure, we have (0, 0, 0)+ = {(0, 0, 0), (0, 0, 1), (0, 1, 0), (0, 1, 1)} ⊃ {(0, 0, 0), (0, 1, 1)} = {(0, 0, 0)} ∪ {Φ(0, 0, 0)}. Theorem 11.5 If Φ fulfills the generalized tcpo, then ∀𝜇 ∈ Bn , ∀𝜈 ∈ 𝜇− , [𝜈, 𝜇] ⊂ 𝜇− . Proof: Let 𝜇 ∈ Bn , 𝜈 ∈ 𝜇− arbitrary and fixed. Some 𝜆 ∈ Bn exists with Φ𝜆 (𝜈) = 𝜇.
(11.17)
Φ(𝜈) = 𝜈
(11.18)
If
121
122
11 The Generalized Technical Condition of Proper Operation
then (11.17)
𝜈 = Φ(𝜈) = Φ𝜆 (𝜈) = 𝜇 and the inclusion to be proved [𝜈, 𝜇] = [𝜈, 𝜈] = {𝜈} ⊂ 𝜈 − is trivial, thus we can suppose from now the falsity of (11.18). In other words, p, i1 , … , ip ∈ {1, … , n} exist such that Φ(𝜈) = 𝜈 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip
(11.19)
and we infer the truth of (11.19)
Φ𝜆 (𝜈) = 𝜈 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip
(11.17)
= 𝜇.
(11.20)
The satisfaction of the generalized tcpo means that (11.21)
∀𝜔 ∈ [𝜈, Φ(𝜈)), Φ(𝜈) = Φ(𝜔) and the inclusion to be proved is, from (11.20): [𝜈, 𝜈 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip ] ⊂ 𝜇− .
(11.22)
We take an arbitrary 𝜔 ∈ [𝜈, 𝜈 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀ip ], i.e. 𝛿 ∈ Bn exists with 𝜔 = 𝜈 ⊕ 𝛿 i 1 𝜆i 1 𝜀 i 1 ⊕ … ⊕ 𝛿 i p 𝜆i p 𝜀 i p
(11.23)
and we must prove the existence of 𝜌 ∈ B such that n
Φ𝜌 (𝜔) = 𝜇.
(11.24) ip (11.20)
If 𝜔 = 𝜈 ⊕ 𝜆i1 𝜀i1 ⊕ … ⊕ 𝜆ip 𝜀 = 𝜇, then equation (11.24) takes place for 𝜌 = (0, … , 0), thus we can suppose that 𝜔 ≠ 𝜇, in other words ∃k ∈ {1, … , p} with 𝛿ik = 0, 𝜆ik = 1. In these conditions 𝜔 ∈ [𝜈, Φ𝜆 (𝜈)) ⊂ [𝜈, Φ(𝜈)) and we can apply (11.21). We have ∀k ∈ {1, … , n}, { 𝜔k , if 𝜌k = 0, 𝜌 Φk (𝜔) = Φk (𝜔), if 𝜌k = 1 (11.21),(11.23)
=
(11.19)
=
⎧𝜈 , if k ∈ {1, … , n} ∖ {i , … , i }, 𝜌 = 0, 1 p k ⎪ k ⊕ 𝛿 𝜆 , if k ∈ {i , … , i }, 𝜌 = 0, 𝜈 ⎨ k k k 1 p k ⎪Φ (𝜈), if 𝜌 = 1 k ⎩ k ⎧𝜈 , if k ∈ {1, … , n} ∖ {i , … , i }, 𝜌 = 0, 1 p k ⎪ k ⎪𝜈k ⊕ 𝛿k 𝜆k , if k ∈ {i1 , … , ip }, 𝜌k = 0, ⎨ ⎪𝜈k , if k ∈ {1, … , n} ∖ {i1 , … , ip }, 𝜌k = 1, ⎪𝜈k ⊕ 1, if k ∈ {i1 , … , ip }, 𝜌k = 1 ⎩
11.4 The Sets of Predecessors and Successors
{ =
𝜈k , if k ∈ {1, … , n} ∖ {i1 , … , ip }, 𝜈k ⊕ (𝜌k ∪ 𝛿k 𝜆k ), if k ∈ {i1 , … , ip }
(11.24)
= 𝜇k .
From (11.20), the last equality is true if we take 𝜌 = 𝜆. The inclusion (11.22) holds ◽ Theorem 11.6 We suppose that Φ ∶ Bn −−→ Bn fulfills the generalized tcpo and we take an arbitrary 𝜇 ∈ Bn . Then one of 𝜇− = {𝜇},
(11.25)
∃𝜆 ∈ Bn , 𝜇− = [𝜆, 𝜇],
(11.26)
∃k ∈ {2, … , 2 }, ∃𝜆 ∈ B , … , ∃𝜆 ∈ B , 1
n
n
k
𝜇− = [𝜆1 , 𝜇] ∪ … ∪ [𝜆k , 𝜇]
n
(11.27)
holds. Proof: The proof is similar with the proof of (11.3) implies that ∀𝜈 ∈ Bn , the disjunction of (11.5)–(11.12) holds from Theorem 11.1, page 115. Let 𝜇 ∈ Bn arbitrary, fixed. If 𝜇 is a source or an isolated fixed point, then (11.25) is true and the implication is proved, thus we can suppose for the rest of the proof that 𝜇− ≠ {𝜇}. We take 𝜇1 ∈ 𝜇− and we get from Theorem 11.5 that [𝜇1 , 𝜇] ⊂ 𝜇− . We infer from the hypothesis the existence of p ≥ 1 and 𝜇2 , … , 𝜇p ∈ Bn with [𝜇1 , 𝜇] ⊊ [𝜇2 , 𝜇] ⊊ … ⊊ [𝜇p , 𝜇] ⊂ 𝜇− , ∀𝜈 ∈ Bn , not ([𝜇p , 𝜇] ⊊ [𝜈, 𝜇] ⊂ 𝜇− ) and we define 𝜆1 = 𝜇p . If 𝜇− = [𝜆1 , 𝜇], then (11.26) holds and the implication is true, thus we can suppose that 𝜇− ≠ [𝜆1 , 𝜇] and let 𝜔1 ∈ 𝜇− ∖ [𝜆1 , 𝜇] arbitrary. We obtain from Theorem 11.5 that [𝜔1 , 𝜇] ⊂ 𝜇− and in addition the hypothesis ′ states the existence of p′ ≥ 1 and 𝜔2 , … , 𝜔p ∈ Bn with [𝜔1 , 𝜇] ⊊ [𝜔2 , 𝜇] ⊊ … ⊊ [𝜔p , 𝜇] ⊂ 𝜇− , ′
∀𝜈 ∈ Bn , not ([𝜔p , 𝜇] ⊊ [𝜈, 𝜇] ⊂ 𝜇− ) ′
thus we can define 𝜆2 = 𝜔p . If 𝜇− = [𝜆1 , 𝜇] ∪ [𝜆2 , 𝜇], (11.27) holds and the implication is true, therefore we can suppose that 𝜇− ≠ [𝜆1 , 𝜇] ∪ [𝜆2 , 𝜇] and let 𝛿 1 ∈ 𝜇− ∖ ([𝜆1 , 𝜇] ∪ [𝜆2 , 𝜇]) arbitrary. We have [𝛿 1 , 𝜇] ⊂ 𝜇− … In finitely many steps, we obtain 𝜆k ∈ Bn such that (11.27) is true. The theorem is proved ◽ ′
Remark 11.7 As we have previously noticed in a similar case, if k = 1, 𝜆1 = 𝜇, we get the special case 𝜇− = {𝜇} and the above theorem could have been formulated in a more concise way.
123
124
11 The Generalized Technical Condition of Proper Operation
Remark 11.8 The statement referring to the form of 𝜇+ when the generalized tcpo is fulfilled is trivial, since 𝜇+ = [𝜇, Φ(𝜇)] is true irrespective of the fact that the generalized tcpo holds or not. Unlike the satisfaction of tcpo where card(𝜇+ ) ∈ {1, 2}, here we have card(𝜇+ ) ∈ {1, 2, … , 2n }, in particular card(𝜇+ ) = 1 if Φ(𝜇) = 𝜇 and card(𝜇+ ) = 2n if Φ(𝜇) = 𝜇. Theorem 11.7 If Φ fulfills the generalized tcpo, then ∀𝜇 ∈ Bn we have O− (𝜇) ⊃ {𝜇} ∪ Φ−1 (𝜇) ∪ Φ−1 (Φ−1 (𝜇)) ∪ … , +
(11.28)
(2)
(11.29)
O (𝜇) = [𝜇, Φ(𝜇)] ∪ [Φ(𝜇), Φ (𝜇)] ∪ …
Proof: (11.28). Let 𝜈 ∈ {𝜇} ∪ Φ−1 (𝜇) ∪ Φ−1 (Φ−1 (𝜇)) ∪ … arbitrary. If 𝜈 = 𝜇, then 𝜈 ∈ O− (𝜇), thus we can take k ≥ 1 and 𝜈 ∈ Φ−1 (Φ−1 (… (Φ−1 (𝜇)) …)), for ⏟⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏟⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏞⏟ k
which Φ(k) (𝜈) = 𝜇, hence 𝜈 ∈ O− (𝜇). (11.29). We prove O+ (𝜇) ⊂ [𝜇, Φ(𝜇)] ∪ [Φ(𝜇), Φ(2) (𝜇)] ∪ …
(11.30)
and let 𝜈 ∈ O+ (𝜇), 𝜈 = (Φ𝜆 ∘ … ∘ Φ𝜆 )(𝜇), where 𝜆1 , … , 𝜆p ∈ Bn . If Φ𝜆 (𝜇) = 1 1 Φ(𝜇), we denote i1 = 1. Otherwise Φ𝜆 (𝜇) ∈ [𝜇, Φ(𝜇)), Φ(Φ𝜆 (𝜇)) = Φ(𝜇) and 1 1 2 1 ∀𝜈 ∈ Bn , Φ𝜈 (Φ𝜆 (𝜇)) ∈ [Φ𝜆 (𝜇), Φ(𝜇)] ⊂ [𝜇, Φ(𝜇)]. If (Φ𝜆 ∘ Φ𝜆 )(𝜇) = Φ(𝜇), we 2 1 2 1 denote i1 = 2, otherwise (Φ𝜆 ∘ Φ𝜆 )(𝜇) ∈ [𝜇, Φ(𝜇)), Φ((Φ𝜆 ∘ Φ𝜆 )(𝜇)) = Φ(𝜇) 2 1 2 1 and ∀𝜈 ∈ Bn , Φ𝜈 ((Φ𝜆 ∘ Φ𝜆 )(𝜇)) ∈ [(Φ𝜆 ∘ Φ𝜆 )(𝜇), Φ(𝜇)] ⊂ [𝜇, Φ(𝜇)] … We i 1 denote with i1 ≥ 1 the least number with (Φ𝜆 1 ∘ … ∘ Φ𝜆 )(𝜇) = Φ(𝜇) and we have p
1
1
∀k ∈ {1, … , i1 }, (Φ𝜆 ∘ … ∘ Φ𝜆 )(𝜇) ∈ [𝜇, Φ(𝜇)]. k
1
If (Φ𝜆 1 ∘ … ∘ Φ𝜆 )(𝜇) = Φ(2) (𝜇), we denote i2 = i1 + 1. Otherwise i +1 1 i +1 1 (Φ𝜆 1 ∘ … ∘ Φ𝜆 )(𝜇) ∈ [Φ(𝜇), Φ(2) (𝜇)), Φ((Φ𝜆 1 ∘ … ∘ Φ𝜆 )(𝜇)) = Φ(2) (𝜇) and i1 +1 1 i1 +1 1 we get ∀𝜈 ∈ Bn , Φ𝜈 ((Φ𝜆 ∘ … ∘ Φ𝜆 )(𝜇)) ∈ [(Φ𝜆 ∘ … ∘ Φ𝜆 )(𝜇), Φ(2) (𝜇)] ⊂ [Φ(𝜇), Φ(2) (𝜇)] …We denote with i2 ≥ i1 + 1 the least number with i 1 (Φ𝜆 2 ∘ … ∘ Φ𝜆 )(𝜇) = Φ(2) (𝜇) and we have i +1
1
∀k ∈ {i1 , … , i2 }, (Φ𝜆 ∘ … ∘ Φ𝜆 )(𝜇) ∈ [Φ(𝜇), Φ(2) (𝜇)] … k
1
The reasoning is finite, and we finally get the existence of iq < p such that ∀k ∈ {iq , … , p}, (Φ𝜆 ∘ … ∘ Φ𝜆 )(𝜇) ∈ [Φ(q−1) (𝜇), Φ(q) (𝜇)]. k
1
The inclusion O+ (𝜇) ⊃ [𝜇, Φ(𝜇)] ∪ [Φ(𝜇), Φ(2) (𝜇)] ∪ … is obvious
◽
11.5 Source, Isolated Fixed Point, Transient Point, Sink
11.5 Source, Isolated Fixed Point, Transient Point, Sink Theorem 11.8 Let Φ ∶ Bn −−→ Bn . We suppose that the generalized tcpo holds and let 𝜇 ∈ Bn be arbitrary, fixed. The following exclusive possibilities exist. (i) If Φ−1 (𝜇) = ∅, then 𝜇 is either a source or a transient point; (ii) if Φ−1 (𝜇) = {𝜇}, then 𝜇 is an isolated fixed point; (iii) if ∃p ∈ {1, … , 2n }, ∃𝜆1 ∈ Bn , … , ∃𝜆p ∈ Bn , Φ−1 (𝜇) = [𝜆1 , 𝜇) ∪ … ∪ [𝜆p , 𝜇), then 𝜇 is a transient point; (iv) if ∃p ∈ {1, … , 2n }, ∃𝜆1 ∈ Bn , … , ∃𝜆p ∈ Bn , Φ−1 (𝜇) = [𝜆1 , 𝜇] ∪ … ∪ [𝜆p , 𝜇], then 𝜇 is sink. Proof: Case (i) In Figure 11.2, page 120 the generalized tcpo is satisfied. The point 𝜇 = (0, 1, 1) is a source with Φ−1 (0, 1, 1) = ∅, (0, 1, 1)− = {(0, 1, 1)}, (0, 1, 1)+ = {(0, 1, 1), (0, 0, 1), (0, 1, 0), (0, 0, 0)} and the point 𝜇 = (0, 0, 1) is transient, satisfying Φ−1 (0, 0, 1) = ∅, (0, 0, 1)− = {(0, 1, 1), (0, 0, 1)}, (0, 0, 1)+ = {(0, 0, 1), (0, 0, 0)}. The first assertion of the theorem results from the fact that the isolated fixed points and the sinks 𝜇 satisfy Φ(𝜇) = 𝜇, thus 𝜇 ∈ Φ−1 (𝜇). Case (ii) As Φ(𝜇) = 𝜇, we have 𝜇+ = {𝜇} and we must still prove that 𝜇− = {𝜇}. We suppose against all reason that this is false, i.e. 𝜔 ≠ 𝜇, 𝜔 ∈ 𝜇− exists, in other words we get the existence of 𝜈 ∈ Bn such that Φ𝜈 (𝜔) = 𝜇. We infer Φ(𝜔) ≠ 𝜇 (otherwise Φ(𝜔) = 𝜇, resulting the contradiction 𝜔 ∈ Φ−1 (𝜇)). The conclusion is 𝜇 ∈ (𝜔, Φ(𝜔)), but Φ(𝜔)
gen tcpo
=
Φ(𝜇) = 𝜇
is a contradiction. This proves that 𝜇− = {𝜇}. Case (iii) Theorem 1.8, page 16 shows that {𝜇} ≠ {𝜇} ∪ [𝜆1 , 𝜇) ∪ … ∪ [𝜆p , 𝜇) ⊂ 𝜇− . In addition, Φ(𝜇) ≠ 𝜇 and 𝜇+ ≠ {𝜇} are clear.
125
126
11 The Generalized Technical Condition of Proper Operation
Case (iv) Theorem 1.8 gives {𝜇} ≠ {𝜇} ∪ [𝜆1 , 𝜇] ∪ … ∪ [𝜆p , 𝜇] ⊂ 𝜇− . Moreover, we infer Φ(𝜇) = 𝜇 and 𝜇+ = {𝜇}
◽
Remark 11.9 To be compared (i)–(iv) of Theorem 11.8 with (i)–(iv) of Theorem 9.8, page 103 and to be noticed how the generalization works. Remark 11.10 In Theorem 11.8, the situation Φ−1 (𝜇) = [𝜇, Φ(𝜇)) is impossible. Indeed, there are two possibilities: (a) Case [𝜇, Φ(𝜇)) = ∅, when Φ(𝜇) = 𝜇. This implies that 𝜇 ∈ Φ−1 (𝜇), contradiction. (b) Case [𝜇, Φ(𝜇)) ≠ ∅. As 𝜇 ∈ [𝜇, Φ(𝜇)), we obtain Φ(𝜇) = 𝜇, but this shows that [𝜇, Φ(𝜇)) = ∅, contradiction. Remark 11.11 If in Theorem 11.8 Φ is bijective, then it fulfills tcpo and one of the next statements is true (see Theorem 11.3, page 119) for any 𝜇 ∈ Bn : (j) Φ−1 (𝜇) = {𝜇}, when 𝜇 is an isolated fixed point; (jj) ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i }, when 𝜇 is a transient point.
11.6 Isomorphisms vs the Generalized tcpo Theorem 11.9 We consider the functions Φ, Ψ ∶ Bn −−→ Bn and the isomorphism (h, h′ ) ∈ Iso(Φ, Ψ). If Φ fulfills the generalized tcpo and h is compatible ◽ with the affine structure of Bn , then Ψ fulfills the generalized tcpo Proof: For 𝜈 ∈ Bn arbitrary, fixed the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Ψh
′ (𝜈)
Bn −−→ Bn is commutative. Let 𝜇′ ∈ Bn arbitrary. If 𝜇′ = Ψh (𝜈) (𝜇′ ), then the property of generalized tcpo: ′
∀𝜔′ ∈ [𝜇′ , Ψh (𝜈) (𝜇′ )), Ψh (𝜈) (𝜇′ ) = Ψh (𝜈) (𝜔′ ) ′
′
′
is trivially fulfilled, so that we can suppose from now that 𝜇′ ≠ Ψh (𝜈) (𝜇′ ) ′ and we take 𝜔′ ∈ [𝜇′ , Ψh (𝜈) (𝜇′ )) arbitrary itself. We define 𝜇 = h−1 (𝜇′ ) and ′
11.6 Isomorphisms vs the Generalized tcpo
𝜔 = h−1 (𝜔′ ). The fact that h ∈ Af (Bn ) implies h−1 ∈ Af (Bn ), see Theorem 2.7, page 28, thus h−1 ([𝜇′ , Ψh (𝜈) (𝜇′ )]) = [h−1 (𝜇′ ), h−1 (Ψh (𝜈) (𝜇′ ))] = [𝜇, h−1 (Ψh (𝜈) (h(𝜇)))] ′
′
′
= [𝜇, h−1 (h(Φ𝜈 (𝜇)))] = [𝜇, Φ𝜈 (𝜇)], in particular 𝜔 ∈ [𝜇, Φ𝜈 (𝜇)). But Φ𝜈 fulfills the generalized tcpo Φ𝜈 (𝜇) = Φ𝜈 (𝜔) from Theorem 11.4, page 120 and we infer Ψh (𝜈) (𝜇′ ) = Ψh (𝜈) (h(𝜇)) = h(Φ𝜈 (𝜇)) = h(Φ𝜈 (𝜔)) ′
′
′
′
= Ψh (𝜈) (h(𝜔)) = Ψh (𝜈) (𝜔′ ). The previous property holds for any 𝜈 and any 𝜇′ , with h′ bijective, thus Ψ𝜈 fulfill all of them the generalized tcpo and we can apply Theorem 11.4 again in order to conclude that Ψ fulfills the generalized tcpo ◽ Example 11.6 The state portraits of two isomorphic functions Φ, Ψ ∶ B3 −−→ B3 that fulfill the generalized tcpo have been drawn in Figures 11.4 and 11.5. The isomorphism (𝜃 (0,0,1) , 1B3 ) ∈ Iso(Φ, Ψ) satisfies the property that 𝜃 (0,0,1) is compatible with the affine structure of B3 , see Example 2.3, page 27. Remark 11.12 We compare now Theorem 9.9, page 104 referring to tcpo with Theorem 11.9 referring to the generalized tcpo. At Theorem 9.9 the function h is bijective and Lipschitz, at Theorem 11.9 h is bijective and compatible with the affine structure of Bn . Theorem 2.9, page 29 shows that in this last case h is Lipschitz with ∀𝜇 ∈ Bn , ∀𝜆 ∈ Bn , d(𝜇, 𝜆) = d(h(𝜇), h(𝜆)). Figure 11.4 Function Φ that fulfills the generalized tcpo.
127
128
11 The Generalized Technical Condition of Proper Operation
Figure 11.5 Function Ψ that fulfills the generalized tcpo.
