<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Encoding Sets as Real Numbers</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Domenico Cantone</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alberto Policriti</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dept. of Mathematics and Computer Science, University of Catania</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dept. of Mathematics</institution>
          ,
          <addr-line>Computer Science, and Physics</addr-line>
          ,
          <institution>University of Udine</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We study a variant of the Ackermann encoding NA(x) := Py2x 2NA(y) of the hereditarily nite sets by the natural numbers, applicable to the larger collection HF1=2 of the hereditarily nite hypersets. The proposed variation is obtained by simply placing a `minus' sign before each exponent in the de nition of NA, resulting in the expression RA(x) := Py2x 2 RA(y). By a careful analysis, we prove that the encoding RA is well-de ned over the whole collection HF1=2, as it allows one to univocally assign a real-valued code to each hyperset in it. We also address some preliminary cases of the injectivity problem for RA.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>In 1937, W. Ackermann proposed the following recursive encoding of hereditarily
nite sets by natural numbers:</p>
      <p>NA(x) :=</p>
      <p>X 2NA(y):
y2x
(1)
The encoding NA is simple, elegant, and highly expressive for a number of
reasons. On the one hand, it builds a strong bridge between two foundational
mathematical structures: (hereditarily nite) sets and (natural) numbers. On the other
hand, it enables the representation of the characteristic function of hereditarily
nite sets in terms of the usual notation for natural numbers as sequences of
binary digits. That is: y belongs to x if and only if the NA(y)-th digit in the
binary expansion of NA(x) is equal to 1. As one would expect, the string of 0's
and 1's representing NA(x) is nothing but (a representation of) the characteristic
function of x.</p>
      <sec id="sec-1-1">
        <title>In this paper we study a very simple variation of the encoding NA, originally</title>
        <p>proposed in [Pol13] and discussed in [DOPT15] and [OPT17], applicable to a
larger collection of sets. The proposed variation is obtained by simply placing a
minus sign before each exponent in (1), resulting in the expression:
RA(x) :=
As opposed to the encoding NA, the range of RA is not contained in the set N
of the natural numbers, but it extends to the set R of real numbers. In addition,
the domain of RA can be expanded so as to include also the non-well-founded
hereditarily nite sets, namely, the sets de ned by ( nite) systems of equations
of the following form
with bisimilarity as equality criterion (see [Acz88] and [BM96], where the term
hyperset is also used). For instance, the special case of the single set equation
&amp; = f&amp;g, resulting into the equation (in real numbers) x = 2 x, is illustrated
in Section 3 and provides the code of the unique (under bisimilarity) hyperset
= f g.3</p>
      </sec>
      <sec id="sec-1-2">
        <title>While the encoding NA is de ned inductively (and this is perfectly in line with</title>
        <p>our intuition of the very basic properties of the collections of natural numbers
N and of hereditarily nite sets HF|called HF0 in [BM96]), the de nition of
RA, instead, is not inductive when extended to non-well-founded sets, and thus
it requires a more careful analysis, as it must be proved that it univocally (and
possibly injectively) associates (real) numbers to sets.</p>
        <p>The injectivity of RA on the collection of well-founded and non-well-founded
hereditarily nite sets|henceforth, to be referred to as HF1=2, see [BM96]|was
conjectured in [Pol13] and is still an open problem. Here we prove that, given any
nite collection ~1; : : : ; ~n of pairwise distinct sets in HF1=2 satisfying a system
of set-theoretic equations of the form (2) in n unknowns, one can univocally
determine real numbers RA(~1); : : : ; RA(~n) satisfying the following system of
equations:</p>
      </sec>
      <sec id="sec-1-3">
        <title>This preliminary result shows that the de nition of RA is well-given, as it</title>
        <p>associates a unique (real) number to each hereditarily nite hyperset in HF1=2.
This extends to HF1=2 the rst of the properties that the encoding NA enjoys
with respect to HF. Should RA also enjoy the injectivity property, the proposed
adaptation of NA would be completely satis ying, and RA could be coherently
dubbed an encoding for HF1=2.</p>
        <p>In the course of our proof, we shall also present a procedure that drives us
to the real numbers RA(~1); : : : ; RA(~n) mentioned above by way of successive
approximations. In the well-founded case, our procedure will converge in a nite
number of steps, whereas in nitely many steps will be required for convergence
in the non-well-founded case. In the last section of the paper, we shall also brie y
hint at the injectivity problem for RA.
