348 research outputs found
Inversive Meadows and Divisive Meadows
Inversive meadows are commutative rings with a multiplicative identity
element and a total multiplicative inverse operation whose value at 0 is 0.
Divisive meadows are inversive meadows with the multiplicative inverse
operation replaced by a division operation. We give finite equational
specifications of the class of all inversive meadows and the class of all
divisive meadows. It depends on the angle from which they are viewed whether
inversive meadows or divisive meadows must be considered more basic. We show
that inversive and divisive meadows of rational numbers can be obtained as
initial algebras of finite equational specifications. In the spirit of
Peacock's arithmetical algebra, we study variants of inversive and divisive
meadows without an additive identity element and/or an additive inverse
operation. We propose simple constructions of variants of inversive and
divisive meadows with a partial multiplicative inverse or division operation
from inversive and divisive meadows. Divisive meadows are more basic if these
variants are considered as well. We give a simple account of how mathematicians
deal with 1 / 0, in which meadows and a customary convention among
mathematicians play prominent parts, and we make plausible that a convincing
account, starting from the popular computer science viewpoint that 1 / 0 is
undefined, by means of some logic of partial functions is not attainable.Comment: 18 pages; error corrected; 29 pages, combined with arXiv:0909.2088
[math.RA] and arXiv:0909.5271 [math.RA
Conjunction and Disjunction in Infectious Logics
In this paper we discuss the extent to which conjunction and disjunction can be rightfully regarded as such, in the context of infectious logics. Infectious logics are peculiar many-valued logics whose underlying algebra has an absorbing or infectious element, which is assigned to a compound formula whenever it is assigned to one of its components. To discuss these matters, we review the philosophical motivations for infectious logics due to Bochvar, HalldĂ©n, Fitting, Ferguson and Beall, noticing that none of them discusses our main question. This is why we finally turn to the analysis of the truth-conditions for conjunction and disjunction in infectious logics, employing the framework of plurivalent logics, as discussed by Priest. In doing so, we arrive at the interesting conclusion that âin the context of infectious logicsâ conjunction is conjunction, whereas disjunction is not disjunction
Continuous symmetry of C60 fullerene and its derivatives
Conventionally, the Ih symmetry of fullerene C60 is accepted which is
supported by numerous calculations. However, this conclusion results from the
consideration of the molecule electron system, of its odd electrons in
particular, in a close-shell approximation without taking the electron spin
into account. Passing to the open-shell approximation has lead to both the
energy and the symmetry lowering up to Ci. Seemingly contradicting to a
high-symmetry pattern of experimental recording, particularly concerning the
molecule electronic spectra, the finding is considered in the current paper
from the continuous symmetry viewpoint. Exploiting both continuous symmetry
measure and continuous symmetry content, was shown that formal Ci symmetry of
the molecule is by 99.99% Ih. A similar continuous symmetry analysis of the
fullerene monoderivatives gives a reasonable explanation of a large variety of
their optical spectra patterns within the framework of the same C1 formal
symmetry exhibiting a strong stability of the C60 skeleton.Comment: 11 pages. 5 figures. 6 table
A map of dependencies among three-valued logics
International audienceThree-valued logics arise in several fields of computer science, both inspired by concrete problems (such as in the management of the null value in databases) and theoretical considerations. Several three-valued logics have been defined. They differ by their choice of basic connectives, hence also from a syntactic and proof-theoretic point of view. Different interpretations of the third truth value have also been suggested. They often carry an epistemic flavor. In this work, relationships between logical connectives on three-valued functions are explored. Existing theorems of functional completeness have laid bare some of these links, based on specific connectives. However we try to draw a map of such relationships between conjunctions, negations and implications that extend Boolean ones. It turns out that all reasonable connectives can be defined from a few of them and so all known three-valued logics appear as a fragment of only one logic. These results can be instrumental when choosing, for each application context, the appropriate fragment where the basic connectives make full sense, based on the appropriate meaning of the third truth-value
Quantum-information entropies for highly excited states of single-particle systems with power-type potentials
The asymptotics of the Boltzmann-Shannon information entropy as well as the Renyi entropy for the quantum probability density of a single-particle system with a confining (i.e., bounded below) power-type potential V(x)=x^2k with kâN and xâR, is investigated in the position and momentum spaces within the semiclassical (WKB) approximation. It is found that for highly excited states both physical entropies, as well as their sum, have a logarithmic dependence on its quantum number not only when k=1 (harmonic oscillator), but also for any fixed k. As a by-product, the extremal case kââ (the infinite well potential) is also rigorously analyzed. It is shown that not only the position-space entropy has the same constant value for all quantum states, which is a known result, but also that the momentum-space entropy is constant for highly excited states
Getting the strain under control: Trans-Varestraint tests for hot cracking susceptibility
A new method for conducting Trans-Varestraint tests for assessing hot cracking susceptibility is proposed. Experiments were carried out, to validate the new method, with an industrial scale rig using tungsten inert gas welding. The hot cracking susceptibility of API-5L X65 and EN3B steel was compared. The results indicated that, by using the new method, the strain applied to the welding bead and consequently to the solidification front was controlled in a repeatable and reliable way. The results also indicated that EN3B has a maximum crack length (a parameter in the test) higher than X65 and it is reached at lower augmented strain thus demonstrating it is more susceptible to hot cracking, while also indicating that there is a capability of predicting the initiation position of hot cracks during welding. By using the method proposed, the capability of setting standardized test procedures for Trans-Varestraint tests is improved. It is recommended that future tests for assessing hot cracking susceptibility should employ the proposed method in order for the results to be comparable and to also study the effect of strain rate in hot cracking of materials
Modeling the interaction of computer errors by four-valued contaminating logics
Logics based on weak Kleene algebra (WKA) and related structures have been recently proposed as a tool for reasoning about flaws in computer programs. The key element of this proposal is the presence, in WKA and related structures, of a non-classical truth-value that is âcontaminatingâ in the sense that whenever the value is assigned to a formula Ï, any complex formula in which Ï appears is assigned that value as well. Under such interpretations, the contaminating states represent occurrences of a flaw. However, since different programs and machines can interact with (or be nested into) one another, we need to account for different kind of errors, and this calls for an evaluation of systems with multiple contaminating values. In this paper, we make steps toward these evaluation systems by considering two logics, HYB1 and HYB2, whose semantic interpretations account for two contaminating values beside classical values 0 and 1. In particular, we provide two main formal contributions. First, we give a characterization of their relations of (multiple-conclusion) logical consequenceâthat is, necessary and sufficient conditions for a set Î of formulas to logically follow from a set Î of formulas in HYB1 or HYB2 . Second, we provide sound and complete sequent calculi for the two logics
- âŠ