11.7 Antiisomorphisms vs the Generalized tcpo Theorem 11.10 Let Φ, Ψ ∶ Bn −−→ Bn and (h, h′ )∽ ∈ Iso∽ (Φ, Ψ). We suppose that Φ fulfills the generalized tcpo, that in addition h ∈ Af (Bn ) and that the invariance property ∀𝜈 ∈ Bn , Φ𝜈 (Bn ) = Bn
(11.31)
holds. Then Ψ satisfies ∀𝜈 ∈ Bn , Ψ𝜈 (Bn ) = Bn
(11.32)
and also the generalized tcpo. Proof: We notice, first of all, that h is Lipschitz from Theorem 2.9, page 29. On the other hand (11.31) implies that Φ is bijective so that, taking into account the fact that it satisfies the generalized tcpo, we have from Theorem 11.3, page 119 that Φ fulfills tcpo. We can apply now Theorem 9.10, page 105, showing that Ψ fulfills tcpo and also the invariance (11.32), in particular Ψ is bijective. We conclude from Theorem 11.3 that Ψ fulfills the generalized tcpo ◽ Example 11.7 We get back to Example 4.4, page 47 where we have shown that the functions Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) and Ψ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ) are antiisomorphic, by the existence of (h, h′ )∽ ∈ Iso∽ (Φ, Ψ), h(𝜇1 , 𝜇2 ) = h′ (𝜇1 , 𝜇2 ) = (𝜇2 , 𝜇1 ). Theorem 2.5, page 27 shows that h ∈ Af (Bn ). In addition, Φ fulfills tcpo, the invariance (11.31) and, by Theorem 11.3, page 119, the generalized tcpo. We infer that Ψ satisfies the generalized tcpo in its special form represented by the invariance (11.32) and tcpo.
11.8 Other Properties
11.8 Other Properties Theorem 11.11
Let 𝜇 ∈ Bn and p, i1 , … , ip ∈ {1, … , n} such that
Φ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip and we suppose that Φ fulfills the generalized tcpo. Then ∀𝜆 ∈ Bn , ∀𝜔 ∈ Bn , if 𝜔i1 ⋅ … ⋅ 𝜔ip = 0, we have Φ𝜆 (𝜇 ⊕ 𝜔i1 𝜀i1 ⊕ … ⊕ 𝜔ip 𝜀ip ) = 𝜇 ⊕ (𝜆i1 ∪ 𝜔i1 )𝜀i1 ⊕ … ⊕ (𝜆ip ∪ 𝜔ip )𝜀ip . Proof: We take 𝜆 ∈ Bn , 𝜔 ∈ Bn arbitrary such that 𝜔i1 ⋅ … ⋅ 𝜔ip = 0. We denote 𝜈 = Φ(𝜇), wherefrom 𝜈 = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip and the generalized tcpo shows that [𝜇, 𝜈) ⊂ Φ−1 (𝜈). On the other hand 𝜇 ⊕ 𝜔i1 𝜀i1 ⊕ … ⊕ 𝜔ip 𝜀ip ∈ [𝜇, 𝜈), thus we conclude Φ(𝜇 ⊕ 𝜔i1 𝜀i1 ⊕ … ⊕ 𝜔ip 𝜀ip ) = Φ(𝜇).
(11.33)
We take i ∈ {1, … , n} arbitrary and we infer Φ𝜆i (𝜇 ⊕ 𝜔i1 𝜀i1 ⊕ … ⊕ 𝜔ip 𝜀ip ) ⎧𝜇i , i ∈ {1, … , n} ∖ {i1 , … , ip }, ⎪ = ⎨Φi (𝜇 ⊕ 𝜔i1 𝜀i1 ⊕ … ⊕ 𝜔ip 𝜀ip ), 𝜆i = 1, i ∈ {i1 , … , ip }, ⎪ ⎩𝜇i ⊕ 𝜔i , 𝜆i = 0, i ∈ {i1 , … , ip } ⎧𝜇i , i ∈ {1, … , n} ∖ {i1 , … , ip }, ⎪ (11.33) ⎪Φi (𝜇), 𝜆i = 1, i ∈ {i1 , … , ip }, = ⎨ ⎪𝜇i , (𝜔i = 0 and 𝜆i = 0), i ∈ {i1 , … , ip }, ⎪𝜇 ⊕ 1, (𝜔 = 1 and 𝜆 = 0), i ∈ {i , … , i } ⎩ i i i 1 p ⎧𝜇i , i ∈ {1, … , n} ∖ {i1 , … , ip }, ⎪ = ⎨𝜇i ⊕ 1, (𝜆i = 1 or (𝜔i = 1 and 𝜆i = 0)), i ∈ {i1 , … , ip }, ⎪ ⎩𝜇i , (𝜔i = 0 and 𝜆i = 0), i ∈ {i1 , … , ip } =
{ 𝜇i , i ∈ {1, … , n} ∖ {i1 , … , ip }, 𝜇i ⊕ (𝜆i ∪ 𝜔i ), i ∈ {i1 , … , ip }.
The theorem is proved
◽
129
130
11 The Generalized Technical Condition of Proper Operation
Theorem 11.12 then Φ𝜔 ⊂ Φ𝜇 .
If Φ fulfills the generalized tcpo, 𝜇 ∈ Bn and 𝜔 ∈ [𝜇, Φ(𝜇)),
Proof: From 𝜇 ⊕ Ξ 𝜀i = Φ(𝜇) = Φ(𝜔) = 𝜔 ⊕ Ξ 𝜀i and from the existence i∈Φ𝜇
i∈Φ𝜔
of A ⊂ Φ𝜇 with 𝜔 = 𝜇 ⊕ Ξ 𝜀i , we get Ξ 𝜀i = Ξ 𝜀i ⊕ Ξ 𝜀i = i∈A
A = Φ𝜇 ΔΦ𝜔 = (Φ𝜇 ∖ Φ𝜔 ) ∪ (Φ𝜔 ∖ Φ𝜇 ) ⊂ Φ𝜇 Φ𝜔 ⊂ Φ 𝜇 Theorem 11.13
i∈A
i∈Φ𝜇
implies
i∈Φ𝜔
Ξ
i∈Φ𝜇 ΔΦ𝜔
Φ𝜔 ∖ Φ𝜇 = ∅
𝜀i ;
i.e. ◽
If Φ satisfies the generalized tcpo, then ∀𝜇 ∈ Bn , ∀𝜇′ ∈ 𝜇+ ,
Φ(𝜇′ ) = 𝜇′ =⇒ 𝜇′ = Φ(𝜇).
(11.34)
Proof: We suppose against all reason that the property is false, thus 𝜇 ∈ Bn and 𝜇′ ∈ [𝜇, Φ(𝜇)] exist such that Φ(𝜇′ ) = 𝜇′ and 𝜇′ ≠ Φ(𝜇).
(11.35)
As 𝜇 ∈ [𝜇, Φ(𝜇)), we apply the generalized tcpo and we infer ′
(11.35)
𝜇′ = Φ(𝜇′ ) = Φ(𝜇), contradiction with (11.35)
◽
Remark 11.13 We suppose that Φ fulfills the generalized tcpo. Then ∀𝜇 ∈ Bn , ∀𝜔 ∈ Bn , Φ(𝜇) ≠ Φ(𝜔) =⇒ [𝜇, Φ(𝜇)) ∩ [𝜔, Φ(𝜔)) = ∅. If, against all reason, 𝜆 ∈ [𝜇, Φ(𝜇)) ∩ [𝜔, Φ(𝜔)) would exist, then we would get the contradiction Φ(𝜇) = Φ(𝜆) = Φ(𝜔).
131
12 The Strong Generalized Technical Condition of Proper Operation We strengthen the generalized tcpo to strong generalized tcpo for reasons related with symmetry that will become clear in Chapter 14, and we show how this new property degenerates if Φ is bijective. If Φ fulfills the strong generalized tcpo, then Φ(k) , k ∈ N do not fulfill the same property, but Φ𝜆 , 𝜆 ∈ Bn do. We analyze the sources, the isolated fixed points, the transient points – which are two kinds: synchronous and asynchronous – and the sinks of Φ when it satisfies the strong generalized tcpo. The isomorphisms and the antiisomorphisms preserve, in certain circumstances, the strong generalized tcpo.
12.1 Definition Theorem 12.1 Let Φ ∶ Bn −−→ Bn . Then ∀𝜇 ∈ Bn , (12.1)
∀𝜔 { ∈ [𝜇, Φ(𝜇)), Φ(𝜇) =′ Φ(𝜔), ∀A ⊂ {1, … , n}, ∀A ⊂ {1, … , n}, (Φ(𝜇 ⊕ Ξ 𝜀i ) = 𝜇 and Φ(𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇) =⇒ Φ(𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇 i∈A
i∈A
(12.2)
i∈A∪A
if and only if one of Φ−1 (𝜇) = ∅, −1
(12.3)
Φ (𝜇) = {𝜇},
(12.4)
−1
∃𝜆 ∈ B , Φ (𝜇) = [𝜆, 𝜇),
(12.5)
∃𝜆 ∈ B , Φ (𝜇) = [𝜆, 𝜇]
(12.6)
n n
−1
holds.
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
132
12 The Strong Generalized Technical Condition of Proper Operation
Proof: We take an arbitrary 𝜇 ∈ Bn . Only if. The statement (12.1) shows taking into account Theorem 11.1, page 115, that one of (12.3)–(12.6), or one of ∃𝜆1 ∈ Bn , ∃𝜆2 ∈ Bn , Φ−1 (𝜇) = [𝜆1 , 𝜇) ∪ [𝜆2 , 𝜇),
(12.7)
∃𝜆 ∈ B , ∃𝜆 ∈ B , Φ (𝜇) = [𝜆 , 𝜇] ∪ [𝜆 , 𝜇],
(12.8)
1
2
n
n
1
−1
2
⋮ ∃k ≥ 2, ∃𝜆1 ∈ Bn , … , ∃𝜆k ∈ Bn , Φ−1 (𝜇) = [𝜆1 , 𝜇) ∪ … ∪ [𝜆k , 𝜇),
(12.9)
∃k ≥ 2, ∃𝜆 ∈ B , … , ∃𝜆 ∈ B , Φ (𝜇) = [𝜆 , 𝜇] ∪ … ∪ [𝜆 , 𝜇] (12.10) 1
n
k
n
−1
1
k
is true. Case Φ(𝜇) ≠ 𝜇 We suppose against all reason that the conclusion is false, i.e. k ≥ 2 and 𝜆1 ∈ n B , … , 𝜆k ∈ Bn exist such that Φ−1 (𝜇) = [𝜆1 , 𝜇) ∪ … ∪ [𝜆k , 𝜇),
(12.11)
∀i ∈ {1, … , k}, ∀j ∈ {1, … , k}, i ≠ j =⇒ [𝜆i , 𝜇) ∖ [𝜆j , 𝜇) ≠ ∅.
(12.12)
We define the sets Ai ⊂ {1, … , n} by 𝜆i = 𝜇 ⊕ Ξ i 𝜀j ,
(12.13)
j∈A
i ∈ {1, … , k}. Since (12.11)
(12.13)
𝜇 = Φ(𝜆i ) = Φ(𝜇 ⊕ Ξ i 𝜀j ), j∈A
we infer from (12.2) that Φ(𝜇 ⊕
Ξ
j∈A1 ∪…∪Ak
We define 𝜆 = 𝜇 ⊕
𝜀j ) = 𝜇.
Ξ 𝜀j , we have 𝜆 j∈A1 ∪…∪Ak 1 k
∈ Φ−1 (𝜇) and (11.3)page 115 shows that
[𝜆, 𝜇) ⊂ Φ−1 (𝜇), i.e. 𝜆 , … , 𝜆 ∈ [𝜆, 𝜇) and [𝜆1 , 𝜇) ⊂ [𝜆, 𝜇), … , [𝜆k , 𝜇) ⊂ [𝜆, 𝜇), representing a contradiction with (12.12). Statements (12.7)–(12.10) are all false. Case Φ(𝜇) = 𝜇 The proof is similar, but the supposition against all reason refers to the existence of k ≥ 2 and 𝜆1 ∈ Bn , … , 𝜆k ∈ Bn such that Φ−1 (𝜇) = [𝜆1 , 𝜇] ∪ … ∪ [𝜆k , 𝜇], ∀i ∈ {1, … , k}, ∀j ∈ {1, … , k}, i ≠ j =⇒ [𝜆i , 𝜇] ∖ [𝜆j , 𝜇] ≠ ∅, instead of (12.11), (12.12). If. The disjunction of the statements (12.3)–(12.6) shows that the disjunction of (12.3)–(12.10) holds, thus (12.1) (the generalized tcpo) is true. Let A′ , A′′ ⊂ {1, … , n} with the property that 𝜆1 = 𝜇 ⊕ Ξ ′ 𝜀i , 𝜆2 = 𝜇 ⊕ Ξ ′′ 𝜀i i∈A
i∈A
12.1 Definition
satisfy Φ(𝜆1 ) = Φ(𝜆2 ) = 𝜇. The hypothesis shows the existence of 𝜆 ∈ Bn and A ⊂ {1, … , n} such that 𝜆 = 𝜇 ⊕ Ξ 𝜀i and i∈A
Φ (𝜇) = [𝜆, 𝜇) or Φ (𝜇) = [𝜆, 𝜇] −1
−1
(12.14)
(𝜆 = 𝜇 is possible, thus (12.14) gives all the four possibilities (12.3)–(12.6)). We infer 𝜆1 , 𝜆2 ∈ [𝜆, 𝜇], wherefrom A′ , A′′ ⊂ A. As [𝜆, 𝜇] = {𝜇 ⊕ Ξ 𝜀i |H ⊂ A}, we have in particular that A′ ∪ A′′ ⊂ A, thus Φ(𝜇 ⊕
i∈H
Ξ′ ′′ 𝜀i ) = 𝜇
◽
i∈A ∪A
Definition 12.1 We say that Φ fulfills the strong generalized technical condition of proper operation if ∀𝜇 ∈ Bn , ∀𝜆 ∈ (𝜇, Φ(𝜇)), Φ−1 (𝜆) = ∅
(12.15)
and in addition one of the equivalent properties (12.1) and (12.2) (12.3) or (12.4) or (12.5) or (12.6) is true. Remark 12.1 Obviously, the existence of (12.1) between the previous requests shows that the strong generalized tcpo implies the generalized tcpo. Remark 12.2 The conditions of proper operation (tcpo, strong tcpo, generalized tcpo, strong generalized tcpo) refer to computations of the function Φ that start in 𝜇, include some possible intermediate values 𝜆 ∈ (𝜇, Φ(𝜇)) and finalize in Φ(𝜇). Property (12.15) concerns the intermediate values 𝜆 and states that they cannot represent the finalization of a computation started in some point 𝜈 ∈ Φ−1 (𝜆); thus, any intermediate value 𝜆 is an intermediate value only. We shall prove that these intermediate values are transient points, and we shall call them asynchronous transient points. Theorem 12.2 Φ fulfills the strong generalized tcpo if and only if Φ∗ fulfills the strong generalized tcpo. Proof: Only if. For any 𝜇 ∈ Bn , 𝜆 ∈ Bn , we have (see Remark 2.3, page 25): (𝜇, Φ(𝜇)) = [𝜇, Φ(𝜇)] ∖ {𝜇, Φ(𝜇)} = [𝜇, Φ(𝜇)] ∖ {𝜇, Φ(𝜇)} = [𝜇, Φ(𝜇)] ∖ {𝜇, Φ(𝜇)} = (𝜇, Φ(𝜇)) = (𝜇, Φ∗ (𝜇))
(12.16)
[𝜆, 𝜇) = [𝜆, 𝜇] ∖ {𝜇} = [𝜆, 𝜇] ∖ {𝜇} = [𝜆, 𝜇] ∖ {𝜇} = [𝜆, 𝜇).
(12.17)
and similarly
133
134
12 The Strong Generalized Technical Condition of Proper Operation
Let 𝜇 ∈ Bn and 𝜆 ∈ (𝜇, Φ(𝜇)) arbitrary. We have the following equivalent statements, in succession: Φ−1 (𝜆) = ∅, ∀𝜈 ∈ Bn , Φ(𝜈) ≠ 𝜆, ∀𝜈 ∈ Bn , Φ(𝜈) ≠ 𝜆, ∀𝜈 ∈ Bn , Φ∗ (𝜈) ≠ 𝜆, (Φ∗ )−1 (𝜆) = ∅, where 𝜇 ∈ Bn , 𝜆 ∈ (𝜇Φ(𝜇)) = (𝜇, Φ∗ (𝜇)). Furthermore, the hypothesis states the truth of the disjunction of (12.3)–(12.6) that we prove to be equivalent with the disjunction of (Φ∗ )−1 (𝜇) = ∅, ∗ −1
(12.18)
(Φ ) (𝜇) = {𝜇},
(12.19)
∗ −1
∃𝜆 ∈ B , (Φ ) (𝜇) = [𝜆, 𝜇),
(12.20)
∃𝜆 ∈ Bn , (Φ∗ )−1 (𝜇) = [𝜆, 𝜇].
(12.21)
n
For this, we choose to show the equivalence of (12.5) with (12.20). Indeed, we see that (12.5) is equivalent in succession with any of: ∃𝜆 ∈ Bn , (Φ−1 (𝜇) ⊂ [𝜆, 𝜇) and [𝜆, 𝜇) ⊂ Φ−1 (𝜇)), ∃𝜆 ∈ Bn , ((∀𝜈 ∈ Bn , Φ(𝜈) = 𝜇 =⇒ 𝜈 ∈ [𝜆, 𝜇)) and (∀𝜈, 𝜈 ∈ [𝜆, 𝜇) =⇒ Φ(𝜈) = 𝜇)), ∃𝜆 ∈ Bn , ((∀𝜈 ∈ Bn , Φ(𝜈) ≠ 𝜇 or 𝜈 ∈ [𝜆, 𝜇)) and (∀𝜈, 𝜈 ∉ [𝜆, 𝜇) or Φ(𝜈) = 𝜇)), ∃𝜆 ∈ Bn , ((∀𝜈 ∈ Bn , Φ(𝜈) ≠ 𝜇 or 𝜈 ∈ [𝜆, 𝜇)) and (∀𝜈, 𝜈 ∉ [𝜆, 𝜇) or Φ(𝜈) = 𝜇)), ∃𝜆 ∈ Bn , ((∀𝜈 ∈ Bn , Φ∗ (𝜈) ≠ 𝜇 or 𝜈 ∈ [𝜆, 𝜇)) and (∀𝜈, 𝜈 ∉ [𝜆, 𝜇) or Φ∗ (𝜈) = 𝜇)), ∃𝜆 ∈ Bn , ((∀𝜈 ∈ Bn , Φ∗ (𝜈) = 𝜇 =⇒ 𝜈 ∈ [𝜆, 𝜇)) and (∀𝜈, 𝜈 ∈ [𝜆, 𝜇) =⇒ Φ∗ (𝜈) = 𝜇)), ∃𝜆 ∈ Bn , ((Φ∗ )−1 (𝜇) ⊂ [𝜆, 𝜇) and [𝜆, 𝜇) ⊂ (Φ∗ )−1 (𝜇)), (12.20). If. The steps of the proof are the same like previously, in the inverse order
◽
12.2 Examples
Theorem 12.3 If Φ fulfills the strong tcpo, then it fulfills also the strong generalized tcpo. Proof: Let 𝜇 ∈ Bn arbitrary. The disjunction of (10.2)page 107 –(10.5)page 107 implies the disjunction of (12.3)–(12.6). On the other hand, as Φ fulfills tcpo, we get (𝜇, Φ(𝜇)) = ∅, therefore (12.15) is trivially fulfilled ◽ Remark 12.3 The conclusion, as resulted by taking into account Theorem 12.3, is that the following implications hold: tcpo ⇐= strong tcpo ⇓ ⇓ generalized tcpo ⇐= strong generalized tcpo Theorem 12.4 If the function Φ ∶ Bn −−→ Bn is bijective, then the following statements are equivalent: (a) ∀𝜇 ∈ Bn , (Φ−1 (𝜇) = {𝜇} or ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i }); (b) Φ satisfies tcpo; (c) Φ satisfies the strong tcpo; (d) Φ satisfies the generalized tcpo; (e) Φ fulfills the strong generalized tcpo. Proof: (a) ⇐⇒ (b) ⇐⇒ (c) ⇐⇒ (d) has been proved at Theorem 11.3, page 119. (c) =⇒ (e) This is the statement of Theorem 12.3. (e) =⇒ (d) obvious ◽
12.2 Examples Example 12.1 The identity 1Bn ∶ Bn −−→ Bn fulfills the strong generalized tcpo. Example 12.2 The function Φ from Figure 11.1, page 119 that fulfills the generalized tcpo fulfills also the strong generalized tcpo. For this, the satisfaction ∀𝜇 ∈ B3 of (12.15) is easily noticed: (0, 1, 0) ∈ ((0, 0, 0), (0, 1, 1)) and Φ−1 (0, 1, 0) = ∅, (0, 0, 1) ∈ ((0, 0, 0), (0, 1, 1)) and Φ−1 (0, 0, 1) = ∅ and the fulfillment of the disjunction of (12.3)–(12.6): Φ−1 (0, 1, 1) = [(0, 0, 0), (0, 1, 1)) = {(0, 0, 0), (0, 0, 1), (0, 1, 0)}, Φ−1 (1, 1, 1) = [(0, 1, 1), (1, 1, 1)) = {(0, 1, 1)}, Φ−1 (1, 0, 1) = {(1, 0, 1)}, etc., is clear too.