3 Notice that the solution to the equation x = e x is the so-called omega constant,
introduced by Lambert in [Lam58] and studied also by Euler in [Eul83].</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Basics</title>
      <p>Let N be the set of natural numbers and let P( ) denote the powerset operator.</p>
      <sec id="sec-2-1">
        <title>De nition 1 (Hereditarily</title>
        <p>all hereditarily nite sets, where
nite sets). HF := Sn2N HFn is the collection of
(</p>
        <p>HF0 := ;;</p>
        <p>HFn+1 := P(HFn); for n 2 N:</p>
        <sec id="sec-2-1-1">
          <title>In this paper we shall introduce and study a variation of the following map introduced by Ackermann in 1937 (see [Ack37]):</title>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>De nition 2 (Ackermann encoding).</title>
        <p>NA(h) :=</p>
        <p>X 2NA(h0); for h 2 HF:
h02h</p>
        <sec id="sec-2-2-1">
          <title>It is easy to see that the map NA is a bijection between HF.</title>
        </sec>
        <sec id="sec-2-2-2">
          <title>From now on, we denote by hi the element of HF whose NA-code is i, so that</title>
          <p>NA(hi) = i, for i 2 N. Using the iterated-singleton notation</p>
          <p>fxg0 := x
fxgn+1 := fxgn ; for n 2 N,
we plainly have:
In addition, for j 2 N we have:
h0 = ;; h1 = f;g; h2 = f;g2; h3 = ff;g; ;g; h4 = f;g3; etc.
h0 2 hj i</p>
          <p>j is odd,
h2j = fhjg and h2j 1 = fh0; h1; : : : ; hj 1g :
(3)
(4)
i
hj
The map NA induces a total ordering among the elements of HF (that we shall
call Ackermann ordering) such that, for h; h0 2 HF:
h
h0</p>
          <p>NA(h) &lt; NA(h0) :
Thus, hi is the i-th element of HF in the Ackermann ordering and, for i; j 2 N,
we plainly have:
hi
i
i &lt; j:</p>
        </sec>
        <sec id="sec-2-2-3">
          <title>The following proposition can be read as a restating of the bitwise comparison between natural numbers in set-theoretic terms.</title>
          <p>Proposition 1. For hi; hj 2 HF, the following equivalence holds:
hi
hj
i
hi 6= hj and max(hi
hj) 2 hj ;
where
is the symmetric di erence operator A
B := (A n B) [ (B n A).</p>
          <p>It is also useful to de ne the following map low : N ! N which, for i 2 N,
computes the smallest code j of a set hj not present in hi (or, equivalently, the
position of the lowest bit set to 0 in the binary expansion of i):</p>
          <p>low(i) := minfj j hj 2= hig :</p>
        </sec>
        <sec id="sec-2-2-4">
          <title>The following elementary properties, whose proof is left to the reader, will be used in the last section of the paper.</title>
          <p>Lemma 1. For i 2 N, we have:
(i) low(i) = 0
i</p>
          <p>i is even,
(ii) hlow(i) 2= hi,
(iii) fh0; : : : ; hlow(i) 1g
hi,
(iv) hi+1 = hi n fh0; : : : ; hlow(i) 1g [ fhlow(i)g.</p>
        </sec>
        <sec id="sec-2-2-5">
          <title>Finally, we brie y recall that hypersets satisfy all axioms of ZFC, but the ax</title>
          <p>iom of regularity, which forbids both membership cycles and in nite descending
chains of memberships. In the hypersets realm of our interest, based on the
FortiHonsell axiomatization [FH83] as popularized by P. Aczel [Acz88], the axiom
of regularity is replaced by the anti-foundation axiom (AFA). Roughly
speaking, AFA states that every conceivable hyperset, described in terms of a graph
speci cation modelling its internal membership structure, actually exists and is
univocally determined, regardless of the presence of cycles or in nite descending
paths in its graph speci cation. To be slightly more precise, a graph speci cation
(or membership graph) is a directed graph with a distinguished node (point ),
where nodes are intended to represent hypersets, edges model membership
relationships among the node/hypersets, and the distinguished node denotes the
hyperset of interest among all the hypersets represented by the nodes of the
graph. However, extensionality needs to be strengthened so as structurally
indistinguishable pointed graphs are always realized by the same hyperset. More
