348 research outputs found

    Inversive Meadows and Divisive Meadows

    Get PDF
    Inversive meadows are commutative rings with a multiplicative identity element and a total multiplicative inverse operation whose value at 0 is 0. Divisive meadows are inversive meadows with the multiplicative inverse operation replaced by a division operation. We give finite equational specifications of the class of all inversive meadows and the class of all divisive meadows. It depends on the angle from which they are viewed whether inversive meadows or divisive meadows must be considered more basic. We show that inversive and divisive meadows of rational numbers can be obtained as initial algebras of finite equational specifications. In the spirit of Peacock's arithmetical algebra, we study variants of inversive and divisive meadows without an additive identity element and/or an additive inverse operation. We propose simple constructions of variants of inversive and divisive meadows with a partial multiplicative inverse or division operation from inversive and divisive meadows. Divisive meadows are more basic if these variants are considered as well. We give a simple account of how mathematicians deal with 1 / 0, in which meadows and a customary convention among mathematicians play prominent parts, and we make plausible that a convincing account, starting from the popular computer science viewpoint that 1 / 0 is undefined, by means of some logic of partial functions is not attainable.Comment: 18 pages; error corrected; 29 pages, combined with arXiv:0909.2088 [math.RA] and arXiv:0909.5271 [math.RA

    Conjunction and Disjunction in Infectious Logics

    Get PDF
    In this paper we discuss the extent to which conjunction and disjunction can be rightfully regarded as such, in the context of infectious logics. Infectious logics are peculiar many-valued logics whose underlying algebra has an absorbing or infectious element, which is assigned to a compound formula whenever it is assigned to one of its components. To discuss these matters, we review the philosophical motivations for infectious logics due to Bochvar, HalldĂ©n, Fitting, Ferguson and Beall, noticing that none of them discusses our main question. This is why we finally turn to the analysis of the truth-conditions for conjunction and disjunction in infectious logics, employing the framework of plurivalent logics, as discussed by Priest. In doing so, we arrive at the interesting conclusion that —in the context of infectious logics— conjunction is conjunction, whereas disjunction is not disjunction

    Continuous symmetry of C60 fullerene and its derivatives

    Full text link
    Conventionally, the Ih symmetry of fullerene C60 is accepted which is supported by numerous calculations. However, this conclusion results from the consideration of the molecule electron system, of its odd electrons in particular, in a close-shell approximation without taking the electron spin into account. Passing to the open-shell approximation has lead to both the energy and the symmetry lowering up to Ci. Seemingly contradicting to a high-symmetry pattern of experimental recording, particularly concerning the molecule electronic spectra, the finding is considered in the current paper from the continuous symmetry viewpoint. Exploiting both continuous symmetry measure and continuous symmetry content, was shown that formal Ci symmetry of the molecule is by 99.99% Ih. A similar continuous symmetry analysis of the fullerene monoderivatives gives a reasonable explanation of a large variety of their optical spectra patterns within the framework of the same C1 formal symmetry exhibiting a strong stability of the C60 skeleton.Comment: 11 pages. 5 figures. 6 table

    A map of dependencies among three-valued logics

    Get PDF
    International audienceThree-valued logics arise in several fields of computer science, both inspired by concrete problems (such as in the management of the null value in databases) and theoretical considerations. Several three-valued logics have been defined. They differ by their choice of basic connectives, hence also from a syntactic and proof-theoretic point of view. Different interpretations of the third truth value have also been suggested. They often carry an epistemic flavor. In this work, relationships between logical connectives on three-valued functions are explored. Existing theorems of functional completeness have laid bare some of these links, based on specific connectives. However we try to draw a map of such relationships between conjunctions, negations and implications that extend Boolean ones. It turns out that all reasonable connectives can be defined from a few of them and so all known three-valued logics appear as a fragment of only one logic. These results can be instrumental when choosing, for each application context, the appropriate fragment where the basic connectives make full sense, based on the appropriate meaning of the third truth-value

    Quantum-information entropies for highly excited states of single-particle systems with power-type potentials

    Get PDF
    The asymptotics of the Boltzmann-Shannon information entropy as well as the Renyi entropy for the quantum probability density of a single-particle system with a confining (i.e., bounded below) power-type potential V(x)=x^2k with k∈N and x∈R, is investigated in the position and momentum spaces within the semiclassical (WKB) approximation. It is found that for highly excited states both physical entropies, as well as their sum, have a logarithmic dependence on its quantum number not only when k=1 (harmonic oscillator), but also for any fixed k. As a by-product, the extremal case k→∞ (the infinite well potential) is also rigorously analyzed. It is shown that not only the position-space entropy has the same constant value for all quantum states, which is a known result, but also that the momentum-space entropy is constant for highly excited states

    Getting the strain under control: Trans-Varestraint tests for hot cracking susceptibility

    Get PDF
    A new method for conducting Trans-Varestraint tests for assessing hot cracking susceptibility is proposed. Experiments were carried out, to validate the new method, with an industrial scale rig using tungsten inert gas welding. The hot cracking susceptibility of API-5L X65 and EN3B steel was compared. The results indicated that, by using the new method, the strain applied to the welding bead and consequently to the solidification front was controlled in a repeatable and reliable way. The results also indicated that EN3B has a maximum crack length (a parameter in the test) higher than X65 and it is reached at lower augmented strain thus demonstrating it is more susceptible to hot cracking, while also indicating that there is a capability of predicting the initiation position of hot cracks during welding. By using the method proposed, the capability of setting standardized test procedures for Trans-Varestraint tests is improved. It is recommended that future tests for assessing hot cracking susceptibility should employ the proposed method in order for the results to be comparable and to also study the effect of strain rate in hot cracking of materials

    Modeling the interaction of computer errors by four-valued contaminating logics

    Get PDF
    Logics based on weak Kleene algebra (WKA) and related structures have been recently proposed as a tool for reasoning about flaws in computer programs. The key element of this proposal is the presence, in WKA and related structures, of a non-classical truth-value that is “contaminating” in the sense that whenever the value is assigned to a formula ϕ, any complex formula in which ϕ appears is assigned that value as well. Under such interpretations, the contaminating states represent occurrences of a flaw. However, since different programs and machines can interact with (or be nested into) one another, we need to account for different kind of errors, and this calls for an evaluation of systems with multiple contaminating values. In this paper, we make steps toward these evaluation systems by considering two logics, HYB1 and HYB2, whose semantic interpretations account for two contaminating values beside classical values 0 and 1. In particular, we provide two main formal contributions. First, we give a characterization of their relations of (multiple-conclusion) logical consequence—that is, necessary and sufficient conditions for a set Δ of formulas to logically follow from a set Γ of formulas in HYB1 or HYB2 . Second, we provide sound and complete sequent calculi for the two logics
    • 

    corecore