135
136
12 The Strong Generalized Technical Condition of Proper Operation
Example 12.3 The function from Figure 11.2, page 120 fulfills the strong generalized tcpo, similarly with the previous example. Example 12.4 The function from Figure 11.3, page 120 fulfills the generalized tcpo, but it does not fulfill the strong generalized tcpo. For this it is enough to see that (0, 0, 1) ∈ ((0, 1, 1), (0, 0, 0)) and Φ−1 (0, 0, 1) = {(1, 0, 1)} ≠ ∅, i.e. (12.15) is false.
12.3 Iterates Remark 12.4 If Φ fulfills the strong generalized tcpo, then Φ ⚬ Φ might not fulfill the same property. It is sufficient in this respect to refer to Remark 11.5, page 120 and the example given there. Theorem 12.5 Φ fulfills the strong generalized tcpo if and only if for any 𝜈 ∈ Bn , Φ𝜈 fulfills the strong generalized tcpo. Proof: Only if. We fix arbitrarily 𝜇 ∈ Bn and 𝜈 ∈ Bn . We prove that the conjunction of ∀𝜆 ∈ (𝜇, Φ(𝜇)), Φ−1 (𝜆) = ∅,
(12.22)
∀𝜔 (12.23) { ∈ [𝜇, Φ(𝜇)), Φ(𝜇) =′ Φ(𝜔), ∀A ⊂ {1, … , n}, ∀A ⊂ {1, … , n}, (12.24) (Φ(𝜇 ⊕ Ξ 𝜀i ) = 𝜇 and Φ(𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇) =⇒ Φ(𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇 i∈A
i∈A
i∈A∪A
implies the conjunction of ∀𝜆 ∈ (𝜇, Φ𝜈 (𝜇)), (Φ𝜈 )−1 (𝜆) = ∅, 𝜈
𝜈
𝜈
∀𝜔 ∈ [𝜇, Φ (𝜇)), Φ (𝜇) = Φ (𝜔), ⎧∀A ⊂ {1, … , n}, ∀A′ ⊂ {1, … , n}, ⎪(Φ𝜈 (𝜇 ⊕ Ξ 𝜀i ) = 𝜇 and Φ𝜈 (𝜇 ⊕ Ξ 𝜀i ) = 𝜇) ⎨ i∈A i∈A′ ⎪=⇒ Φ𝜈 (𝜇 ⊕ Ξ 𝜀i ) = 𝜇. ⎩ i∈A∪A′
(12.25) (12.26) (12.27)
We notice first of all that the generalized tcpo (12.26) is true from Theorem 11.4, page 120. We suppose against all reason that (12.25) is false, i.e. 𝜆 ∈ (𝜇, Φ𝜈 (𝜇)) and 𝜔 ∈ n B exist with Φ𝜈 (𝜔) = 𝜆. We have (𝜇, Φ𝜈 (𝜇)) = {𝜇 ⊕ Ξ 𝜀i |∅ ⊊ A ⊊ Φ𝜈𝜇 } i∈A
= {𝜇 ⊕ Ξ 𝜀i |∅ ⊊ A ⊊ Φ𝜇 ∩ {j|j ∈ {1, … , n}, 𝜈j = 1}} i∈A
⊂ {𝜇 ⊕ Ξ 𝜀i |∅ ⊊ A ⊊ Φ𝜇 } = (𝜇, Φ(𝜇)), i∈A
12.4 Source, Isolated Fixed Point, Transient Point, Sink
thus 𝜆 ∈ [𝜔, Φ(𝜔)] ∩ (𝜇, Φ(𝜇)). The possibility 𝜆 = Φ(𝜔) is excluded, since it is in contradiction with (12.22), in other words 𝜆 ∈ [𝜔, Φ(𝜔)) ∩ (𝜇, Φ(𝜇)) and we can apply the property of generalized tcpo of Φ, wherefrom Φ(𝜔) = Φ(𝜆) = Φ(𝜇). As 𝜆 ∈ (𝜇, Φ𝜈 (𝜇)), we infer ∃i ∈ {1, … , n}, 𝜇i = 𝜆i ≠ Φ𝜈i (𝜇), 𝜈i = 1 and ∃j ∈ {1, … , n}, 𝜇j ≠ 𝜆j = Φ𝜈j (𝜇), 𝜈j = 1. The first of these remarks implies 𝜆i = Φ𝜈i (𝜔) = Φi (𝜔) = Φi (𝜇) = Φ𝜈i (𝜇), contradiction. Statement (12.25) is proved. We prove (12.27) and we suppose that, for arbitrary A ⊂ {1, … , n}, A′ ⊂ {1, … , n}, Φ𝜈 (𝜇 ⊕ Ξ 𝜀i ) = 𝜇 and Φ𝜈 (𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇 i∈A
i∈A
is true. For any j ∈ {1, … , n}, ⎧𝜇j , if 𝜈j = 0, j ∉ A, ⎪ Φ𝜈j (𝜇 ⊕ Ξ 𝜀i ) = ⎨𝜇j ⊕ 1, if 𝜈j = 0, j ∈ A, = 𝜇j i∈A ⎪Φj (𝜇 ⊕ Ξ 𝜀i ), if 𝜈j = 1 ⎩ i∈A
implies { {i|i ∈ {1, … , n}, 𝜈i = 0} ∩ A = ∅, ∀j ∈ {i|i ∈ {1, … , n}, 𝜈i = 1}, Φj (𝜇 ⊕ Ξ 𝜀i ) = 𝜇j i∈A
and similarly { {i|i ∈ {1, … , n}, 𝜈i = 0} ∩ A′ = ∅, ∀j ∈ {i|i ∈ {1, … , n}, 𝜈i = 1}, Φj (𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇j i∈A
is true too. We infer that { {i|i ∈ {1, … , n}, 𝜈i = 0} ∩ (A ∪ A′ ) = ∅, ∀j ∈ {i|i ∈ {1, … , n}, 𝜈i = 1}, Φj (𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇j i∈A∪A
is true, and we have used (12.24). This implies Φ𝜈 (𝜇 ⊕ Ξ ′ 𝜀i ) = 𝜇. i∈A∪A
The statement (12.27) is proved. If. This implication is obvious, by taking 𝜈 = (1, … , 1) ∈ Bn
◽
12.4 Source, Isolated Fixed Point, Transient Point, Sink Theorem 12.6 If Φ fulfills the strong generalized tcpo then, for any 𝜇 ∈ Bn , the following exclusive possibilities (i)–(iv) exist:
137
138
12 The Strong Generalized Technical Condition of Proper Operation
(i) Φ−1 (𝜇) = ∅, Φ(𝜇) ≠ 𝜇, 𝜇+ ≠ {𝜇} and either (i.1) 𝜇− = {𝜇}, or (i.2) ∃𝜆 ∈ Bn such that Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)) or Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)],
(12.28)
𝜇 ∈ (𝜆, Φ(𝜆)) and we have: {𝜇} ≠ 𝜇− = [𝜆, 𝜇] = {𝜆 ⊕ Ξ 𝜀i |A ⊂ (𝜆 ⊞ 𝜇)}, i∈A
𝜇 = [𝜇, Φ(𝜆)] = {𝜆 ⊕ Ξ 𝜀i |(𝜆 ⊞ 𝜇) ⊂ A ⊂ Φ𝜆 }; +
i∈A
(ii) Φ−1 (𝜇) = {𝜇}, 𝜇− = {𝜇}, Φ(𝜇) = 𝜇, 𝜇+ = {𝜇}; (iii) ∃𝜆 ∈ Bn , Φ−1 (𝜇) = [𝜆, 𝜇), where 𝜆 ≠ 𝜇, {𝜇} ≠ 𝜇 − = [𝜆, 𝜇], Φ(𝜇) ≠ 𝜇, + 𝜇 ≠ {𝜇}; (iv) ∃𝜆 ∈ Bn , Φ−1 (𝜇) = [𝜆, 𝜇], where 𝜆 ≠ 𝜇, {𝜇} ≠ 𝜇− = [𝜆, 𝜇], Φ(𝜇) = 𝜇, + 𝜇 = {𝜇}. Proof: (i) We suppose that (12.3)page 131 holds: Φ−1 (𝜇) = ∅. Then Φ(𝜇) ≠ 𝜇 and 𝜇+ = [𝜇, Φ(𝜇)] ≠ [𝜇, 𝜇] = {𝜇}. In addition: (i.1) 𝜇− = {𝜇} is a possibility, otherwise (i.2) 𝜇− ≠ {𝜇}. Then 𝜈 ∈ Bn , 𝜈 ≠ 𝜇 and 𝜔 ∈ Bn exist such that Φ𝜔 (𝜈) = 𝜇. We denote with 𝜆 ∈ Bn the point that makes true Φ−1 (Φ(𝜈)) = [𝜆, Φ(𝜈)) or Φ−1 (Φ(𝜈)) = [𝜆, Φ(𝜈)].1 As 𝜈, 𝜆 ∈ Φ−1 (Φ(𝜈)) we obviously have Φ(𝜆) = Φ(𝜈), wherefrom the truth of (12.28). But 𝜇 ∈ [𝜈, Φ(𝜈)]; since 𝜇 ≠ 𝜈 is a consequence of the initial supposition 𝜇− ≠ {𝜇} and because 𝜇 = Φ(𝜈) is impossible, as this would imply Φ−1 (𝜇) ≠ ∅, we get 𝜇 ∈ (𝜈, Φ(𝜈)) ⊂ (𝜆, Φ(𝜆)). The relations: (𝜆 ⊞ 𝜇) ∩ Φ𝜇 = (𝜆 ⊞ 𝜇) ∩ (𝜇 ⊞ Φ(𝜇)) = ∅,
(12.29)
(𝜆 ⊞ 𝜇) ∪ Φ𝜇 = (𝜆 ⊞ 𝜇) ∪ (𝜇 ⊞ Φ(𝜇)) = (𝜆 ⊞ 𝜇) ∪ (𝜇 ⊞ Φ(𝜆)) = 𝜆 ⊞ Φ(𝜆) = Φ𝜆
(12.30)
follow from Theorem 2.3, page 25, thus ∀A ⊂ Φ𝜇 , (𝜆 ⊞ 𝜇) ∩ A = ∅, ∀A ⊂ Φ𝜇 , (𝜆 ⊞ 𝜇)ΔA = (𝜆 ⊞ 𝜇) ∪ A hold. 1 So far Φ−1 (Φ(𝜈)) = {𝜈} remains a possibility, but this will prove to be false.
(12.31)
12.4 Source, Isolated Fixed Point, Transient Point, Sink
At this moment we can compute: [𝜇, Φ(𝜆)] = [𝜇, Φ(𝜇)] = {𝜇 ⊕ Ξ 𝜀i |A ⊂ Φ𝜇 } i∈A
= {𝜆 ⊕ Ξ 𝜀 ⊕ Ξ 𝜀i |A ⊂ Φ𝜇 } i
i∈𝜆⊞𝜇
= {𝜆 ⊕
i∈A
𝜀 |A ⊂ Φ𝜇 } i
Ξ
i∈(𝜆⊞𝜇)ΔA
(12.31)
= {𝜆 ⊕
𝜀i |A ⊂ Φ𝜇 }
Ξ
i∈(𝜆⊞𝜇)∪A
= {𝜆 ⊕ Ξ 𝜀i |(𝜆 ⊞ 𝜇) ⊂ A ⊂ (𝜆 ⊞ 𝜇) ∪ Φ𝜇 } i∈A
(12.30)
= {𝜆 ⊕ Ξ 𝜀i |(𝜆 ⊞ 𝜇) ⊂ A ⊂ Φ𝜆 }. i∈A
We prove [𝜆, 𝜇] ⊂ 𝜇− . We take an arbitrary 𝜈 ∈ [𝜆, 𝜇] ⊂ [𝜆, Φ(𝜆)), for which (𝜆 ⊞ 𝜈) ⊂ (𝜆 ⊞ 𝜇) and 𝜈 = 𝜆 ⊕ Ξ 𝜀i . We have Φ(𝜈) = Φ(𝜆) and let 𝜔 ∈ Bn . i∈𝜆⊞𝜈
We infer, as (𝜆 ⊞ 𝜈) ∩ Φ𝜈 = ∅,
(12.32)
(𝜆 ⊞ 𝜈) ∪ Φ𝜈 = Φ𝜆
(12.33)
from Theorem 2.3, similarly with (12.29), (12.30) that ∀A ⊂ Φ𝜈 , (𝜆 ⊞ 𝜈) ∩ A = ∅, ∀A ⊂ Φ𝜈 , (𝜆 ⊞ 𝜈)ΔA = (𝜆 ⊞ 𝜈) ∪ A.
(12.34)
In addition: Φ𝜔 (𝜈) = =
Ξ
((1 ⊕ 𝜔i )𝜈i ⊕ 𝜔i Φi (𝜈))𝜀i
Ξ
𝜈i 𝜀i ⊕
i∈{1,…,n}
i∈{1,…,n}
=𝜈⊕
Ξ
𝜔i (𝜈i ⊕ Φi (𝜈))𝜀i
i∈{1,…,n}
Ξ
𝜀i
= 𝜆 ⊕ Ξ 𝜀i ⊕
Ξ
i∈{j|j∈{1,…,n},𝜔j =1}∩Φ𝜈
i∈𝜆⊞𝜈
=𝜆⊕ (12.34)
i∈{j|j∈{1,…,n},𝜔j =1}∩Φ𝜈
Ξ
i∈(𝜆⊞𝜈)Δ({j|j∈{1,…,n},𝜔j =1}∩Φ𝜈 )
= 𝜆⊕
Ξ
𝜀i
𝜀i
i∈(𝜆⊞𝜈)∪({j|j∈{1,…,n},𝜔j =1}∩Φ𝜈 )
𝜀i .
139
140
12 The Strong Generalized Technical Condition of Proper Operation
{
1, if j ∈ 𝜆 ⊞ 𝜇, , j ∈ {1, … , n}. Then, as far as (𝜆 ⊞ 𝜈) ⊂ 0, else (𝜆 ⊞ 𝜇) ⊂ Φ𝜆 , we get
We define 𝜔j =
(𝜆 ⊞ 𝜈) ∪ ({j|j ∈ {1, … , n}, 𝜔j = 1} ∩ Φ𝜈 ) = (𝜆 ⊞ 𝜈) ∪ ((𝜆 ⊞ 𝜇) ∩ Φ𝜈 ) (12.33)
= ((𝜆 ⊞ 𝜈) ∪ (𝜆 ⊞ 𝜇)) ∩ ((𝜆 ⊞ 𝜈) ∪ Φ𝜈 ) = (𝜆 ⊞ 𝜇) ∩ Φ𝜆 =𝜆⊞𝜇 therefore Φ𝜔 (𝜈) = 𝜆 ⊕ Ξ 𝜀i = 𝜇. i∈𝜆⊞𝜇
It has resulted that 𝜈 ∈ 𝜇− . We prove 𝜇− ⊂ [𝜆, 𝜇]. We suppose against all reason that 𝜈 ∉ [𝜆, 𝜇] and 𝜔 ∈ Bn exist with Φ𝜔 (𝜈) = 𝜇. Then 𝜈 + = [𝜈, Φ(𝜈)], 𝜇 ≠ 𝜈, 𝜇 ≠ Φ(𝜈) (𝜇 = Φ(𝜈) gives the contradiction Φ−1 (𝜇) ≠ ∅) imply 𝜇 ∈ (𝜈, Φ(𝜈)). The fact that Φ fulfills the generalized tcpo gives Φ(𝜆) = Φ(𝜇) = Φ(𝜈), hence 𝜈 ∈ Φ−1 (Φ(𝜆)), therefore (𝜈, Φ(𝜈)) ⊂ (𝜆, Φ(𝜆)). We get in succession 𝜈 ∈ [𝜆, Φ(𝜆)) ∖ [𝜆, 𝜇], (𝜆 ⊞ 𝜈) ⊂ Φ𝜆 , and 𝜈 = 𝜆 ⊕ Ξ 𝜀i . On the other hand, we have not ((𝜆 ⊞ 𝜈) ⊂ (𝜆 ⊞ 𝜇)) and i∈𝜆⊞𝜈
we infer like previously: Φ𝜔 (𝜈) = 𝜆 ⊕
Ξ
i∈(𝜆⊞𝜈)∪({j|j∈{1,…,n},𝜔j =1}∩Φ𝜈 )
𝜀i .
The equation Φ𝜔 (𝜈) = 𝜇 holds only if the equation (𝜆 ⊞ 𝜈) ∪ ({j|j ∈ {1, … , n}, 𝜔j = 1} ∩ Φ𝜈 ) = 𝜆 ⊞ 𝜇 holds, i.e. only if (𝜆 ⊞ 𝜈) ⊂ (𝜆 ⊞ 𝜇). Since we know already that not ((𝜆 ⊞ 𝜈) ⊂ (𝜆 ⊞ 𝜇)), we have obtained a contradiction. (ii) We suppose that (12.4)page 131 holds, i.e. Φ−1 (𝜇) = {𝜇}. 𝜇 ∈ 𝜇− and we suppose against all reason the existence of 𝜈 ∈ Bn , 𝜈 ≠ 𝜇 and 𝜔 ∈ Bn such that Φ𝜔 (𝜈) = 𝜇. As 𝜇 ≠ Φ(𝜈) (𝜇 = Φ(𝜈) gives the contradiction 𝜈 ∈ Φ−1 (𝜇)), we get 𝜇 ∈ (𝜈, Φ(𝜈)) hence Φ−1 (𝜇) = ∅, contradiction again. We have proved that 𝜇− = {𝜇}. Obviously 𝜇+ = [𝜇, Φ(𝜇)] = [𝜇, 𝜇] = {𝜇}. (iii) We suppose now that (12.5)page 131 is true, i.e. 𝜆 ∈ Bn exists, 𝜆 ≠ 𝜇 with −1 Φ (𝜇) = [𝜆, 𝜇), therefore Φ(𝜇) ≠ 𝜇 and 𝜇+ = [𝜇, Φ(𝜇)] ≠ [𝜇, 𝜇] = {𝜇}. We must prove that 𝜇− = [𝜆, 𝜇]. [𝜆, 𝜇) ⊂ 𝜇− is obvious, together with 𝜇 ∈ 𝜇− . In order to prove 𝜇− ⊂ [𝜆, 𝜇], we suppose against all reason the existence of 𝜈 ∉ [𝜆, 𝜇] and 𝜔 ∈ Bn with Φ𝜔 (𝜈) = 𝜇, therefore 𝜇 ∈ [𝜈, Φ(𝜈)]. Since 𝜇 ≠ 𝜈 and 𝜇 ≠ Φ(𝜈) (𝜇 = Φ(𝜈) implies the contradiction 𝜈 ∈ Φ−1 (𝜇) = [𝜆, 𝜇)), we have 𝜇 ∈ (𝜈, Φ(𝜈)), i.e. Φ−1 (𝜇) = ∅, contradiction.
12.6 The Sets of Predecessors and Successors
(iv) We have the truth of (12.6)page 131 , i.e. 𝜆 ∈ Bn exists, 𝜆 ≠ 𝜇 such that Φ (𝜇) = [𝜆, 𝜇]. We infer Φ(𝜇) = 𝜇 and 𝜇+ = [𝜇, Φ(𝜇)] = [𝜇, 𝜇] = {𝜇}. The ◽ fact that 𝜇− = [𝜆, 𝜇] is proved like at (iii) −1
12.5 Asynchronous and Synchronous Transient Points Definition 12.2 A transient point 𝜇 ∈ Bn with the property that ∃𝜆 ∈ Bn , 𝜇 ∈ (𝜆, Φ(𝜆)) is called asynchronous, and a transient point 𝜇 with the property that ∃𝜆 ∈ Bn , Φ−1 (𝜇) = [𝜆, 𝜇) is called synchronous. Remark 12.5 The previous definition is a consequence of Theorem 12.6, where the asynchronous transient points have occurred at (i.2) and the synchronous transient points have occurred at (iii). Since (i)–(iv) cover all the possibilities, we conclude that in the case of the strong generalized tcpo, all the transient points are either synchronous or asynchronous. If Φ fulfills the strong tcpo, it fulfills the strong generalized tcpo also and its transient points are synchronous. If Φ fulfills the generalized tcpo, but not the strong generalized tcpo, see Figure 11.3, page 120, then Definition 12.2 has no sense, as far as (0, 0, 1) is synchronous if it ends a computation started in (1, 0, 1) and asynchronous if it is an intermediate value in a computation started in (0, 1, 1).