speci cally, we say that two pointed graphs G = (V; E; p) and G0 = (V 0; E0; p0),
where p 2 V and p0 2 V 0 are the `points' of G and G0, respectively, are
structurally indistinguishable if the points p and p0 are bisimilar, namely, if there
exists a relation R over V V 0 such that the following three properties hold, for
all v 2 V and v0 2 V 0:
(B1) (8w 2 V )(9w0 2 V 0) (v R v0 ^ (v; w) 2 E) ! ((v0; w0) 2 E0 ^ w R w0) ;
(B2) (8w0 2 V 0)(9w 2 V ) (v R v0 ^ (v0; w0) 2 E0) ! ((v; w) 2 E ^ w R w0) ;
(B3) p R p0.</p>
        </sec>
        <sec id="sec-2-2-6">
          <title>Any relation R0 V</title>
          <p>bisimulation over V</p>
        </sec>
        <sec id="sec-2-2-7">
          <title>V 0 satisfying properties (B1) and (B2) above is called a</title>
          <p>V 0.</p>
        </sec>
        <sec id="sec-2-2-8">
          <title>In this paper, we are interested in those hypersets that admit a representation</title>
          <p>as a nite pointed graph: these are the hereditarily nite hypersets in HF1=2.</p>
          <p>Given a ( nite) pointed graph G = (V; E; p) whose nodes are all reachable
from its point p, the collection of hypersets represented by all its nodes form the
transitive closure of f~g, denoted trCl (f~g), where ~ is the hyperset
corresponding to the point p.</p>
          <p>RA(x) :=</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>The real-valued map RA</title>
      <p>Consider the following map RA obtained from NA by simply placing a minus
sign before each exponent in (1):
(5)
(6)
RA(;) = 0;</p>
      <p>1
RA(f;g3) = p ;
2</p>
      <p>RA(f;g) = 1;</p>
      <p>1
RA(f;g4) = 2 p2 ;</p>
      <p>RA(f;g2) =
RA(f;g5) = 2 2 p12 ;
It is easy to see that the equation (6) has a unique solution in R, since the
functions x and 2 x are, respectively, strictly increasing and strictly decreasing,
so that the function x 2 x is strictly increasing. In addition, we have:
x
2 xjx= 21 = 21
Thus, the solution of (6) over R, namely, the code of the hyperset de ned
by the set equation x = fxg, satis es 12 &lt; &lt; 1. Furthermore, much by the
same argument used by the Pythagoreans to prove the irrationality of p2, it can
easily be shown that is irrational. In fact, is transcendental. This follows
from the Gelfond-Schneider theorem (see [Gel34]), which states that every real
number of the form ab is transcendental, provided that a and b are algebraic
numbers such that 0 6= a 6= 1, and b is irrational.4 Indeed, if were algebraic, so
would be and therefore, by the Gelfond-Schneider theorem, 2 = would
be transcendental, contradicting the assumed algebraicity of . Thus, must
be transcendental after all. As is easy to check, the RA-code 2 1=p2 of f;g4 is
transcendental as well.</p>
      <sec id="sec-3-1">
        <title>Much as for NA, the encoding RA is easily seen to be well-de ned over HF. As</title>
        <p>a consequence of the results to be proved in Section 4, we shall see that (5) allows
one to associate univocally a code to each non-well-founded hereditarily nite
set as well, thus showing that RA is also well-de ned over the whole collection
HF1=2 of hereditarily nite hypersets.
4 We recall that the Gelfond-Schneider theorem, obtained independently in 1934 by
A. O. Gelfond and Th. Schneider, solves completely the seventh in a well-celebrated
list of twenty-three problems posed by David Hilbert at the International Congress
of Mathematicians held in Paris, 1900 (see [Hil02]).</p>
        <p>Remark 1 For every singleton fh0g 2 HF, de nition (5) gives RA(fh0g) =
2 RA(h0). Thus, for every h 2 HF, we have</p>
        <p>RA(h) =
n n
X 2 RA(h0) = X RA (fh0g) :
h02h
h02h</p>
        <p>Once we prove that RA is well-de ned over HF1=2, equation (7) can be
immediately generalized to HF1=2 as well.</p>
      </sec>
      <sec id="sec-3-2">
        <title>As the following proposition shows, the codes of hereditarily nite sets can grow arbitrarily large.</title>
        <p>Proposition 2. For any n 2 N, there exists an i 2 N such that RA(hi) &gt; n.