12.6 The Sets of Predecessors and Successors Remark 12.6
For any 𝜇 ∈ Bn , the properties
𝜇− ⊃ {𝜇} ∪ Φ−1 (𝜇), 𝜇+ ⊃ {𝜇} ∪ {Φ(𝜇)} are still true, see Remark 11.6, page 121. In fact, even the example that was given there refers to Figure 11.1, page 119 where the strong generalized tcpo is fulfilled. Theorem 12.7 If Φ fulfills the strong generalized tcpo then for any 𝜇 ∈ Bn ∶ (a) a unique 𝜆 ∈ Bn exists such that 𝜇− = [𝜆, 𝜇] and in addition if (𝜆, 𝜇) ≠ ∅ then for any 𝜈 ∈ (𝜆, 𝜇) we get 𝜈 − = [𝜆, 𝜈]; (b) we have O− (𝜇) = [𝜇, 𝜆] ∪ Φ−1 (𝜆) ∪ Φ−1 (Φ−1 (𝜆)) ∪ … +
(2)
O (𝜇) = [𝜇, Φ(𝜇)] ∪ [Φ(𝜇), Φ (𝜇)] ∪ …
(12.35) (12.36)
141
142
12 The Strong Generalized Technical Condition of Proper Operation
Proof: (a) This is a consequence of Theorem 12.6, page 137. (b) We prove equation (12.35) by referring to the possibilities (i)–(iv) from Theorem 12.6. Case (i.1) 𝜇 is a source, when Φ−1 (𝜇) = ∅, 𝜇− = {𝜇} O− (𝜇)
(1.29)page 16
=
{𝜇} ∪ {𝜇} ∪ {𝜇} ∪ … = {𝜇}
and on the other hand (12.35) written for 𝜆 = 𝜇 gives O− (𝜇) = {𝜇} ∪ Φ−1 (𝜇) ∪ Φ−1 (Φ−1 (𝜇)) ∪ … = {𝜇}. Statement (12.35) is proved. Case (ii) 𝜇 is an isolated fixed point, Φ−1 (𝜇) = {𝜇}, 𝜇− = {𝜇} O− (𝜇)
(1.29)page 16
=
{𝜇} ∪ {𝜇} ∪ {𝜇} ∪ … = {𝜇},
(12.35)
O− (𝜇) = {𝜇} ∪ {𝜇} ∪ {𝜇} ∪ … = {𝜇} and statement (12.35) is proved again. The following three cases are treated together: Case (i.2) 𝜇 is an asynchronous transient point, Φ−1 (𝜇) = ∅, ∃𝜆 ∈ Bn , (Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)) or Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)]), 𝜇 ∈ (𝜆, Φ(𝜆)), 𝜇− = [𝜆, 𝜇], Case (iii) 𝜇 is a synchronous transient point, ∃𝜆 ∈ Bn , Φ−1 (𝜇) = [𝜆, 𝜇), 𝜇− = [𝜆, 𝜇], Case (iv) 𝜇 is a sink, ∃𝜆 ∈ Bn , Φ−1 (𝜇) = [𝜆, 𝜇], 𝜇− = [𝜆, 𝜇]. In (i.2) we have ∀𝜈 ∈ [𝜆, 𝜇], Φ(𝜆) = Φ(𝜇) = Φ(𝜈), thus 𝜈 ∈ 𝜆+ ⊋ {𝜆}, in (iii) we have ∀𝜈 ∈ [𝜆, 𝜇), Φ(𝜆) = Φ(𝜈), thus 𝜈 ∈ 𝜆+ ⊋ {𝜆}, and (iv) implies ∀𝜈 ∈ [𝜆, 𝜇], Φ(𝜆) = Φ(𝜇) = Φ(𝜈) = 𝜇, thus 𝜈 ∈ 𝜆+ ⊋ {𝜆}. We have obtained that 𝜆 is not a sink and it is not an isolated fixed point either, since these would mean that 𝜆+ = {𝜆}. We prove now that it is not an asynchronous transient point, by supposing against all reason that Φ−1 (𝜆) = ∅ and 𝜆′ ∈ Bn exists such that (Φ−1 (Φ(𝜆′ )) = [𝜆′ , Φ(𝜆′ )) or Φ−1 (Φ(𝜆′ )) = [𝜆′ , Φ(𝜆′ )]) and 𝜆 ∈ (𝜆′ , Φ(𝜆′ )). We infer Φ(𝜆) = Φ(𝜆′ ), therefore [𝜆, Φ(𝜆)) = Φ−1 (Φ(𝜆)) = Φ−1 (Φ(𝜆′ )) = [𝜆′ , Φ(𝜆′ )) = [𝜆′ , Φ(𝜆)) if Φ(Φ(𝜆)) ≠ Φ(𝜆), and [𝜆, Φ(𝜆)] = Φ−1 (Φ(𝜆)) = Φ−1 (Φ(𝜆′ )) = [𝜆′ , Φ(𝜆′ )] = [𝜆′ , Φ(𝜆)]
12.6 The Sets of Predecessors and Successors
if Φ(Φ(𝜆)) = Φ(𝜆). In both situations, we get 𝜆 = 𝜆′ , contradiction showing that 𝜆 is not an asynchronous transient point. The conclusion is that the following possibilities occur. Case (j) A sequence 𝜆1 , 𝜆2 , 𝜆3 , … ∈ Bn of synchronous transient points exists, with Φ−1 (𝜆) = [𝜆1 , 𝜆), Φ−1 (𝜆1 ) = [𝜆2 , 𝜆1 ), Φ−1 (𝜆2 ) = [𝜆3 , 𝜆2 ), … Case (jj) Either 𝜆 is a source, Φ−1 (𝜆) = ∅, 𝜆− = {𝜆}, or a finite sequence 1 2 𝜆 , 𝜆 , … , 𝜆p ∈ Bn of synchronous transient points exists, with Φ−1 (𝜆) = [𝜆1 , 𝜆), … , Φ−1 (𝜆p ) = [𝜆p+1 , 𝜆p ) and 𝜆p+1 ∈ Bn is a source, Φ−1 (𝜆p+1 ) = ∅, 𝜆p+1− = {𝜆p+1 }. In Case (j): O− (𝜇)
(1.29)page 16
=
[𝜇, 𝜆] ∪ [𝜆, 𝜆1 ] ∪ [𝜆1 , 𝜆2 ] ∪ … ,
(12.35)
O− (𝜇) = [𝜇, 𝜆] ∪ [𝜆1 , 𝜆) ∪ [𝜆2 , 𝜆1 ) ∪ … and statement (12.35) is proved. In Case (jj) we infer if 𝜆 is a source that O− (𝜇)
(1.29)page 16
=
[𝜇, 𝜆] ∪ {𝜆} = [𝜇, 𝜆],
(12.35)
O− (𝜇) = [𝜇, 𝜆] ∪ Φ−1 (𝜆) = [𝜇, 𝜆] proving statement (12.35), and if 𝜆1 , 𝜆2 , … , 𝜆p ∈ Bn are synchronous transient points with 𝜆p+1 ∈ Bn source, we conclude that O− (𝜇)
(1.29)page 16
=
[𝜇, 𝜆] ∪ [𝜆, 𝜆1 ] ∪ … ∪ [𝜆p , 𝜆p+1 ] ∪ {𝜆p+1 },
(12.35)
O− (𝜇) = [𝜇, 𝜆] ∪ [𝜆1 , 𝜆) ∪ … ∪ [𝜆p+1 , 𝜆p ) proving statement (12.35) again. We have used in the last equations the fact that ⋃ ⋃ ⋃ 𝜔− = 𝜔− = 𝜔− 𝜔∈𝜇−
𝜔∈[𝜆,𝜇]
=
⋃
𝜔∈{𝜆}∪(𝜆,𝜇)∪{𝜇}
⋃
𝜔 ∪ −
𝜔∈{𝜆} (a)
= 𝜆− ∪
⋃
𝜔− ∪
𝜔∈(𝜆,𝜇)
⋃
𝜔−
𝜔∈{𝜇}
[𝜆, 𝜔] ∪ [𝜆, 𝜇] = 𝜆− ∪ [𝜆, 𝜇] = 𝜆− ∪ 𝜇−
𝜔∈(𝜆,𝜇)
= [𝜆, 𝜆 ] ∪ [𝜇, 𝜆], ⋃ ⋃ ⋃ 𝜔 = 𝜔− = 𝜔− ∪ 𝜔− 1
⋃ 𝜔∈
⋃
𝛿−
−
𝜔∈[𝜆,𝜆1 ]∪[𝜇,𝜆]
𝜔∈[𝜆,𝜆1 ]
𝛿∈𝜇−
= (𝜆− ∪ 𝜆1− ) ∪ (𝜇− ∪ 𝜆− )
𝜔∈[𝜇,𝜆]
143
144
12 The Strong Generalized Technical Condition of Proper Operation
= 𝜆1− ∪ 𝜆− ∪ 𝜇− = [𝜆1 , 𝜆2 ] ∪ [𝜆, 𝜆1 ] ∪ [𝜇, 𝜆], ⋃ ⋃ Φ−1 (Φ−1 (𝜆)) = Φ−1 ([𝜆1 , 𝜆)) = Φ−1 (𝜔) = Φ−1 (𝜔) 𝜔∈[𝜆1 ,𝜆)
= Φ−1 (𝜆1 ) ∪
⋃
𝜔∈{𝜆1 }∪(𝜆1 ,𝜆)
Φ−1 (𝜔) = [𝜆2 , 𝜆1 ) ∪ ∅ = [𝜆2 , 𝜆1 ),
𝜔∈(𝜆1 ,𝜆)
etc. Equation (12.36) coincides with (11.29) page 124
◽
12.7 Isomorphisms vs the Strong Generalized tcpo Theorem 12.8 Let the functions Φ, Ψ ∶ Bn −−→ Bn and the isomorphism (h, h′ ) ∈ Iso(Φ, Ψ). We suppose that h ∈ Af (Bn ) and that Φ fulfills the strong generalized tcpo. In these circumstances Ψ fulfills the strong generalized tcpo. Proof: We refer to the version (12.15) and ((12.3 or …or (12.6)) of Definition 12.1, page 133 of the strong generalized tcpo. We take an arbitrary 𝜈 ∈ Bn and the hypothesis states the commutativity of the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Bn
Ψh
′ (𝜈)
−−→ Bn
As Φ fulfills the strong generalized tcpo, we get from Theorem 12.5, page 136 that Φ𝜈 fulfills the strong generalized tcpo too. We show for the beginning that ∀𝜇′ ∈ Bn , ∀𝜆′ ∈ (𝜇′ , Ψh (𝜈) (𝜇′ )), (Ψh (𝜈) )−1 (𝜆′ ) = ∅ ′
′
(12.37)
and we suppose against all reason that this is not true. We infer the existence ′ ′ of 𝜇′ ∈ Bn , 𝜆′ ∈ (𝜇′ , Ψh (𝜈) (𝜇′ )) and 𝜔′ ∈ Bn such that Ψh (𝜈) (𝜔′ ) = 𝜆′ . We denote 𝜇 = h−1 (𝜇′ ), 𝜆 = h−1 (𝜆′ ) and 𝜔 = h−1 (𝜔′ ). We have: 𝜆′ = Ψh (𝜈) (𝜔′ ) = Ψh (𝜈) (h(𝜔)) = h(Φ𝜈 (𝜔)), ′
′
thus 𝜆 = h−1 (𝜆′ ) = Φ𝜈 (𝜔). On the other hand, the fact that h ∈ Af (Bn ) implies h−1 ∈ Af (Bn ), therefore (see Theorem 2.6, page 28) 𝜆 ∈ h−1 (𝜇′ , Ψh (𝜈) (𝜇′ )) = (h−1 (𝜇′ ), h−1 (Ψh (𝜈) (𝜇′ ))) ′
′
= (𝜇, h−1 (Ψh (𝜈) (h(𝜇)))) = (𝜇, h−1 (h(Φ𝜈 (𝜇)))) ′
= (𝜇, Φ𝜈 (𝜇)). A contradiction has resulted with the request (Φ𝜈 )−1 (𝜆) = ∅, hence (12.37) takes place.
12.7 Isomorphisms vs the Strong Generalized tcpo
We take now 𝜈 ∈ Bn , 𝜇′ ∈ Bn arbitrary, fixed. We denote 𝜇 = h−1 (𝜇′ ) and we obtain the next possibilities, which are inferred by rewriting (12.3)–(12.6) from page 131 for Φ𝜈 . Case (1) (Φ𝜈 )−1 (𝜇) = ∅
(12.38)
and we prove the fulfillment of ′
(Ψh (𝜈) )−1 (𝜇′ ) = ∅.
(12.39)
We suppose against all reason that (12.39) is false. This gives the existence of ′ 𝜇′′ ∈ Bn with Ψh (𝜈) (𝜇′′ ) = 𝜇′ . With the notation 𝜇̃ = h−1 (𝜇′′ ), we can write: 𝜇′ = Ψh (𝜈) (𝜇′′ ) = Ψh (𝜈) (h(𝜇)) ̃ = h(Φ𝜈 (𝜇)) ̃ = h(𝜇). ′
′
As h is bijection, we get Φ𝜈 (𝜇) ̃ = 𝜇, contradiction with (12.38). Statement (12.39) holds. Case (2) (Φ𝜈 )−1 (𝜇) = {𝜇}
(12.40)
and, for 𝜇′ = h(𝜇), we prove the truth of ′
(Ψh (𝜈) )−1 (𝜇′ ) = {𝜇′ }.
(12.41)
(Ψh (𝜈) )−1 (𝜇′ ) ⊂ {𝜇′ }. We suppose against all reason that the inclusion does not ′ hold, thus 𝜇′′ ≠ 𝜇′ exists with the property Ψh (𝜈) (𝜇′′ ) = 𝜇′ . We put 𝜇̃ = h−1 (𝜇′′ ) and we have: ′
𝜇′ = Ψh (𝜈) (𝜇′′ ) = Ψh (𝜈) (h(𝜇)) ̃ = h(Φ𝜈 (𝜇)) ̃ = h(𝜇), ′
′
therefore Φ𝜈 (𝜇) ̃ = 𝜇.
(12.42)
But 𝜇′′ ≠ 𝜇′ implies 𝜇̃ = h−1 (𝜇′′ ) ≠ h−1 (𝜇′ ) = 𝜇 and (12.42) is in contradiction with (12.40). ′ {𝜇′ } ⊂ (Ψh (𝜈) )−1 (𝜇′ ). We have Ψh (𝜈) (𝜇′ ) = Ψh (𝜈) (h(𝜇)) = h(Φ𝜈 (𝜇)) = h(𝜇) = 𝜇′ . ′
′
Statement (12.41) holds. Case (3) ∃𝜆 ∈ Bn such that (Φ𝜈 )−1 (𝜇) = [𝜆, 𝜇)
(12.43)
and we prove that (Ψh (𝜈) )−1 (𝜇′ ) = [𝜆′ , 𝜇′ ) ′
(12.44)
with the notations 𝜆 = h(𝜆), 𝜇 = h(𝜇). ′
′
145
146
12 The Strong Generalized Technical Condition of Proper Operation
(Ψh (𝜈) )−1 (𝜇′ ) ⊂ [𝜆′ , 𝜇′ ). Let us take 𝜔′ ∈ (Ψh (𝜈) )−1 (𝜇′ ) arbitrary, therefore we ′ get Ψh (𝜈) (𝜔′ ) = 𝜇′ . We use the notation 𝜔 = h−1 (𝜔′ ). We obtain: ′
′
𝜇′ = Ψh (𝜈) (𝜔′ ) = Ψh (𝜈) (h(𝜔)) = h(Φ𝜈 (𝜔)), ′
′
(12.43)
wherefrom Φ𝜈 (𝜔) = h−1 (𝜇′ ) = 𝜇 and 𝜔 ∈ [𝜆, 𝜇). We infer: 𝜔′ = h(𝜔) ∈ h([𝜆, 𝜇)) = [h(𝜆), h(𝜇)) = [𝜆′ , 𝜇′ ). [𝜆′ , 𝜇′ ) ⊂ (Ψh (𝜈) )−1 (𝜇′ ). We take 𝜔′ ∈ [𝜆′ , 𝜇′ ) arbitrary and we denote 𝜔 = h−1 (𝜔′ ) like before. We have: ′
𝜔 ∈ h−1 ([𝜆′ , 𝜇′ )) = [h−1 (𝜆′ ), h−1 (𝜇′ )) = [𝜆, 𝜇), Ψh (𝜈) (𝜔′ ) = Ψh (𝜈) (h(𝜔)) = h(Φ𝜈 (𝜔)) = h(𝜇) = 𝜇′ , ′
′
in other words 𝜔′ ∈ (Ψh (𝜈) )−1 (𝜇′ ). Statement (12.44) is proved. Case (4) ∃𝜆 ∈ Bn such that ′
(Φ𝜈 )−1 (𝜇) = [𝜆, 𝜇].
(12.45)
Proving that (Ψh (𝜈) )−1 (𝜇′ ) = [𝜆′ , 𝜇′ ], ′
(12.46)
where 𝜆′ = h(𝜆), is similar with the proof of Case (3). ′ The conclusion is that Ψh (𝜈) satisfies the strong generalized tcpo. As 𝜈 was arbitrary and h′ is bijection, we obtain from Theorem 12.5 that Ψ fulfills the strong generalized tcpo ◽
12.8 Antiisomorphisms vs the Strong Generalized tcpo Theorem 12.9 The functions Φ, Ψ ∶ Bn −−→ Bn and the antiisomorphism (h, h′ )∽ ∈ Iso∽ (Φ, Ψ) are given. If Φ fulfills the strong generalized tcpo, h ∈ Af (Bn ) and ∀𝜈 ∈ Bn , Φ𝜈 (Bn ) = Bn
(12.47)
is true, then Ψ satisfies the strong generalized tcpo and also the invariance ∀𝜈 ∈ Bn , Ψ𝜈 (Bn ) = Bn .
(12.48)
Proof: The hypothesis of Theorem 11.10, page 128 is fulfilled, wherefrom we get that (12.48) is true and Ψ fulfills the generalized tcpo too. But Ψ is bijective, and Theorem 12.4, page 135 shows that it satisfies also the strong generalized tcpo ◽
147
13 Time-Reversal Symmetry If we make a film and the film is watched backward, from the end to the beginning, we have an example of time-reversal. In music, the reverse tape effects are special effects created by recording sound onto magnetic tape and then physically reversing the tape so that when the tape is played back, the sounds recorded on it are heard in reverse. The survey [20] gives connections of time-reversal symmetry with physics. In classical mechanics, the classical ideal pendulum without loss of energy due to friction accepts time-reversal, but in the presence of friction this possibility disappears. In thermodynamics, Loschmidt refers to the time-reversal symmetry of the microscopic equations of motion of a macroscopic number of gas molecules, representing a contradiction with the Boltzmann’s second law of thermodynamics (the Loschmidt’s paradox). And in quantum mechanics, Wiegner introduced in 1930 a quantum mechanical version of the classical conventional time-reversal operator. He explains this way the twofold degeneracy of energy levels in systems with an odd number of electrons in the absence of an electric field. In dynamical systems [20], time-reversal symmetry was used for the first time in 1915 by Birkhoff, in the 1960s it was studied by mathematicians such as DeVogelaere, Heinbockel, Struble, Moser, Bibikov, Pliss, Hale, and later in the 1970s–1980s Devaney, Arnol’d, Sevryuk had their own contributions. We define the time-reversal symmetry of Φ and Ψ by the fact that for each 𝜇 ∈ Bn , the immediate predecessors of one function coincide with the immediate successors of the other one and vice versa. We show that the symmetrical function of a function Φ is unique. The action of the isomorphisms/antiisomorphisms of the time-reversed symmetrical functions on predecessors and successors is studied/suggested.
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
148
13 Time-Reversal Symmetry
13.1 Definition Theorem 13.1 Let Φ, Ψ ∶ Bn → Bn . The conjunction of the statements 𝜇Φ− = 𝜇Ψ+ ,
(13.1)
𝜇Ψ−
(13.2)
=
𝜇Φ+ ,
where 𝜇 ∈ Bn is equivalent with the conjunction of the statements ∀𝜈 ∈ Bn , ∃𝜆 ∈ Bn , (Φ𝜆 ∘ Ψ𝜈 )(𝜇) = 𝜇, 𝜈
𝜆
∀𝜆 ∈ B , ∃𝜈 ∈ B , (Ψ ∘ Φ )(𝜇) = 𝜇, n
n
(13.3) (13.4)
where 𝜇 ∈ Bn . Proof: In order to prove that ∀𝜇 ∈ Bn , ((13.1) and (13.2)) is equivalent with ∀𝜇 ∈ Bn , ((13.3) and (13.4)), we fix an arbitrary 𝜇. Here is the proof of this equivalence. (13.1)=⇒(13.3). Let 𝜈 ∈ Bn and Ψ𝜈 (𝜇) = 𝜇′ ∈ 𝜇Ψ+ . As 𝜇′ ∈ 𝜇Φ− , 𝜆 ∈ Bn exists with Φ𝜆 (𝜇′ ) = 𝜇, thus (13.3) holds. (13.2)=⇒(13.4). For 𝜆 ∈ Bn , we have Φ𝜆 (𝜇) = 𝜇′ ∈ 𝜇Φ+ . As 𝜇′ ∈ 𝜇Ψ− , some 𝜈 ∈ Bn exists with Ψ𝜈 (𝜇′ ) = 𝜇, showing the truth of (13.4). (13.4)=⇒ 𝜇Φ− ⊂ 𝜇Ψ+ . Let an arbitrary 𝜇′ ∈ 𝜇Φ− , then 𝜆 ∈ Bn exists such that Φ𝜆 (𝜇′ ) = 𝜇. From (13.4), we have the existence of 𝜈 ∈ Bn with (Ψ𝜈 ∘ Φ𝜆 )(𝜇′ ) = 𝜇′ = Ψ𝜈 (𝜇), thus 𝜇′ ∈ 𝜇Ψ+ . (13.3)=⇒ 𝜇Ψ+ ⊂ 𝜇Φ− . We take an arbitrary 𝜇′ ∈ 𝜇Ψ+ , for which 𝜈 ∈ Bn exists with 𝜇′ = Ψ𝜈 (𝜇). Relation (13.3) shows the existence of 𝜆 ∈ Bn for which (Φ𝜆 ∘ Ψ𝜈 )(𝜇) = 𝜇 = Φ𝜆 (𝜇′ ), meaning that 𝜇′ ∈ 𝜇Φ− . (13.3)=⇒ 𝜇Ψ− ⊂ 𝜇Φ+ . For an arbitrary 𝜇′ ∈ 𝜇Ψ− , some 𝜈 ∈ Bn exists with Ψ𝜈 (𝜇′ ) = 𝜇. Relation (13.3) shows the existence of 𝜆 ∈ Bn with (Φ𝜆 ∘ Ψ𝜈 )(𝜇′ ) = 𝜇′ = Φ𝜆 (𝜇), thus 𝜇′ ∈ 𝜇Φ+ . (13.4)=⇒ 𝜇Φ+ ⊂ 𝜇Ψ− . Let 𝜇′ ∈ 𝜇Φ+ arbitrary, thus 𝜆 ∈ Bn exists with 𝜇′ = Φ𝜆 (𝜇). From (13.4) we have the existence of 𝜈 ∈ Bn such that ◽ (Ψ𝜈 ∘ Φ𝜆 )(𝜇) = 𝜇 = Ψ𝜈 (𝜇′ ), giving 𝜇′ ∈ 𝜇Ψ− Definition 13.1 If one of the properties ∀𝜇 ∈ Bn , ((13.1) and (13.2)), ∀𝜇 ∈ Bn , ((13.3) and (13.4)), is fulfilled, we say that the time-reversal symmetry of the functions Φ and Ψ holds. Remark 13.1 Several types of symmetry and antisymmetry of the Boolean functions exist, for example, we have defined at page 39, Definitions 3.3 and 3.4 the symmetry relative to translations and at page 51, Definitions 4.4 and 4.5
13.1 Definition
the antisymmetry relative to translations. The reasons of calling the previous symmetry “time-reversal” become clear after introducing the flows and this is beyond the purpose of the present work. Remark 13.2 We notice the suggestion given by (13.1) and (13.2) that Φ, Ψ inverse causality while (13.3) and (13.4) seem to present Φ, Ψ as “inverse” to each other. Remark 13.3 The condition of time-reversal symmetry of Φ, Ψ does not mean the existence of two antimorphisms (1Bn , h′ ) ∶ Ψ → Φ, (1Bn , g ′ ) ∶ Φ → Ψ with 𝜆 = h′ (𝜈), 𝜈 = g ′ (𝜆) because the values of 𝜆 in (13.3) and 𝜈 in (13.4) depend on 𝜇. Theorem 13.2 The time-reversal symmetry of Φ and Ψ holds if and only if the time-reversal symmetry of Φ∗ and Ψ∗ holds. Proof: We use Theorem 1.11, page 17. Only if. We take some arbitrary 𝜇 ∈ Bn and we have: −
+
+
−
𝜇 Φ∗ = 𝜇Φ− = 𝜇Ψ+ = 𝜇Ψ∗ , 𝜇 Φ∗ = 𝜇Φ+ = 𝜇Ψ− = 𝜇Ψ∗ , ◽
etc Theorem 13.3 If Φ, Ψ are time-reverse symmetrical, then ∀𝜇 ∈ Bn , O−Φ (𝜇) = O+Ψ (𝜇),
(13.5)
O+Φ (𝜇)
(13.6)
=
O−Ψ (𝜇).
Proof: (13.5) results from (1.29)page 16 and (1.30 )page 16 : ⋃ ⋃ O−Φ (𝜇) = 𝜇Φ− ∪ 𝜆−Φ ∪ 𝛿− ∪ … ⋃ Φ 𝜆∈𝜇− 𝛿∈
Φ
= 𝜇Ψ+ ∪
⋃ 𝜆∈𝜇Ψ+
𝜆−Φ
𝜆∈𝜇− Φ
𝜆+Ψ ∪
⋃ 𝛿∈
⋃
𝜆+Ψ
𝜆∈𝜇+ Ψ
𝛿Ψ+ ∪ … = O+Ψ (𝜇) ◽
Remark 13.4 The condition ∀𝜇 ∈ Bn , ((13.5) and (13.6)) is necessary for the time-reversal symmetry of Φ, Ψ. Is it also sufficient?
149
150
13 Time-Reversal Symmetry
13.2 Examples Example 13.1 The identity 1Bn ∶ Bn → Bn is the time-reversed symmetrical function of itself; we get ∀𝜇 ∈ Bn , 𝜇1+ n = 𝜇1− n = {𝜇}. B
B
Example 13.2 Let 𝜔 ∈ Bn . We define the constant functions Φ, Ψ ∶ Bn → Bn in the following way: ∀𝜇 ∈ Bn , Φ(𝜇) = 𝜔 and ∀𝜇 ∈ Bn , Ψ(𝜇) = 𝜔 = (𝜔1 , … , 𝜔n ). We have: −
+
+
−
𝜔Φ = {𝜔} = 𝜔Ψ ,
𝜔Φ = Bn = 𝜔Ψ ,
𝜔−Φ = Bn = 𝜔+Ψ ,
𝜔+Φ = {𝜔} = 𝜔−Ψ ,
∀𝜇 ∈ (𝜔, 𝜔),
𝜇Φ− = [𝜔, 𝜇] = 𝜇Ψ+ ,
𝜇Φ+ = [𝜇, 𝜔] = 𝜇Ψ− .
We give the example of the functions Φ, Ψ ∶ B2 → B2 from Figure 13.1 (a), (b) which are constant: ∀𝜇 ∈ B2 , Φ(𝜇) = (1, 1), Ψ(𝜇) = (0, 0). Notice the existence of the same arrows at (a), (b), with different senses however, that show the meaning of time-reversal symmetry. Figure 13.1 The time-reversal symmetry of two constant functions.
(a)
(b)
Example 13.3 The functions Φ, Ψ ∶ B3 → B3 , ∀𝜇 ∈ B3 , Φ(𝜇) = (𝜇1 , 𝜇1 ∪ 𝜇1 𝜇2 , 𝜇1 ∪ 𝜇1 𝜇3 ) and ∀𝜇 ∈ B3 , Ψ(𝜇) = (𝜇1 , 𝜇1 𝜇2 , 𝜇1 𝜇3 ) are time-reversed symmetrical. We have: ∀𝜇 ∈ {(1, 0, 0), (1, 0, 1), (1, 1, 0), (1, 1, 1)}, 𝜇Φ− = 𝜇Ψ+ = {𝜇}, 𝜇Φ+ = 𝜇Ψ− = {𝜇}, (0, 0, 0)+Φ = (0, 0, 0)−Ψ = {(0, 0, 0), (0, 1, 0), (0, 0, 1), (0, 1, 1)} etc. The state portraits of Φ and Ψ have been drawn in Figures 13.2 and 13.3. Figure 13.2 The function Φ(𝜇1 , 𝜇2 , 𝜇3 ) = (𝜇1 , 𝜇1 ∪ 𝜇1 𝜇2 , 𝜇1 ∪ 𝜇1 𝜇3 ).
13.4 Isomorphisms and Antiisomorphisms vs Time-Reversal Symmetry
Figure 13.3 The function Ψ(𝜇1 , 𝜇2 , 𝜇3 ) = (𝜇1 , 𝜇1 𝜇2 , 𝜇1 𝜇3 ).
13.3 The Uniqueness of the Symmetrical Function Theorem 13.4 Let the functions Φ, Ψ, Γ ∶ Bn → Bn . The time-reversal symmetry of Φ and Ψ, together with the time-reversal symmetry of Φ and Γ imply Ψ = Γ. Proof: We suppose against all reason the contrary, that Ψ ≠ Γ, meaning the existence of 𝜇 ∈ Bn with Ψ(𝜇) ≠ Γ(𝜇). We infer the existence of the sets I, J ⊂ {1, … , n} with the property that Ψ(𝜇) = 𝜇 ⊕ Ξ 𝜀i , Γ(𝜇) = 𝜇 ⊕ Ξ 𝜀i i∈I
i∈J
and I ≠ J. Without loss of generality, we can suppose the existence of some i ∈ I∖J. We infer that 𝜇 ⊕ 𝜀i ∈ [𝜇, 𝜇 ⊕ Ξ 𝜀j ] = 𝜇Ψ+ , 𝜇 ⊕ 𝜀i ∉ [𝜇, 𝜇 ⊕ Ξ 𝜀j ] = j∈I
j∈J
𝜇Γ+ , and this represents a contradiction with the hypothesis stating ◽ that 𝜇Ψ+ = 𝜇Φ− = 𝜇Γ+
13.4 Isomorphisms and Antiisomorphisms vs Time-Reversal Symmetry Theorem 13.5 We consider the functions Γ, Φ, Ψ, Υ ∶ Bn → Bn . (a) If (h, h′ ) ∈ Iso(Γ, Φ), (g, g ′ ) ∈ Iso(Ψ, Υ) and Φ and Ψ are time-reversed symmetrical then ∀𝜇 ∈ Bn , g(h(𝜇Γ− )) = g(h(𝜇))+Υ , g(h(𝜇Γ+ )) g(h(O−Γ (𝜇))) g(h(O+Γ (𝜇)))
= = =
g(h(𝜇))−Υ , O+Υ (g(h(𝜇))), O−Υ (g(h(𝜇))).
(13.7) (13.8) (13.9) (13.10)
(b) We suppose that Γ and Φ are time-reversed symmetrical, (h, h′ ) ∈ Iso(Φ, Ψ), while Ψ and Υ are time-reversed symmetrical too. Then ∀𝜇 ∈ Bn , h(𝜇Γ− ) = h(𝜇)−Υ ,
(13.11)
h(𝜇Γ+ ) = h(𝜇)+Υ ,
(13.12)
h(O−Γ (𝜇)) h(O+Γ (𝜇))
= =
O−Υ (h(𝜇)), O−Υ (h(𝜇)).
(13.13) (13.14)
151
152
13 Time-Reversal Symmetry
Proof: For an arbitrary 𝜇 ∈ Bn we have, by making use of Theorem 3.6, page 42, the following proofs of (13.7) and (13.11): g(h(𝜇Γ− )) = g(h(𝜇)−Φ ) = g(h(𝜇)+Ψ ) = g(h(𝜇))+Υ , h(𝜇Γ− ) = h(𝜇Φ+ ) = h(𝜇)+Ψ = h(𝜇)−Υ . In proving (13.9), (13.13) we use Theorem 13.3, page 149 also and we get: g(h(O−Γ (𝜇))) = g(O−Φ (h(𝜇))) = g(O+Ψ (h(𝜇))) = O+Υ (g(h(𝜇))), h(O−Γ (𝜇)) = h(O+Φ (𝜇)) = O+Ψ (h(𝜇)) = O−Υ (h(𝜇))
◽
Remark 13.5 Other combinations of isomorphisms, antiisomorphisms and symmetry are also possible, when we use Theorem 4.4, page 52. For example, if in Theorem 13.5 (a), (h, h′ ) ∈ Iso(Γ, Φ) is replaced by (h, h′ )∽ ∈ Iso∽ (Γ, Φ), then in its proof h(𝜇Γ− ) = h(𝜇)−Φ is replaced by h(𝜇Γ− ) = h(𝜇)+Φ etc. Remark 13.6 If in Theorem 13.5 (a) g ∘ h = 1Bn , then the time-reversal symmetry of Γ and Υ follows.
13.5 Other Properties Remark 13.7 The time-reversal symmetry of Φ, Ψ ∶ Bn → Bn does not imply the satisfaction of ∀𝜆 ∈ Bn , ∃𝜈 ∈ Bn , (Φ𝜆 ∘ Ψ𝜈 )(𝜇) = 𝜇,
(13.15)
∀𝜈 ∈ Bn , ∃𝜆 ∈ Bn , (Ψ𝜈 ∘ Φ𝜆 )(𝜇) = 𝜇,
(13.16)
or
to be compared with (13.3) and (13.4). For this, we notice that in Figure 13.1 with Φ at (a) and Ψ at (b) we have (0, 1)+Ψ = {(0, 0), (0, 1)} and for 𝜆 = (1, 1) we get Φ𝜆 ((0, 1)+Ψ ) = Φ({(0, 0), (0, 1)}) = {(1, 1)} ≠ {(0, 1)}, in other words (13.15) is false. The theorem that follows shows that (13.15), (13.16) take place under a weaker form. Theorem 13.6 For Φ, Ψ ∶ Bn → Bn and 𝜇 ∈ Bn , 𝜇Φ− = 𝜇Ψ+ ,
(13.17)
implies ∀𝜆 ∈ Bn , (Φ𝜆 )−1 (𝜇) ≠ ∅ =⇒ ∃𝜈 ∈ Bn , (Φ𝜆 ∘ Ψ𝜈 )(𝜇) = 𝜇,
(13.18)
13.5 Other Properties
and 𝜇Ψ− = 𝜇Φ+ ,
(13.19)
implies ∀𝜈 ∈ Bn , (Ψ𝜈 )−1 (𝜇) ≠ ∅ =⇒ ∃𝜆 ∈ Bn , (Ψ𝜈 ∘ Φ𝜆 )(𝜇) = 𝜇.
(13.20)
Proof: (13.17)=⇒(13.18). For 𝜆 ∈ Bn arbitrary, we suppose that (Φ𝜆 )−1 (𝜇) ≠ ∅ and let 𝜇′ ∈ (Φ𝜆 )−1 (𝜇) be arbitrary too. As 𝜇′ ∈ 𝜇Φ− = 𝜇Ψ+ , some 𝜈 ∈ Bn exists with 𝜇′ = Ψ𝜈 (𝜇). We have (Φ𝜆 ∘ Ψ𝜈 )(𝜇) = Φ𝜆 (𝜇′ ) = 𝜇, thus (13.18) is true. (13.19)=⇒(13.20). Similar ◽ Example 13.4 We continue the example from Remark 13.7. Indeed, for 𝜆 = (1, 1) we have in Figure 13.1 that Φ−1 (0, 1) = ∅. We can take however 𝜆 = (0, 1) giving (Φ(0,1) )−1 (0, 1) = {(0, 0), (0, 1)} and then for 𝜈 = (1, 1) we have (Φ𝜆 ∘ Ψ𝜈 )(0, 1) = Φ(0,1) (Ψ(0, 1)) = Φ(0,1) (0, 0) = (0, 1).
153
155
14 Time-Reversal Symmetry vs tcpo We show first that if Φ fulfills tcpo and Φ, Ψ are time-reversed symmetrical, then Ψ fulfills tcpo. We define then, given a function Φ that fulfills the strong tcpo, the unique function Ψ that is the time-reversed symmetrical of Φ and we prove that it fulfills the strong tcpo also. An interesting result is that if Φ fulfills tcpo, then the necessary and the sufficient condition that a function Ψ, which is time-reversed symmetrical with Φ exists is that Φ fulfills the strong tcpo. Examples of functions Φ, Ψ that are time-reversed symmetrical and fulfill the strong tcpo are given.
14.1 Time-Reversal Symmetry vs tcpo Theorem 14.1 If Φ fulfills tcpo and the time-reversal symmetry of Φ, Ψ holds, then Ψ fulfills tcpo. Proof: We suppose against all reason that Ψ does not satisfy tcpo. Some 𝜇, p ≥ 2 and i1 , … , ip ∈ {1, … , n} distinct exist then such that Ψ(𝜇) = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip . Since 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ∈ 𝜇Ψ+ = 𝜇Φ− , some 𝜆 ∈ Bn exists such that Φ𝜆 (𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip ) = 𝜇 and, with the notation 𝜇′ = 𝜇 ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip , we get Φ𝜆 (𝜇′ ) = 𝜇′ ⊕ 𝜀i1 ⊕ … ⊕ 𝜀ip . We have obtained the existence of the set I such that {i1 , … , ip } ⊂ I ⊂ {1, … , n} and Φ(𝜇′ ) = 𝜇′ ⊕ Ξ 𝜀i , where i∈I card(I) ≥ 2. This last assertion represents a contradiction with the request that Φ fulfills tcpo ◽ Remark 14.1 Functions Φ exist that fulfill tcpo and the time-reversal symmetry of Φ and Ψ holds for no function Ψ, see Figure 14.1. Indeed, trying to construct Ψ by reversing the arrows, we face the situation that 2k − 1, k ∈ N arrows may start from (1, 1) ∶ 0, 1, 3, … arrows ≠ 2 arrows of Φ pointing to (1, 1). A consequence of this remark is that, in order to assure the existence of Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
156
14 Time-Reversal Symmetry vs tcpo
Figure 14.1 Function Φ that fulfills tcpo; the time-reversal symmetry of Φ and Ψ holds for no function Ψ.
time-reversal symmetry under tcpo, stronger requests than the fulfillment of tcpo are necessary.
14.2 Time-Reversal Symmetry vs the Strong tcpo Theorem 14.2 We suppose that Φ fulfills the strong tcpo and we define Ψ ∶ Bn → Bn by ∀𝜇 ∈ Bn , ⎧𝜇, if Φ−1 (𝜇) = ∅, ⎪𝜇, if Φ−1 (𝜇) = {𝜇}, Ψ(𝜇) = ⎨ 𝜇 ⊕ 𝜀i , if ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i }, ⎪ ⎩𝜇 ⊕ 𝜀i , if ∃i ∈ {1, … , n}, Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ 𝜀i }.
(14.1)
Then (a) the time-reversal symmetry of Φ and Ψ holds; (b) Ψ fulfills the strong tcpo. Proof: (a) We notice first of all that Ψ is defined on all of Bn from Theorem 10.1 (b), page 107 and Definition 10.1, page 108 and that it fulfills tcpo. We fix an arbitrary 𝜇 ∈ Bn and we have four possibilities. Case (i) Φ−1 (𝜇) = ∅, 𝜇 is a source for Φ (see Corollary 10.2 (i), page 111), when Ψ(𝜇) = 𝜇, 𝜇Φ− = {𝜇} = 𝜇Ψ+ , ∃i ∈ {1, … , n}, 𝜇Φ+ = {𝜇, 𝜇 ⊕ 𝜀i } and we prove 𝜇Ψ− = {𝜇, 𝜇 ⊕ 𝜀i }. {𝜇, 𝜇 ⊕ 𝜀i } ⊂ 𝜇Ψ− . In this case, Φ(𝜇) = 𝜇 ⊕ 𝜀i and, because 𝜇 ∈ Φ−1 (𝜇 ⊕ 𝜀i ), we have that Ψ(𝜇 ⊕ 𝜀i ) = 𝜇. It has resulted that 𝜇, 𝜇 ⊕ 𝜀i ∈ 𝜇Ψ− . 𝜇Ψ− ⊂ {𝜇, 𝜇 ⊕ 𝜀i }. We suppose against all reason that 𝜇′ ∈ 𝜇Ψ− exists, ′ 𝜇 ≠ 𝜇, 𝜇′ ≠ 𝜇 ⊕ 𝜀i , in other words, 𝜇′′ ∈ Bn and 𝜈 ∈ Bn exist such that Ψ(𝜇′ ) = 𝜇′′ and Ψ𝜈 (𝜇′ ) = 𝜇. The situation 𝜇′ = 𝜇′′ is impossible, as far as it implies the contradiction 𝜇′ = Ψ(𝜇′ ) = Ψ𝜈 (𝜇′ ) = 𝜇, thus 𝜇′ ≠ 𝜇′′ . From the definition of Ψ, see (14.1), we get the existence of j ∈ {1, … , n} with 𝜇′′ = 𝜇′ ⊕ 𝜀j , resulting further that either Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀j } or Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀j } holds. We have {Ψ𝜈 (𝜇′ )|𝜈 ∈ Bn } = {𝜇′ , 𝜇′ ⊕ 𝜀j } and 𝜇 ∈ {𝜇′ , 𝜇′ ⊕ 𝜀j }.