Proof. Notice that for any odd natural number j, we have ; 2 hj . Thus, by
(7), we have RA(hj ) &gt; R(f;g) = 1, RA(fhj g) = 2 RA(hj) 6 2 1 = 12 , and
RA(ffhj gg) = 2 RA(fhjg) &gt; 2 1=2 &gt; 12 .</p>
        <p>Let k = 4n and consider the hereditarily nite set h := fhk0 g : k0 6 k .</p>
      </sec>
      <sec id="sec-3-3">
        <title>Then, we have:</title>
        <p>k
RA(h) = X
k0=0</p>
        <p>RA (ffhk0 gg) &gt;
k
X
k0=0
k0 is odd
1 k
RA (ffhk0 gg) &gt; 2 2
= n :
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>RA on Hereditarily Finite Hypersets</title>
      <p>The fully general case corresponds to considering systems of set-theoretic
equations such as the ones introduced by the following de nition (see also [Acz88]).
De nition 3 (Set systems). A set system S (&amp;1; : : : ; &amp;n) in the set unknowns
&amp;1; : : : ; &amp;n is a collection of set-theoretic equations of the form:
with mi &gt; 0 for i 2 f1; : : : ; ng, and where each unknown &amp;i;u, for i 2 f1; : : : ; ng
and u 2 f1; : : : ; mig, occurs among the unknowns &amp;1; : : : ; &amp;n.5</p>
      <p>The index map IS of S (&amp;1; : : : ; &amp;n) is the map</p>
      <p>n
IS : [ fhi; vi j 1 6 v 6 mig ! f1; : : : ; ng</p>
      <p>i=1
such that IS (i; v) is the index of the unknown &amp;i;v in the list &amp;1; : : : ; &amp;n, for i 2
f1; : : : ; ng and v 2 f1; : : : ; mig, namely, &amp;IS (i;v) &amp;i;v.
5 When mi = 0, the expression f&amp;i;1; : : : ; &amp;i;mi g reduces to the empty set fg.
(7)
(8)</p>
      <p>A set system S (&amp;1; : : : ; &amp;n) is normal if there exist n pairwise distinct (i.e.,
non bisimilar) hypersets ~1; : : : ; ~n 2 HF1=2 such that the assignment &amp;i 7! ~i
satis es all the set equations of S (&amp;1; : : : ; &amp;n).</p>
      <p>Observe that, by the anti-foundation axiom, the assignment &amp;i 7! ~i satisfying
the equations of a given normal set system S (&amp;1; : : : ; &amp;n) is plainly unique.</p>
      <sec id="sec-4-1">
        <title>From now on, we shall write ~, with or without subscripts and/or super</title>
        <p>scripts, to denote a generic (possibly well-founded) hyperset in HF1=2.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Having in mind the de nition (5) of RA, to each normal set system we asso</title>
        <p>ciate a system of equations in R, called code system, as follows.</p>
        <p>De nition 4 (Code systems). Let S (&amp;1; : : : ; &amp;n) be a normal set system of
the form
.
.</p>
        <p>.
8&gt; &amp;1 = f&amp;1;1; : : : ; &amp;1;m1 g
&gt;
&lt;
with index map IS . The code system associated with S (&amp;1; : : : ; &amp;n) is the
following system C (x1; : : : ; xn) of equations in the real unknowns x1; : : : ; xn:
where xi;u is a shorthand for xIS (i;u), for i 2 f1; : : : ; ng and u 2 f1; : : : ; mig.</p>
        <p>Normal set systems characterise all possible elements of HF1=2 and we shall
see that the corresponding code systems characterise their RA-codes. In fact,
we shall prove that every code system admits a unique solution which can be
computed as the limit of suitable sequences of real numbers. Terms in such
sequences approximate the nal solution alternatively from above and from below.