14.2 Time-Reversal Symmetry vs the Strong tcpo
But 𝜇 = 𝜇′ is impossible, from the way that we have chosen 𝜇′ and the only possibility becomes 𝜇 = 𝜇′ ⊕ 𝜀j . Case Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀j }, i.e. Φ−1 (𝜇 ⊕ 𝜀j ) = {𝜇} We infer Φ(𝜇) = 𝜇 ⊕ 𝜀j = 𝜇 ⊕ 𝜀i , j = i and 𝜇′ = 𝜇 ⊕ 𝜀i , contradiction. Case Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀j }, i.e. Φ−1 (𝜇 ⊕ 𝜀j ) = {𝜇 ⊕ 𝜀j , 𝜇} Once again the fact that Φ(𝜇) = 𝜇 ⊕ 𝜀j = 𝜇 ⊕ 𝜀i implies j = i and 𝜇′ = 𝜇 ⊕ 𝜀i , representing a contradiction. It has resulted that such a 𝜇′ does not exist. Case (ii) Φ−1 (𝜇) = {𝜇}, 𝜇 is an isolated fixed point of Φ (see Corollary 10.2 (ii), page 111), when Ψ(𝜇) = 𝜇, 𝜇Φ− = {𝜇} = 𝜇Ψ+ , 𝜇Φ+ = {𝜇} and we prove 𝜇Ψ− = {𝜇}. {𝜇} ⊂ 𝜇Ψ− . Obvious. 𝜇Ψ− ⊂ {𝜇}. We suppose against all reason that the inclusion does not take place and let 𝜇′ ≠ 𝜇 with the property that 𝜇′′ ∈ Bn and 𝜈 ∈ Bn exist with Ψ(𝜇′ ) = 𝜇′′ and Ψ𝜈 (𝜇′ ) = 𝜇. The situation 𝜇′ = 𝜇′′ gives the contradiction 𝜇′ = Ψ(𝜇′ ) = Ψ𝜈 (𝜇′ ) = 𝜇, therefore 𝜇′ ≠ 𝜇′′ . From the way that Ψ was defined in (14.1) some j ∈ {1, … , n} exists with 𝜇′′ = ′ 𝜇 ⊕ 𝜀j and we have that either Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀j } or Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀j } is true. We infer {Ψ𝜈 (𝜇′ )|𝜈 ∈ Bn } = {𝜇′ , 𝜇′ ⊕ 𝜀j } and 𝜇 ∈ {𝜇′ , 𝜇′ ⊕ 𝜀j }, where the only possibility is 𝜇 = 𝜇′ ⊕ 𝜀j . Case Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀j }, i.e. Φ−1 (𝜇 ⊕ 𝜀j ) = {𝜇} This implies the contradiction Φ(𝜇) = 𝜇 ⊕ 𝜀j . Case Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀j }, i.e. Φ−1 (𝜇 ⊕ 𝜀j ) = {𝜇 ⊕ 𝜀j , 𝜇} Once again Φ(𝜇) = 𝜇 ⊕ 𝜀j represents a contradiction. The conclusion is that such a 𝜇′ does not exist. Case (iii) some i ∈ {1, … , n} exists such that Φ−1 (𝜇) = {𝜇 ⊕ 𝜀i }, 𝜇 is a transient point of Φ (see Corollary 10.2 (iii), page 111), Ψ(𝜇) = 𝜇 ⊕ 𝜀i , 𝜇Φ− = {𝜇, 𝜇 ⊕ 𝜀i } = 𝜇Ψ+ , ∃j ∈ {1, … , n}, 𝜇Φ+ = {𝜇, 𝜇 ⊕ 𝜀j } and we show that 𝜇Ψ− = {𝜇, 𝜇 ⊕ 𝜀j }. {𝜇, 𝜇 ⊕ 𝜀j } ⊂ 𝜇Ψ− . Since Φ(𝜇) = 𝜇 ⊕ 𝜀j , we get Ψ(𝜇 ⊕ 𝜀j ) = 𝜇 thus 𝜇, 𝜇 ⊕ j 𝜀 ∈ 𝜇Ψ− . 𝜇Ψ− ⊂ {𝜇, 𝜇 ⊕ 𝜀j }. Let us suppose against all reason that 𝜇′ ∈ 𝜇Ψ− exists, having the property that 𝜇′ ≠ 𝜇 and 𝜇′ ≠ 𝜇 ⊕ 𝜀j . Then 𝜇′′ ∈ Bn and 𝜈 ∈ Bn exist with Ψ(𝜇′ ) = 𝜇′′ and Ψ𝜈 (𝜇′ ) = 𝜇. Like before, the situation 𝜇′ = 𝜇′′ is impossible, because it implies 𝜇′ = Ψ(𝜇′ ) = Ψ𝜈 (𝜇′ ) = 𝜇, therefore 𝜇′ ≠ 𝜇′′ . From the definition (14.1) of Ψ we get the existence of k ∈ {1, … , n} with 𝜇′′ = 𝜇′ ⊕ 𝜀k , resulting furthermore that one of Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀k },
157
158
14 Time-Reversal Symmetry vs tcpo
Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀k } is true. On the other hand, {Ψ𝜈 (𝜇′ )|𝜈 ∈ Bn } = {𝜇′ , 𝜇′ ⊕ 𝜀k } and 𝜇 ∈ {𝜇′ , 𝜇′ ⊕ 𝜀k }. But 𝜇 = 𝜇′ is impossible, thus 𝜇 = 𝜇′ ⊕ 𝜀k . Case Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀k }, i.e. Φ−1 (𝜇 ⊕ 𝜀k ) = {𝜇} In this case, Φ(𝜇) = 𝜇 ⊕ 𝜀k = 𝜇 ⊕ 𝜀j , k = j and 𝜇 = 𝜇′ ⊕ 𝜀j , contradiction. Case Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀k }, i.e. Φ−1 (𝜇 ⊕ 𝜀k ) = {𝜇 ⊕ 𝜀k , 𝜇} The fact that Φ(𝜇) = 𝜇 ⊕ 𝜀k = 𝜇 ⊕ 𝜀j implies k = j and 𝜇 = 𝜇′ ⊕ 𝜀j , contradiction. We have obtained that such a 𝜇′ does not exist. Case (iv) some i ∈ {1, … , n} exists such that Φ−1 (𝜇) = {𝜇, 𝜇 ⊕ 𝜀i }, 𝜇 is a sink for Φ (see Corollary 10.2 (iv), page 111), Ψ(𝜇) = 𝜇 ⊕ 𝜀i , 𝜇Φ− = {𝜇, 𝜇 ⊕ 𝜀i } = 𝜇Ψ+ , 𝜇Φ+ = {𝜇} and we prove that 𝜇Ψ− = {𝜇}. {𝜇} ⊂ 𝜇Ψ− . Obvious. 𝜇Ψ− ⊂ {𝜇}. We suppose against all reason that 𝜇′ ∈ 𝜇Ψ− exists, 𝜇′ ≠ 𝜇, in other words 𝜇′′ ∈ Bn and 𝜈 ∈ Bn exist such that Ψ(𝜇′ ) = 𝜇′′ and Ψ𝜈 (𝜇′ ) = 𝜇. The situation 𝜇′ = 𝜇′′ cannot take place, because it implies the contradiction 𝜇′ = Ψ(𝜇′ ) = Ψ𝜈 (𝜇′ ) = 𝜇. As 𝜇′ ≠ 𝜇′′ and taking into account (14.1), we obtain the existence of j ∈ {1, … , n} with 𝜇′′ = 𝜇′ ⊕ 𝜀j . This fact shows us furthermore that one of Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀j }, Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀j } is true. As {Ψ𝜈 (𝜇′ )|𝜈 ∈ Bn } = {𝜇′ , 𝜇′ ⊕ 𝜀j } thus we have 𝜇 ∈ {𝜇′ , 𝜇′ ⊕ 𝜀j }, and because the hypothesis has excluded the case 𝜇 = 𝜇′ , we infer that 𝜇 = 𝜇′ ⊕ 𝜀j is the only possibility. Case Φ−1 (𝜇′ ) = {𝜇′ ⊕ 𝜀j }, i.e. Φ−1 (𝜇 ⊕ 𝜀j ) = {𝜇} The contradiction 𝜇 ⊕ 𝜀j = Φ(𝜇) = 𝜇 results. Case Φ−1 (𝜇′ ) = {𝜇′ , 𝜇′ ⊕ 𝜀j }, i.e. Φ−1 (𝜇 ⊕ 𝜀j ) = {𝜇 ⊕ 𝜀j , 𝜇} We infer 𝜇 ⊕ 𝜀j = Φ(𝜇) = 𝜇, representing a contradiction. The conclusion is that such a 𝜇′ does not exist. In all the Cases (i)–(iv) we have proved that 𝜇Φ− = 𝜇Ψ+ , 𝜇Φ+ = 𝜇Ψ− hold, thus the time-reversal symmetry of Φ and Ψ results. (b) Ψ satisfies tcpo and let 𝜇 ∈ Bn , i, j ∈ {1, … , n} arbitrary with Ψ(𝜇 ⊕ 𝜀i ) = Ψ(𝜇 ⊕ 𝜀j ) = 𝜇 wherefrom, see (14.1), 𝜇 ∈ Φ−1 (𝜇 ⊕ 𝜀i ) ∩ Φ−1 (𝜇 ⊕ 𝜀j ). We infer ◽ Φ(𝜇) = 𝜇 ⊕ 𝜀i = 𝜇 ⊕ 𝜀j , thus i = j, i.e. Ψ fulfills the strong tcpo Remark 14.2 In the previous theorem, Φ, Ψ are time-reversed symmetrical and they satisfy the strong tcpo both. Here are some additional remarks: • At Case (i): Ψ(𝜇) = 𝜇, Ψ(𝜇 ⊕ 𝜀i ) = 𝜇, 𝜇Ψ− = {𝜇, 𝜇 ⊕ 𝜀i } imply Ψ−1 (𝜇) = {𝜇, 𝜇 ⊕ 𝜀i }; the sources of Φ are sinks of Ψ, • At Case (ii): Ψ(𝜇) = 𝜇, 𝜇Ψ− = {𝜇} imply Ψ−1 (𝜇) = {𝜇}; the isolated fixed points of Φ and Ψ coincide,
14.3 Examples
• At Case (iii): Ψ(𝜇) = 𝜇 ⊕ 𝜀i , 𝜇Ψ− = {𝜇, 𝜇 ⊕ 𝜀j } imply Ψ(𝜇 ⊕ 𝜀j ) = 𝜇 and Ψ (𝜇) = {𝜇 ⊕ 𝜀j }; the transient points of Φ and Ψ coincide, • At Case (iv): Ψ(𝜇) = 𝜇 ⊕ 𝜀i , 𝜇Ψ− = {𝜇} imply Ψ−1 (𝜇) = ∅; the sinks of Φ are sources of Ψ. −1
Theorem 14.3 The following properties are equivalent: (a) Φ fulfills tcpo and Ψ exists such that the time-reversal symmetry of Φ and Ψ is true; (b) Φ fulfills the strong tcpo. Proof: (a) =⇒ (b) We suppose against all reason that Φ does not fulfill the strong tcpo. This means the existence of 𝜇 ∈ Bn and i, j ∈ {1, … , n} distinct with 𝜇 ⊕ 𝜀i , 𝜇 ⊕ 𝜀j ∈ Φ−1 (𝜇), see Theorem 10.1 (a), page 107 and Definition 10.1, page 108. We denote with Ψ the unique function such that the time-reversal symmetry of Φ and Ψ holds (Theorem 13.4, page 151) and we have 𝜇 ⊕ 𝜀i , 𝜇 ⊕ 𝜀j , 𝜇 ⊕ 𝜀i ⊕ 𝜀j ∈ 𝜇Φ− = 𝜇Ψ+ (this is the structure of affine space of 𝜇Ψ+ , see Theorem 2.11, page 31). We have obtained that Ψ(𝜇) = 𝜇 ⊕ Ξ 𝜀k , k∈I
where I ⊂ {1, … , n} and i, j ∈ I. Ψ does not fulfill tcpo, contradiction with Theorem 14.1, page 155. (b) =⇒ (a) We get that Φ fulfills tcpo, and Theorem 14.2 shows how Ψ can be defined such that the time-reversal symmetry of Φ and Ψ holds ◽ Remark 14.3 Theorem 14.3 implies the following result. Let us suppose that Φ fulfills tcpo. The necessary and the sufficient condition that the time-reversed symmetrical function Ψ of Φ exists is that Φ fulfills the strong tcpo. This statement shows the necessity and the sufficiency of defining the strong tcpo in order to analyze the time-reversal symmetry under tcpo.
14.3 Examples Example 14.1 In Figure 9.1, page 100 we have the function Φ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇1 ∪ 𝜇2 ) that fulfills the strong tcpo: ∀𝜇 ∈ Bn , Φ−1 (0, 0) = ∅, see (10.2)page 107 , Φ−1 (0, 1) = {(0, 0)}, see (10.4)page 107 , Φ−1 (1, 1) = {(0, 1), (1, 1)}, see (10.5)page 107 , Φ−1 (1, 0) = {(1, 0)}, see (10.3)page 107 . The function Ψ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇1 𝜇2 ) fulfills: Ψ−1 (0, 0) = {(0, 0), (0, 1)}, see (10.5)page 107 ,
159
160
14 Time-Reversal Symmetry vs tcpo
Figure 14.2 The function Ψ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇1 𝜇2 ) which is the time-reversed symmetrical of the function Φ from Figure 9.1, page 100.
Ψ−1 (0, 1) = {(1, 1)}, see (10.4)page 107 , Ψ−1 (1, 0) = {(1, 0)}, see (10.3)page 107 , Ψ−1 (1, 1) = ∅, see (10.2)page 107 and its state portrait is drawn in Figure 14.2. The time-reversal symmetry of Φ and Ψ holds since, for example: (0, 0)+Φ = (0, 0)−Ψ = {(0, 0), (0, 1)}, (0, 1)+Φ = (0, 1)−Ψ = {(0, 1), (1, 1)}, (1, 1)+Φ = (1, 1)−Ψ = {(1, 1)}, (1, 0)+Φ = (1, 0)−Ψ = {(1, 0)}. Example 14.2 The functions Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 𝜇2 ), Ψ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 ∪ 𝜇2 ) from Figures 14.3 and 14.4 fulfill the strong tcpo, for example Φ−1 (0, 0) = {(0, 1)}, Φ−1 (0, 1) = {(0, 0)}, Φ−1 (1, 1) = ∅ and Φ−1 (1, 0) = {(1, 0), (1, 1)}. Φ and Ψ are time-reversed symmetrical. Figure 14.3 The function Φ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 𝜇2 ).
Figure 14.4 The function Ψ(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇1 ∪ 𝜇2 ).
Example 14.3 We consider the functions Φ, Ψ, Γ, Υ ∶ B2 → B2 defined in the following way: ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇2 ), Ψ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇1 ∪ 𝜇2 ),
14.3 Examples
Γ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇2 ), Υ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇1 𝜇2 ), whose state portraits were drawn in Figure 14.5 (a), (b) and, respectively, in Figure 14.6 (a), (b). We have the existence of h, h′ ∶ B2 → B2 defined by: ∀𝜇 ∈ B2 , h(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ), h′ (𝜇1 , 𝜇2 ) = (𝜇1 , 0) which satisfy (h, h′ ) ∈ Hom(Φ, Ψ) ∶ ∀𝜇 ∈ B2 , ∀𝜈 ∈ B2 , Φ(𝜈1 ,𝜈2 ) (𝜇1 , 𝜇2 ) = Ψ(𝜈1 ,0) (𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 (𝜇1 ∪ 𝜇2 ), 𝜇2 ) and (h, h′ ) ∈ Hom(Γ, Υ) ∶ ∀𝜇 ∈ B2 , ∀𝜈 ∈ B2 , Γ(𝜈1 ,𝜈2 ) (𝜇1 , 𝜇2 ) = Υ(𝜈1 ,0) (𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 𝜇1 𝜇2 , 𝜇2 ). On the other hand, Φ, Γ are time-reversed symmetrical and Ψ, Υ are time-reversed symmetrical also and all the four functions fulfill the strong tcpo. The following “diagram” is “commutative”: Φ (h, h′ ) ↓ Ψ
time−reversal symmetry
←−→
time−reversal symmetry
←−→
Γ ↓ (h, h′ ) Υ
Figure 14.5 Φ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇2 ) at (a) and Ψ(𝜇1 , 𝜇2 ) = (𝜇1 ∪ 𝜇2 , 𝜇1 ∪ 𝜇2 ) at (b)
(a)
(b)
Figure 14.6 Γ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇2 ) at (a) and Υ(𝜇1 , 𝜇2 ) = (𝜇1 𝜇2 , 𝜇1 𝜇2 ) at (b).
(a)
(b)
161
163
15 Time-Reversal Symmetry vs the Generalized tcpo If Φ satisfies the generalized technical condition of proper operation (tcpo), then its time-reversed symmetrical function Ψ might not exist, but if Φ satisfies the strong generalized tcpo, then Ψ exists and, in addition, it satisfies the strong generalized tcpo too.
15.1 Time-Reversal Symmetry vs the Generalized tcpo Remark 15.1 We get back again to the example given by the function Φ ∶ Bn −−→ Bn from Figure 11.3, page 120. This function satisfies the generalized tcpo, but it does not satisfy the strong generalized tcpo, as we have already noticed. Φ does not have a time-reversed symmetrical function Ψ, because by reversing the sense of the arrows in (0, 0, 0) we would have five arrows, and this is impossible, as far as the number of arrows from one point 𝜇 can be 2k − 1 only, k ∈ {0, 1, 2, …}. We infer from here that the generalized tcpo does not guarantee the existence of a time-reversed symmetrical function. Theorem 15.1 We suppose that Φ ∶ Bn −−→ Bn fulfills the strong generalized tcpo and we define Ψ ∶ Bn −−→ Bn by ∀𝜇 ∈ Bn , Ψ(𝜇) = 𝜆, where 𝜆 is the unique one with 𝜇Φ− = [𝜆, 𝜇], see Theorem 12.7, page 141. Then Ψ is the time-reversed symmetrical function of Φ and it fulfills the strong generalized tcpo. Proof: We fix an arbitrary 𝜇 ∈ Bn , thus 𝜆 ∈ Bn is uniquely fixed itself. We see that (15.1) 𝜇Ψ+ = [𝜇, Ψ(𝜇)] = [𝜇, 𝜆] = 𝜇Φ− and Theorem 12.6, page 137 shows the existence of several possibilities. (j) Case Φ−1 (𝜇) = ∅, Φ(𝜇) ≠ 𝜇, 𝜇Φ+ ≠ {𝜇}, (j.1) Case 𝜇Φ− = {𝜇} = [𝜇, 𝜇], Ψ(𝜇) = 𝜇.
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
164
15 Time-Reversal Symmetry vs the Generalized tcpo
We claim the truth of one of Φ−1 (Φ(𝜇)) = [𝜇, Φ(𝜇)),
(15.2)
Φ−1 (Φ(𝜇)) = [𝜇, Φ(𝜇)].
(15.3)
In this case, for any 𝜈 ∈ (𝜇, Φ(𝜇)), Φ (𝜈) = ∅ and Theorem 12.6 (i.2) shows that 𝜈Φ− = [𝜇, 𝜈], thus Ψ(𝜈) = 𝜇. If (15.2) holds, we can apply Theorem 12.6 (iii) and if (15.3) holds, we can apply Theorem 12.6 (iv); in both situations we get Φ(𝜇)−Φ = [𝜇, Φ(𝜇)], hence Ψ(Φ(𝜇)) = 𝜇. If Φ(Φ(𝜇)) ≠ Φ(𝜇), we prove (15.2). [𝜇, Φ(𝜇)) ⊂ Φ−1 (Φ(𝜇)) is a consequence of the generalized tcpo fulfilled by Φ. Φ−1 (Φ(𝜇)) ⊂ [𝜇, Φ(𝜇)). We suppose against all reason that this is not true, i.e. 𝜈 ∉ [𝜇, Φ(𝜇)) exists such that Φ(𝜈) = Φ(𝜇). We have obtained the existence of 𝛿 ∈ Bn with Φ−1 (Φ(𝜇)) = [𝛿, Φ(𝜇)) and 𝜇 ∈ (𝛿, Φ(𝛿)). From Theorem 12.6 (i.2), we infer, however, that 𝜇Φ− = [𝛿, 𝜇] ≠ {𝜇}, contradiction. (15.2) is proved. If Φ(Φ(𝜇)) = Φ(𝜇), relation (15.3) is proved similarly. We have shown that [𝜇, Φ(𝜇)] ⊂ Ψ−1 (𝜇). We state that −1
Ψ−1 (𝜇) = [𝜇, Φ(𝜇)]
(15.4)
thus the inclusion Ψ−1 (𝜇) ⊂ [𝜇, Φ(𝜇)] must be proved. We suppose against all reason the existence of 𝜈 ∉ [𝜇, Φ(𝜇)] such that Ψ(𝜈) = 𝜇, meaning from the definition of Ψ that 𝜈Φ− = [𝜇, 𝜈], i.e. 𝜈 ∈ [𝜇, Φ(𝜇)], contradiction. (15.4) is proved. We show that 𝜇Ψ− = [𝜇, Φ(𝜇)].
(15.5)
The inclusion [𝜇, Φ(𝜇)] ⊂ 𝜇Ψ− is clear from (15.4), we prove 𝜇Ψ− ⊂ [𝜇, Φ(𝜇)]. Let against all reason 𝜈 ∉ [𝜇, Φ(𝜇)] and 𝜔 ∈ Bn with Ψ𝜔 (𝜈) = 𝜇, i.e. 𝜇 ∈ [𝜈, Ψ(𝜈)]. From the definition of Ψ, we infer 𝜈Φ− = [Ψ(𝜈), 𝜈] and then 𝛿 ∈ Bn exists with Φ𝛿 (𝜇) = 𝜈, i.e. 𝜈 ∈ [𝜇, Φ(𝜇)], contradiction. (15.5) is proved, hence 𝜇Ψ− = [𝜇, Φ(𝜇)] = 𝜇Φ+ . The property ∀𝜈 ∈ (𝜇, Ψ(𝜇)), Ψ−1 (𝜈) = ∅
(15.6)
is trivially satisfied, as far as (𝜇, Ψ(𝜇)) = (𝜇, 𝜇) = ∅. (j.2) Case ∃𝜆 ∈ Bn such that Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)) or Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)], 𝜇 ∈ (𝜆, Φ(𝜆)), 𝜇Φ− = [𝜆, 𝜇]. In this case, Ψ(𝜇) = 𝜆 and ∀𝜈 ∈ (𝜆, Φ(𝜆)), we have similarly Ψ(𝜈) = 𝜆. If Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)) we use Theorem 12.6 (iii) and if Φ−1 (Φ(𝜆)) = [𝜆, Φ(𝜆)] we use Theorem 12.6 (iv) to infer that Φ(𝜆)−Φ = [𝜆, Φ(𝜆)], hence Ψ(Φ(𝜆)) = 𝜆.
15.1 Time-Reversal Symmetry vs the Generalized tcpo
We prove that Ψ−1 (𝜇) = ∅
(15.7)
and let us suppose, against all reason, that this is false, i.e. 𝜈 ∈ Bn exists with Ψ(𝜈) = 𝜇, i.e. 𝜈Φ− = [𝜇, 𝜈], thus 𝜈 ∈ [𝜇, Φ(𝜇)]. If 𝜈 = Φ(𝜇), then Ψ(𝜈) = 𝜆 ≠ 𝜇, contradiction. We infer that 𝜈 ∈ [𝜇, Φ(𝜇)). The generalized tcpo of Φ implies Φ(𝜈) = Φ(𝜇) = Φ(𝜆), thus 𝜈 ∈ (𝜆, Φ(𝜆)), wherefrom Ψ(𝜈) = 𝜆 ≠ 𝜇, contradiction again. (15.7) is proved. We show that 𝜇Ψ− = [𝜇, Φ(𝜇)]
(15.8)
and we prove first the inclusion [𝜇, Φ(𝜇)] ⊂ 𝜇Ψ− . Let 𝜈 ∈ [𝜇, Φ(𝜇)] = [𝜇, Φ(𝜆)] arbitrary and we notice that (𝜆 ⊞ 𝜇) ∩ (𝜇 ⊞ 𝜈) = ∅.
(15.9)
For this, let, against all reason, i ∈ (𝜆 ⊞ 𝜇) ∩ (𝜇 ⊞ 𝜈). As 𝜆 ⊞ 𝜇 ⊂ 𝜆 ⊞ Φ(𝜆) (𝜇 ∈ [𝜆, Φ(𝜆)]), we infer that 𝜆i ≠ 𝜇i and 𝜆i ≠ Φi (𝜆), i.e. 𝜇i = Φi (𝜆). But 𝜇 ⊞ 𝜈 ⊂ 𝜇 ⊞ Φ(𝜆) (𝜈 ∈ [𝜇, Φ(𝜆)]), wherefrom 𝜇i ≠ 𝜈i and 𝜇i ≠ Φi (𝜆), contradiction. (15.9) holds. We have Ψ(𝜈) = 𝜆, thus the equation Ψ𝜔 (𝜈) = 𝜇(= 𝜆 ⊕ Ξ 𝜀i ) with the unknown 𝜔 ∈ Bn has the solution ∀j ∈ {1, … , n}, 𝜔j = { i∈𝜇⊞𝜆 1, if j ∈ 𝜇 ⊞ 𝜈, allowing Ψj (𝜈) be computed for j ∈ 𝜇 ⊞ 𝜈 and be not 0, otherwise computed for j ∈ 𝜆 ⊞ 𝜇, possibility given by (15.9). Indeed, we have for any j ∈ {1, … , n}∶ { { Ψj (𝜈), if 𝜔j = 1 Ψj (𝜈), if j ∈ 𝜇 ⊞ 𝜈 𝜔 Ψj (𝜈) = = 𝜈j , otherwise 𝜈j , otherwise { 𝜈j ⊕ 1, if j ∈ 𝜇 ⊞ 𝜈 = = 𝜇j . 𝜈j , otherwise We prove now 𝜇Ψ− ⊂ [𝜇, Φ(𝜇)]. Let against all reason 𝜈 ∉ [𝜇, Φ(𝜇)] and 𝜔 ∈ B such that Ψ𝜔 (𝜈) = 𝜇, meaning that 𝜇 ∈ [𝜈, Ψ(𝜈)]. The definition of Ψ implies 𝜈Φ− = [Ψ(𝜈), 𝜈], therefore 𝛿 ∈ Bn exists with Φ𝛿 (𝜇) = 𝜈. We have obtained the contradiction 𝜈 ∈ [𝜇, Φ(𝜇)]. (15.8) is proved, thus n
𝜇Ψ− = [𝜇, Φ(𝜇)] = 𝜇Φ+ . We claim that the property (15.6) holds. Indeed, (𝜇, Ψ(𝜇)) = (𝜇, 𝜆) and for any 𝜈 ∈ (𝜇, 𝜆), we have 𝜈 ∈ (𝜆, Φ(𝜆)). We prove that Ψ−1 (𝜈) = ∅.
(15.10)
Let us suppose against all reason that 𝜔 ∈ B exists with Ψ(𝜔) = 𝜈, thus 𝜔−Φ = [𝜈, 𝜔], in other words 𝜔 ∈ [𝜈, Φ(𝜈)]. If 𝜔 = Φ(𝜈)(= Φ(𝜆)), then Ψ(𝜔) = Ψ(Φ(𝜆)) = 𝜆 ≠ 𝜈, contradiction. We infer from here that 𝜔 ∈ [𝜈, Φ(𝜈)). From n
165
166
15 Time-Reversal Symmetry vs the Generalized tcpo
the generalized tcpo, we obtain Φ(𝜔) = Φ(𝜈) = Φ(𝜆), i.e. 𝜔 ∈ [𝜈, Φ(𝜆)) ⊂ (𝜆, Φ(𝜆)), therefore Ψ(𝜔) = 𝜆 ≠ 𝜈, contradiction. Statement (15.10) holds, thus (15.6) is true. (jj) Case Φ−1 (𝜇) = {𝜇}, 𝜇Φ− = {𝜇}, Φ(𝜇) = 𝜇, 𝜇Φ+ = {𝜇}, Ψ(𝜇) = 𝜇. We show that Ψ−1 (𝜇) = {𝜇}
(15.11)
and let us suppose, against all reason that 𝜈 ∈ Bn exists, 𝜈 ≠ 𝜇, such that Ψ(𝜈) = 𝜇. This has its origin in 𝜈Φ− = [𝜇, 𝜈]. We have obtained the contradiction 𝜈 ∈ (𝜇, Φ(𝜇)] = (𝜇, 𝜇] = ∅, showing the truth of (15.11). We prove that 𝜇Ψ− = {𝜇}.
(15.12)
Since {𝜇} ⊂ 𝜇Ψ− is obvious, we prove 𝜇Ψ− ⊂ {𝜇}. Let against all reason 𝜈 ∈ Bn , 𝜈 ≠ 𝜇 and 𝜔 ∈ Bn with Ψ𝜔 (𝜈) = 𝜇. Since Ψ(𝜈) ≠ 𝜇 (otherwise, 𝜈 ∈ Ψ−1 (𝜇) = {𝜇}, contradiction), we get 𝜇 ∈ (𝜈, Ψ(𝜈)). But the definition of Ψ shows that 𝜈Φ− = [Ψ(𝜈), 𝜈], wherefrom we get the existence of 𝛿 ∈ Bn with Φ𝛿 (𝜇) = 𝜈. We have obtained the contradiction 𝜇 = Φ(𝜇) = Φ𝛿 (𝜇) = 𝜈, showing the truth of (15.12). We infer 𝜇Ψ− = {𝜇} = 𝜇Φ+ . Property (15.6) is trivially fulfilled since (𝜇, Ψ(𝜇)) = (𝜇, 𝜇) = ∅. (jjj) Case ∃𝜆 ∈ Bn , Φ−1 (𝜇) = [𝜆, 𝜇), where 𝜆 ≠ 𝜇, 𝜇Φ− = [𝜆, 𝜇], Φ(𝜇) ≠ 𝜇 and Ψ(𝜇) = 𝜆. We show that Φ−1 (Φ(𝜇)) = [𝜇, Φ(𝜇)) or Φ−1 (Φ(𝜇)) = [𝜇, Φ(𝜇)]
(15.13)
is true. We suppose against all reason the existence of 𝜈 ∈ B , 𝜈 ≠ 𝜇, with n
Φ−1 (Φ(𝜇)) = [𝜈, Φ(𝜇)) or Φ−1 (Φ(𝜇)) = [𝜈, Φ(𝜇)] and we infer 𝜈 ∉ [𝜇, Φ(𝜇)]. As 𝜇 ≠ Φ(𝜇) and 𝜇 ∈ Φ−1 (Φ(𝜇)), we have 𝜇 ∈ (𝜈, Φ(𝜇)) = (𝜈, Φ(𝜈)), wherefrom Φ−1 (𝜇) = ∅, because Φ fulfills the strong generalized tcpo. This is in contradiction with the hypothesis. (15.13) holds. Let now 𝜈 ∈ (𝜇, Φ(𝜇)) arbitrary. We have Φ−1 (𝜈) = ∅ (from the strong generalized tcpo), thus Theorem 12.6 (i.2) implies 𝜈Φ− = [𝜇, 𝜈], wherefrom Ψ(𝜈) = 𝜇. If in (15.13) Φ−1 (Φ(𝜇)) = [𝜇, Φ(𝜇)), we can use Theorem 12.6 (iii) and if in (15.13) Φ−1 (Φ(𝜇)) = [𝜇, Φ(𝜇)], we can use Theorem 12.6 (iv); we infer in both situations Φ(𝜇)−Φ = [𝜇, Φ(𝜇)], thus Ψ(Φ(𝜇)) = 𝜇. We have proved that (𝜇, Φ(𝜇)] ⊂ Ψ−1 (𝜇) and we prove now that Ψ−1 (𝜇) = [Φ(𝜇), 𝜇).
(15.14)
In order to prove the inclusion Ψ (𝜇) ⊂ [Φ(𝜇), 𝜇), we suppose against all reason its falsity; then 𝜈 ∉ [Φ(𝜇), 𝜇) exists such that Ψ(𝜈) = 𝜇. We have 𝜈Φ− = [𝜇, 𝜈], −1
15.1 Time-Reversal Symmetry vs the Generalized tcpo
i.e. 𝜈 ∈ [𝜇, Φ(𝜇)]. The only possibility is 𝜈 = 𝜇, but this implies the contradiction 𝜇Φ− = {𝜇}. Statement (15.14) is proved. We have also proved that [Φ(𝜇), 𝜇] ⊂ 𝜇Ψ− and we prove now the equality 𝜇Ψ− = [Φ(𝜇), 𝜇].
(15.15) 𝜇Ψ−
Let us suppose, against all reason, that ⊂ [Φ(𝜇), 𝜇] is false; then 𝜈 ∉ [Φ(𝜇), 𝜇] and 𝜔 ∈ Bn exist with Ψ𝜔 (𝜈) = 𝜇, in other words 𝜇 ∈ [𝜈, Ψ(𝜈)]. We have 𝜇 ≠ 𝜈 from the hypothesis and we have also 𝜇 ≠ Ψ(𝜈) (otherwise we get 𝜈 ∈ Ψ−1 (𝜇) = (𝜇, Φ(𝜇)], contradiction), therefore 𝜇 ∈ (𝜈, Ψ(𝜈)). The definition of Ψ in 𝜈 gives 𝜈Φ− = [Ψ(𝜈), 𝜈], and as 𝜇 ∈ (Ψ(𝜈), 𝜈), we infer the existence of 𝛿 ∈ Bn with Φ𝛿 (𝜇) = 𝜈, hence 𝜈 ∈ [𝜇, Φ(𝜇)], contradiction again. Statement (15.15) is true, thus 𝜇Ψ− = [Φ(𝜇), 𝜇] = 𝜇Φ+ . In order to prove the truth of (15.6), we prove first that ∀𝜈 ∈ (𝜆, 𝜇), Ψ(𝜈) = 𝜆 and we fix 𝜈 ∈ (Ψ(𝜇), 𝜇) = (𝜆, 𝜇) = (𝜆, Φ(𝜆)) arbitrary. The hypothesis of Theorem 12.6 (i.2) is fulfilled, because Φ−1 (𝜈) = ∅ (from the strong generalized tcpo), 𝜈 ≠ Φ(𝜈) = 𝜇 (from the generalized tcpo), and (15.13) takes place under the form Φ−1 (Φ(𝜆)) = Φ−1 (𝜇) = [𝜆, 𝜇). We infer that 𝜈Φ− = [𝜆, 𝜈], wherefrom Ψ(𝜈) = 𝜆. We keep 𝜈 ∈ (𝜇, Ψ(𝜇)) = (𝜇, 𝜆) arbitrary, fixed and we show that Ψ−1 (𝜈) = ∅ holds. Let us suppose against all reason the existence of 𝛿 ∈ Bn such that Ψ(𝛿) = 𝜈, wherefrom 𝛿Φ− = [𝜈, 𝛿] i.e. ∃𝜔 ∈ Bn with Φ𝜔 (𝜈) = 𝛿. But in this situation 𝛿 ∈ [𝜈, Φ(𝜈)] = [𝜈, 𝜇] ⊂ (𝜆, 𝜇]. The possibility 𝛿 = 𝜇 implies [𝜆, 𝜇] = 𝜇Φ− = [𝜈, 𝜇] contradiction, thus 𝛿 ≠ 𝜇. We have obtained 𝛿 ∈ (𝜆, 𝜇), hence Ψ(𝛿) = 𝜆. The last conclusion is in contradiction with the supposition that 𝜈 = Ψ(𝛿) ∈ (𝜇, 𝜆). Statement (15.6) is proved. (jv) Case ∃𝜆 ∈ Bn , Φ−1 (𝜇) = [𝜆, 𝜇], where 𝜆 ≠ 𝜇, 𝜇Φ− = [𝜆, 𝜇], Φ(𝜇) = 𝜇, Ψ(𝜇) = 𝜆. We prove Ψ−1 (𝜇) = ∅
(15.16)
and let us suppose that this is not true, i.e. 𝜈 ∈ B exists with Ψ(𝜈) = 𝜇, hence 𝜈Φ− = [𝜇, 𝜈], wherefrom 𝜈 ∈ [𝜇, Φ(𝜇)] = {𝜇}. But Ψ(𝜇) = 𝜆, contradiction showing the truth of (15.16). We prove n
𝜇Ψ− = {𝜇}. 𝜇Ψ−
(15.17)
As {𝜇} ⊂ is obvious, we prove ⊂ {𝜇}. If, against all reason, the last inclusion is false, then 𝜈 ∈ Bn , 𝜈 ≠ 𝜇 and 𝜔 ∈ Bn exist with Ψ𝜔 (𝜈) = 𝜇, i.e. 𝜇 ∈ (𝜈, Ψ(𝜈)]. We have from the definition of Ψ in 𝜈 ∶ 𝜈Φ− = [Ψ(𝜈), 𝜈], in other words ∃𝛿 ∈ Bn with Φ𝛿 (𝜇) = 𝜈. But 𝜇 = Φ(𝜇) = Φ𝛿 (𝜇) = 𝜈 represents a contradiction. (15.17) holds and its truth implies: 𝜇Ψ− = {𝜇} = 𝜇Φ+ .
𝜇Ψ−
167
168
15 Time-Reversal Symmetry vs the Generalized tcpo
In order to prove the satisfaction of (15.6), we notice that ∀𝜈 ∈ (𝜆, 𝜇), 𝜈Φ− = [𝜆, 𝜈], from Theorem 12.6 (i.2), thus Ψ(𝜈) = 𝜆. Let an arbitrary 𝜈 ∈ (𝜇, Ψ(𝜇)) = (𝜇, 𝜆). We suppose against all reason the existence of 𝛿 ∈ Bn with Ψ(𝛿) = 𝜈, thus 𝛿Φ− = [𝜈, 𝛿] and 𝛿 ∈ [𝜈, Φ(𝜈)] = [𝜈, 𝜇] ⊂ [𝜇, 𝜆). But Ψ(𝛿) = 𝜆, representing a contradiction. (15.6) holds. We finally refer to the definitions ((12.3)page 131 or … or (12.6)page 131 ) and (12.15)page 133 , (13.1)page 148 and (13.2)page 148 , with 𝜇 ∈ Bn arbitrary, fixed, of the strong generalized tcpo and of the time-reversal symmetry and we see that these properties are true in all the previous cases ◽ Remark 15.2 If Φ, Ψ are time-reversed symmetrical and if they satisfy the strong generalized tcpo, then: (a) the sources of Φ are sinks of Ψ, Case (j.1) of the previous proof; (b) the asynchronous transient points of Φ are asynchronous transient points of Ψ, Case (j.2) of the proof; (c) the isolated fixed points of Φ and Ψ coincide, Case (jj) of the proof; (d) the synchronous transient points of Φ and Ψ coincide, Case (jjj) of the proof; (e) the sinks of Φ are sources of Ψ, Case (jv) of the proof. Remark 15.3 The following statement: “We suppose that Φ fulfills the generalized tcpo. Then the time-reversed symmetrical function Ψ of Φ exists if and only if Φ fulfills the strong generalized tcpo”, which is analogue with Remark 14.3, page 159, could not be proved so far. In this framework, strengthening the generalized tcpo to the strong generalized tcpo gives a condition of sufficiency in order that the time-reversed symmetrical function exists.
15.2 Examples Example 15.1 The functions Φ, Ψ from Example 13.2 and Figure 13.1 (a), (b), page 150 are time-reversed symmetrical and satisfy the strong generalized tcpo. Example 15.2 The two functions Φ, Ψ from Example 13.3, Figures 13.2 and 13.3, page 150 are time-reversed symmetrical and satisfy the strong generalized tcpo. Example 15.3 We define the functions Φ, Ψ, Γ, Υ ∶ B2 → B2 , ∀𝜇 ∈ B2 , Φ(𝜇1 , 𝜇2 ) = (1, 𝜇2 ),
15.2 Examples
Ψ(𝜇1 , 𝜇2 ) = (1, 1), Γ(𝜇1 , 𝜇2 ) = (0, 𝜇2 ), Υ(𝜇1 , 𝜇2 ) = (0, 0), see Figure 15.1 for Φ, Ψ and Figure 15.2 for Γ, Υ. Given h, h′ ∶ B2 → B2 , ∀𝜇 ∈ B2 , h(𝜇1 , 𝜇2 ) = (𝜇1 , 𝜇2 ), h′ (𝜇1 , 𝜇2 ) = (𝜇1 , 0) we see that ∀𝜇 ∈ B2 , ∀𝜈 ∈ B2 , Φ(𝜈1 ,𝜈2 ) (𝜇1 , 𝜇2 ) = Ψ(𝜈1 ,0) (𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 ∪ 𝜈1 , 𝜇2 ), Γ(𝜈1 ,𝜈2 ) (𝜇1 , 𝜇2 ) = Υ(𝜈1 ,0) (𝜇1 , 𝜇2 ) = (𝜈1 𝜇1 , 𝜇2 ), i.e. (h, h′ ) ∈ Hom(Φ, Ψ) and (h, h′ ) ∈ Hom(Γ, Υ) hold. On the other hand, Φ, Γ are time-reversed symmetrical and Ψ, Υ are time-reversed symmetrical also. The following “diagram” Φ (h, h′ ) ↓ Ψ
time-re𝑣ersal symmetry
←−→
time-re𝑣ersal symmetry
←−→
Γ ↓ (h, h′ ) Υ
of functions that fulfill the strong generalized tcpo is “commutative”. Figure 15.1 Φ(𝜇1 , 𝜇2 ) = (1, 𝜇2 ) at (a) and Ψ(𝜇1 , 𝜇2 ) = (1, 1) at (b).
(a)
(b)
(a)
(b)
Figure 15.2 Γ(𝜇1 , 𝜇2 ) = (0, 𝜇2 ) at (a) and Υ(𝜇1 , 𝜇2 ) = (0, 0) at (b).
169
171
Appendix A The Category As We define the category1 As whose objects are functions Φ ∶ Bn −−→ Bn , and we show that it has finite products. Definition A.1 The category As of the asynchronous systems is defined in the following way: • the objects of As are functions Φ ∶ Bn −−→ Bn ; • let the functions Φ ∶ Bn −−→ Bn and Ψ ∶ Bm −−→ Bm . A morphism from Φ to Ψ is a couple of functions (h, h′ ), where h, h′ ∶ Bn −−→ Bm such that ∀𝜈 ∈ Bn , the diagram Φ𝜈
Bn −−→ Bn h↓ ↓h Ψh
′ (𝜈)
Bm −−→ Bm is commutative. We denote (h, h′ ) ∶ Φ −−→ Ψ. If Γ ∶ Bp −−→ Bp and (g, g ′ ) ∶ Ψ −−→ Γ is a morphism, then the composition of the morphisms is defined by (g, g ′ ) ⚬ (h, h′ ) = (g ⚬ h, g ′ ⚬ h′ ). For any Φ ∈ Ob(As), the identity morphism 1Φ ∶ Φ −−→ Φ is 1Φ = (1Bn , 1Bn ). Definition A.2 We consider the functions Φ ∶ Bn −−→ Bn , Ψ ∶ Bm −−→ Bm . Their Cartesian product is the function Φ × Ψ ∶ Bn+m −−→ Bn+m defined in the following way: ∀𝜇 ∈ Bn , ∀𝜇′ ∈ Bm , (Φ × Ψ)(𝜇, 𝜇′ ) = (Φ1 (𝜇), … , Φn (𝜇), Ψ1 (𝜇′ ), … , Ψm (𝜇′ )). ′ ′ We identify (𝜇1 , … , 𝜇n , 𝜇1′ , … , 𝜇m ) ∈ Bn+m and ((𝜇1 , … , 𝜇n ), (𝜇1′ , … , 𝜇m )) ∈ n m B ×B .
1 Categories were introduced in 1945 by Samuel Eilenberg and Saunders Mac Lane. Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
172
Appendix A The Category As
Definition A.3 Let now the functions Φ, Ψ considered as objects Φ, Ψ ∈ Ob(As). Their product is an object P ∈ Ob(As) together with two morphisms (h, h′ ) ∶ P −−→ Φ, (g, g ′ ) ∶ P −−→ Ψ such that for any object Γ ∈ Ob(As) and any morphisms (u, u′ ) ∶ Γ −−→ Φ, (𝑣, 𝑣′ ) ∶ Γ −−→ Ψ, there is a unique morphism (𝜑, 𝜑′ ) ∶ Γ −−→ P such that (h, h′ ) ⚬ (𝜑, 𝜑′ ) = (u, u′ ),
(A.1)
(g, g ) ⚬ (𝜑, 𝜑 ) = (𝑣, 𝑣 ).
(A.2)
′
′
′
The morphisms (h, h′ ), (g, g ′ ) are called the canonical projections of P on Φ, Ψ. Theorem A.1
For any objects Φ, Ψ ∈ Ob(As), their product P exists.
Proof: We define P = Φ × Ψ, h, h′ ∶ Bn+m −−→ Bn by ∀𝜇 ∈ Bn , ∀𝜇′ ∈ Bm , h(𝜇, 𝜇′ ) = h′ (𝜇, 𝜇′ ) = 𝜇 n+m
′
and also g, g ∶ B
(A.3)
−−→ B by ∀𝜇 ∈ B , ∀𝜇 ∈ B , m
n
′
m
g(𝜇, 𝜇′ ) = g ′ (𝜇, 𝜇′ ) = 𝜇′ .
(A.4)
We get that the diagrams Bn+m h↓ Bn
(Φ×Ψ)(𝜈,𝜈
−−→
Φh
′)
Bn+m ↓h
′ (𝜈,𝜈 ′ )
−−→
Bn (𝜈,𝜈 ′ )
Bn+m g↓ Bm
(Φ×Ψ)
−−→
Ψg
Bn+m ↓g
′ (𝜈,𝜈 ′ )
−−→
Bm
commute for all 𝜈 ∈ Bn , 𝜈 ′ ∈ Bm . In order to see this, we fix 𝜇, 𝜈 ∈ Bn , 𝜇′ , 𝜈 ′ ∈ Bm arbitrary and we have (Φh (𝜈,𝜈 ) ⚬ h)(𝜇, 𝜇′ ) = Φ𝜈 (h(𝜇, 𝜇′ )) = Φ𝜈 (𝜇) ′
′
= h(Φ𝜈 (𝜇), Ψ𝜈 (𝜇′ )) = (h ⚬ (Φ × Ψ)(𝜈,𝜈 ) )(𝜇, 𝜇′ ). ′
′
We have proved that (h, h′ ) ∶ Φ × Ψ −−→ Φ is a morphism and the fact that (g, g ′ ) ∶ Φ × Ψ −−→ Ψ is a morphism also is similarly proved. Let Γ ∈ Ob(As) arbitrary, Γ ∶ Bp −−→ Bp , together with the morphisms (u, u′ ) ∶ Γ −−→ Φ, (𝑣, 𝑣′ ) ∶ Γ −−→ Ψ which are arbitrary too. This means that for any 𝜈 ′′ ∈ Bp , the diagrams Γ𝜈
′′
Bp −−→ Bp u↓ ↓u ′ (𝜈 ′′ )
Bn
Φu
−−→ Bn
The Category As Γ
𝜈 ′′
Bp −−→ Bp 𝑣↓ ↓𝑣 ′ (𝜈 ′′ )
Ψ𝑣
Bm −−→ Bm are commutative. We define 𝜑, 𝜑′ ∶ Bp −−→ Bn+m by ∀𝜇′′ ∈ Bp , 𝜑(𝜇′′ ) = (u(𝜇′′ ), 𝑣(𝜇′′ )),
(A.5)
𝜑′ (𝜇′′ ) = (u′ (𝜇′′ ), 𝑣′ (𝜇′′ )).
(A.6)
We must show the commutativity of Γ𝜈
′′
−−→
Bp 𝜑↓ Bn+m
Bp ↓𝜑
(Φ×Ψ)𝜑
′ (𝜈 ′′ )
−−→
Bn+m
for all 𝜈 ′′ ∈ Bp , i.e. (𝜑, 𝜑′ ) ∶ Γ −−→ Φ × Ψ is a morphism, that (A.1) and (A.2) are true, and that (𝜑, 𝜑′ ) is unique with these properties. For this, we fix 𝜇′′ , 𝜈 ′′ ∈ Bp arbitrary. We have (Φ × Ψ)𝜑 (𝜈 ) (𝜑(𝜇′′ )) = (Φ × Ψ)(u (𝜈 ′
′′
′
′′
),𝑣′ (𝜈 ′′ ))
(u(𝜇′′ ), 𝑣(𝜇′′ ))
= (Φu (𝜈 ) (u(𝜇′′ )), Ψ𝑣 (𝜈 ) (𝑣(𝜇′′ ))) ′
′′
′
′′
= (u(Γ𝜈 (𝜇′′ )), 𝑣(Γ𝜈 (𝜇′′ ))) = 𝜑(Γ𝜈 (𝜇′′ )) ′′
′′
′′
and on the other hand ((h, h′ ) ⚬ (𝜑, 𝜑′ ))(𝜇′′ ) = ((h ⚬ 𝜑)(𝜇′′ ), (h′ ⚬ 𝜑′ )(𝜇′′ )) = (h(𝜑(𝜇′′ )), h′ (𝜑′ (𝜇′′ ))) = (h(u(𝜇′′ ), 𝑣(𝜇′′ )), h′ (u′ (𝜇′′ ), 𝑣′ (𝜇′′ ))) = (u(𝜇′′ ), u′ (𝜇′′ )) = (u, u′ )(𝜇′′ ) thus (A.1) is true and the proof of (A.2) is similar. We show the uniqueness of (𝜑, 𝜑′ ), and we suppose the existence of another morphism (𝜂, 𝜂 ′ ) ∶ Γ −−→ Φ × Ψ with the property that (h, h′ ) ⚬ (𝜂, 𝜂 ′ ) = (u, u′ ),
(A.7)
(g, g ′ ) ⚬ (𝜂, 𝜂 ′ ) = (𝑣, 𝑣′ )
(A.8)
are true. For an arbitrary 𝜇′′ ∈ Bp , we can write (A.7)
(u(𝜇′′ ), u′ (𝜇′′ )) = ((h, h′ ) ⚬ (𝜂, 𝜂 ′ ))(𝜇′′ ) = ((h ⚬ 𝜂)(𝜇′′ ), (h′ ⚬ 𝜂 ′ )(𝜇′′ )) (A.3)
= (𝜂1 (𝜇′′ ), … , 𝜂n (𝜇′′ ), 𝜂1′ (𝜇′′ ), … , 𝜂n′ (𝜇′′ )),
(A.9)
173
174
Appendix A The Category As (A.8)
(𝑣(𝜇′′ ), 𝑣′ (𝜇′′ )) = ((g, g ′ ) ⚬ (𝜂, 𝜂 ′ ))(𝜇′′ ) = ((g ⚬ 𝜂)(𝜇′′ ), (g ′ ⚬ 𝜂 ′ )(𝜇′′ ))
(A.10)
(A.4)
′ ′ = (𝜂n+1 (𝜇′′ ), … , 𝜂n+m (𝜇′′ ), 𝜂n+1 (𝜇′′ ), … , 𝜂n+m (𝜇′′ ))
therefore we have: 𝜂(𝜇′′ ) = (𝜂1 (𝜇′′ ), … , 𝜂n (𝜇′′ ), 𝜂n+1 (𝜇′′ ), … , 𝜂n+m (𝜇′′ )) (A.9),(A.10)
(A.5)
= (u(𝜇′′ ), 𝑣(𝜇′′ )) = 𝜑(𝜇′′ ), ′ ′ ′ ′ ′′ (𝜇′′ ), … , 𝜂n+m (𝜇′′ )) 𝜂 (𝜇 ) = (𝜂1 (𝜇′′ ), … , 𝜂n′ (𝜇′′ ), 𝜂n+1 (A.9),(A.10)
=
(A.6)
(u′ (𝜇′′ ), 𝑣′ (𝜇′′ )) = 𝜑′ (𝜇′′ )
◽
Remark A.1 A category is said to be with finite products if any finite family of objects has a product. The previous theorem showed that for finitely many Φ, … , Ψ ∈ Ob(As), the product Φ × … × Ψ ∈ Ob(As) exists, thus As has finite products. Considering infinitely many Φ, … , Ψ, … ∈ Ob(As) is impossible, since the Cartesian product Φ × … × Ψ × … is not an object of As.
175
Appendix B Notations B ={0, 1}, the Boolean algebra with two elements supp a = {i|i ∈ I, ai ≠ (0, … , 0)}, the support set of a { 1, if card(supp a) is odd, Ξ ai = , the modulo 2 summation of a 0, if card(supp a) is even i∈I 𝜀i = (0, … , 1, … , 0), vectors of the canonical basis of Bn i
𝜇 ⊞ 𝜆 = {i|i ∈ {1, … , n}, 𝜇i ≠ 𝜆i } Φ∗ (𝜇) = Φ(𝜇), the dual function of Φ ⎧𝜇, if k = 0, ⎪ Φ(k) (𝜇) = ⎨(Φ ⚬ … ⚬ Φ)(𝜇), if k ≥ 1 , the k− iterate of Φ ⏟⏞⏞⏞⏟⏞⏞⏞⏟ ⎪ k ⎩ { 𝜇i , if 𝜆i = 0, Φ𝜆i (𝜇) = , the 𝜆− iterate of Φ Φi (𝜇), if 𝜆i = 1. 𝜇i , we use to underline these coordinates of 𝜇 that fulfill Φi (𝜇) ≠ 𝜇i Φ𝜇 = {i|i ∈ {1, … , n}, 𝜇i ≠ Φi (𝜇)} 𝜇− = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , Φ𝜆 (𝜈) = 𝜇}, the immediate predecessors of 𝜇 𝜇+ = {Φ𝜆 (𝜇)|𝜆 ∈ Bn }, the immediate successors of 𝜇 O− (𝜇) = {𝜈|𝜈 ∈ Bn , ∃𝜆 ∈ Bn , … , ∃𝜆′ ∈ Bn , (Φ𝜆 ⚬ … ⚬ Φ𝜆 )(𝜈) = 𝜇}, the predecessors of 𝜇 ′
O+ (𝜇) = {(Φ𝜆 ⚬ … ⚬ Φ𝜆 )(𝜇)|𝜆 ∈ Bn , … , 𝜆′ ∈ Bn }, the successors of 𝜇 ′
𝜃 𝜏 (𝜇) = 𝜇 ⊕ 𝜏, the translation with 𝜏 Θn = {𝜃 𝜏 |𝜏 ∈ Bn }, the set of translations [𝜇, 𝜆] = {𝜇 ⊕ Ξ 𝜀i |A ⊂ 𝜇 ⊞ 𝜆}, the affine space defined by 𝜇, 𝜆 i∈A
[𝜇, 𝜆) = [𝜇, 𝜆]∖{𝜆} (𝜇, 𝜆] = [𝜇, 𝜆]∖{𝜇} Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
176
Appendix B Notations
(𝜇, 𝜆) = [𝜇, 𝜆]∖{𝜇, 𝜆} Af (Bn ) = {h|h([𝜇, 𝜆]) = [h(𝜇), h(𝜆)]}, the set of functions that are compatible with the affine structure of Bn d(𝜇, 𝜆) = card(𝜇 ⊞ 𝜆), the Hamming distance (h, h′ ) ∶ Φ → Ψ, the morphism (h, h′ ) is defined, from Φ to Ψ Hom(Φ, Ψ), Iso(Φ, Ψ), Aut(Φ), the sets of morphisms from Φ to Ψ, of isomorphisms from Φ to Ψ and of automorphisms of Φ (g, g ′ ) ⚬ (h, h′ ) = (g ⚬ h, g ′ ⚬ h′ ), the composition of the morphisms (h, h′ )∽ ∶ Φ → Ψ, the antimorphism (h, h′ )∽ is defined, from Φ to Ψ Hom∽ (Φ, Ψ), Iso∽ (Φ, Ψ), Aut ∽ (Φ), the sets of the antimorphisms from Φ to Ψ, of the antiisomorphisms from Φ to Ψ and of the antiautomorphisms of Φ (h, h′ )∽ ⚬ (f , f ′ ) = (h ⚬ f , h′ ⚬ f ′ )∽ , (i, i′ ) ⚬ (h, h′ )∽ = (i ⚬ h, i′ ⚬ h′ )∽ , the composition of morphisms with antimorphisms (g, g ′ )∽ ⚬ (h, h′ )∽ = (g ⚬ h, g ′ ⚬ h′ ), the composition of the antimorphisms tcpo, the technical condition of proper operation
177
Bibliography 1 Anosov, D.V. and Arnold, V.I. (eds.) (1988). Dynamical Systems I, Encyclo-
pedia of Mathematical Sciences, vol. 1. Springer-Verlag. 2 Arrowsmith, D.K. and Place, C.M. (1990). An Introduction to Dynamical
Systems. Cambridge University Press. 3 Brin, M. and Stuck, G. (2002). Introduction to Dynamical Systems. Cam-
bridge University Press. 4 Constantinescu, C.-D. (2003). Haos, factali si aplicatii. Pitesti: editura
Flower Power (in Romanian). 5 Cortadella, J., Kishinevsky, M., and Kondratyev, A. (1997). Technology map-
6
7
8 9 10 11 12 13
ping of speed-independent circuits based on combinational decomposition and resynthesis. Proceedings of the European Design and Test Conference ED&TC 97, Paris. Cortadella, J., Kishinevsky, M., Kondratyev, A. et al. (1997). A region-based theory for state assignment in speed-independent circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 16 (8): 793–812. Crama, Y. and Hammer, P.L. (2010). Boolean Functions: Theory, Algorithms, and Applications, Encyclopedia of Mathematics and its Applications. Cambridge: Cambridge University Press. Cusick, T.W. and Stanica, P. (2009). Cryptographic Boolean Functions and Applications. Academic Press, Elsevier Inc. Danca, M.-F. (2001). Functia logistica, dinamica, bifurcatie si haos. Pitesti: editura Universitatii din Pitesti (in Romanian). Devaney, R.L. (1992). A First Course in Chaotic Dynamical Systems. Theory and Experiment. Perseus Books Publishing. Easton, R.W. (1998). Geometric Methods in Discrete Dynamical Systems. Oxford University Press. Georgescu, A., Moroianu, M., and Oprea, I. (1999). Teoria Bifurca¸tiei, Principii ¸si Aplica¸tii. Pite¸sti: Editura Universit˘a¸tii din Pite¸sti (in Romanian). Hasselblatt, B. and Katok, A. (2005). Handbook of Dynamical Systems, vol. 1. Elsevier.
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
178
Bibliography
14 Hirsch, M.W. (2005). Monotone Dynamical Systems. https://escholarship
.org/uc/item/5wr8t3rq (accessed 06 August 2018). 15 Holmgren, R.A. (1994). A First Course in Discrete Dynamical Systems.
Springer-Verlag. 16 Ilachinski, A. (2001). Cellular Automata, A Discrete Universe. World Scien-
tific. 17 Jost, J. (2005). Dynamical Systems. Examples of Complex Behaviour.
Springer-Verlag. 18 Kalman, R.E., Falb, P.L., and Arbib, M.A. (1975). Teoria sistemelor dinamice.
Editura tehnica. 19 Kuznetsov, Yu.A. (1997). Elements of Applied Bifurcation Theory, 2e.
Springer. 20 Lamb, J.S.W. and Roberts, J.A.G. (1998). Time-reversal symmetry in dynam-
ical systems: a survey. Physica D 112: 1–39. 21 Lavagno, L. (1992). Synthesis and testing of bounded wire delay asyn-
22
23 24 25 26 27 28 29 30 31
32
chronous circuits from signal transition graphs. PhD thesis. University of California at Berkeley. Lee, J., Adachi, S., Peper, F., and Mashiko, S. (2005). Delay-insensitive computation in asynchronous cellular automata. Journal of Computer and System Sciences 70: 201–220. Milnor, J.W. (2006). Attractor. Scholarpedia 1 (11): 1815. https://doi.org/10 .4249/scholarpedia.1815. Moisil, G.C. (1969). The Algebraic Theory of Switching Circuits, 1e English edition. Oxford, New York: Pergamon Press. Mortveit, H. and Reidys, C. (2008). An Introduction to Sequential Dynamical Systems (Universitext). Springer. Purdea, I. (1982). Treatise of Modern Algebra, vol. II. Bucuresti: Editura Academiei Republicii Socialiste Romania (in Romanian). Seger, C.J. (1991). On the existence of speed-independent circuits. Theoretical Computer Science 86: 343–364. Sterpu, M. (2001). Dinamic˘a ¸si bifurca¸tie pentru dou˘a modele van der Pol generalizate. Pite¸sti: Editura Universit˘a¸tii din Pitesti. Trifan, M.P. (2006). Dinamic˘a ¸si bifurca¸tie în studiul matematic al cancerului. Pite¸sti: Editura P˘amântul. Vlad, S.E. (2007). Boolean dynamical systems. ROMAI Journal 3 (2): 277–324. Vlad, S.E. (2009). Universal regular autonomous asynchronous systems: fixed points, equivalencies and dynamical bifurcations. ROMAI Journal 5 (1): 131–154. Vlad, S.E. (2010). Universal regular autonomous asynchronous Systems: omega-limit Sets, invariance and Basins of Attraction, Mathematics and its Applications / Annals of AOSR, pp. 249–270.
Bibliography
33 Vlad, S.E. (2011). On the basins of attraction of the regular
34 35
36 37
38
autonomous asynchronous systems, Acta universitatis apulensis, Mathematics-informatics, special issue. Proceedings of ICTAMI 2011, Alba Iulia, pp. 263–286. Vlad, S.E. (2012). Asynchronous Systems Theory, 2e. LAP LAMBERT Academic Publishing. Vlad, S.E. (2015). Asynchronous flows: the technical condition of proper operation and its generalization. International Journal of Computer Research 22 (4): 435–445. Wiggins, S. (2003). Introduction to Applied Nonlinear Dynamical Systems and Chaos, 2e. Springer. Williams, T. (1990). Latency and Throughput Tradeoffs in Self-Timed Speed-Independent Pipelines and Rings. Technical Report: CSL-TR-90-431. Computer Systems Laboratory, Departments of Electrical Engineering and Computer Science, Stanford University. Wolfram, S. (2002). A New Kind of Science, 1e. Wolfram Media Inc.
179
181
Index a
e
affine space defined by 𝜇 and 𝜆 23 antiautomorphism of Φ 45 antiisomorphism from Φ to Ψ 45 antimorphism from Φ to Ψ 45 antisymmetrical functions relative to the translation with 𝜏 51 asynchronous transient point 141 attractor 89 automorphism of Φ 35
enabled coordinate 12 excited coordinate 12
g generalized technical condition of proper operation 118
h Hamming distance between 𝜇 and 𝜆 28
b Boolean function
4
c compatible function with the affine structure of Bn 25 composition of (g; g ′ ) and (h; h′ ) 38 composition of (h; h′ )∼ with (f ; f ′ ); of (i; i′ ) with (h; h′ )∼ 50 composition of (g; g ′ )∼ with (h; h′ )∼ 50 connected components of X 76 connected set 74 convergent sequence of sets 14
i immediate predecessor 15 immediate successor 15 invariant set 56 invariant subset of X 71 isolated fixed point 18 isolated set 67 isomorphism from Φ to Ψ 35 iterate of Φ 6, 7
l Lipschitz function
29
m d directed graph 11 disconnected set 77 dual of a function 5
maximal invariant subset of X 72 minimal invariant subset of X 74 minimal set 74 morphism from Φ to Ψ 35
Boolean Functions: Topics in Asynchronicity, First Edition. Serban E. Vlad. © 2019 John Wiley & Sons, Inc. Published 2019 by John Wiley & Sons, Inc.
182
Index
p path 81 path connected components of X 84 path connected set 82 predecessor of 𝜇 15 product of two objects in a category 172
strong generalized technical condition of proper operation 133 strong technical condition of proper operation 108 successor of μ 15 support set 2 symmetrical functions relative to the translation with 𝜏 39, 40 synchronous transient point 141
r race-free 98 relatively isolated sets
s separated set 77 sink 18 source 18 stable coordinate 12 state portrait of Φ 11
t 67
technical condition of proper operation 98 time-reversal symmetry of Φ and Ψ 148 transient point 18
u unstable coordinate 12