In case of non-well-founded sets, such approximating sequences are in nite and
convergent (to the codes of the non-well-founded sets); additionally, its terms
eventually become codes of certain well-founded hereditarily nite sets which
can be seen as approximations of the corresponding non-well-founded set.</p>
        <p>We begin by formally de ning the set and multi-set approximating sequences
(of the solution) of set systems.</p>
        <p>De nition 5 (Hereditarily nite multi-sets). Hereditarily nite multi-sets
are collection of elements|themselves multi-sets|that can occur with nite
multiplicities.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Hereditarily nite multi-sets will be denoted by specifying their elements in square brackets, in any order, where elements are repeated according to their multiplicities. For instance, the set a occurs in the multi-set [b; a; b; b] with multiplicity 1, whereas b occurs with multiplicity 3.</title>
        <p>Remark 2 A natural embedding of the hereditarily nite sets in the hereditarily
nite multi-sets is the following: a multi-set can be regarded as a set if and
only if each of its elements has multiplicity 1 and, recursively, can be regarded
as a set. Thus, in particular, ; is both a set and a multi-set.</p>
        <p>De nition 6. Let S (&amp;1; : : : ; &amp;n) be a (normal) set system of the form (8), and
let IS be its index map. The set-approximating sequence for (the solution of )
S (&amp;1; : : : ; &amp;n) is the sequence h~ij j 1 6 i 6 ni j2N of the n-tuples of
wellfounded hereditarily nite sets de ned by</p>
        <p>j
h~i j 1 6 i 6 ni :=
&lt;8 h; j 1 6 i 6 ni
: hf~ij;11; : : : ; ~ij;m1i g j 1 6 i 6 ni if j &gt; 0 ;
where ~ij;u1 is a shorthand for ~jIS (1i;u), for i 2 f1; : : : ; ng and u 2 f1; : : : ; mig.</p>
        <p>The multi-set approximating sequence for (the solution of ) S (&amp;1; : : : ; &amp;n) is
the sequence h ij j 1 6 i 6 ngi j2N of the n-tuples of well-founded hereditarily
nite multi-sets de ned by</p>
        <p>j
h i j 1 6 i 6 ni :=
&lt;8 h; j 1 6 i 6 ni
: h[ ij;11; : : : ; ij;m1i ] j 1 6 i 6 ni if j &gt; 0 ;
if j = 0
if j = 0
where ij;u1 is a shorthand for
j 1</p>
        <p>IS (i;u), for i 2 f1; : : : ; ng and u 2 f1; : : : ; mig.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Given a (normal) set system S (&amp;1; : : : ; &amp;n), we say that two unknowns &amp;i</title>
        <p>and &amp;i0 , with i; i0 2 f1; : : : j; ng, are distinguished at step k &gt; 0 by the
setapproximating sequence h~i j 1 6 i 6 ni j2N for S (&amp;1; : : : ; &amp;n) (resp., multi-set
approximating sequence h ij j 1 6 i 6 ni j2N for S (&amp;1; : : : ; &amp;n)) if ~ik 6= ~ik0
(resp., ik 6= ik0 ). Further, we shall refer to ~ij (resp., ij ) as the (j-th)
setapproximation value (resp., multi-set approximation value ) of &amp;i at step j.</p>
      </sec>
      <sec id="sec-4-5">
        <title>Example 1. Consider the following normal set system:</title>
        <p>8&gt; &amp;1 = f&amp;2; &amp;3g
S (&amp;1; &amp;2; &amp;3; &amp;4) = &gt;&lt;&gt; &amp;&amp;23 == ff&amp;g3g
&gt;: &amp;4 = f&amp;2g :
In this case, we have: m1 = 2; m2 = 0; m3 = 1, and m4 = 1; in addition, &amp;1;1, &amp;1;2,
&amp;3;1, and &amp;4;1 are &amp;2, &amp;3, &amp;3, and &amp;2, respectively, so that IS (1; 1) = 2, IS (1; 2) = 3,
IS (3; 1) = 3, and IS (4; 1) = 2.</p>
        <p>The rst four elements of the set-approximating sequence for S are:
= hf;; ff;ggg; ;; fff;ggg; f;gi :</p>
        <p>Notice that, for j = 2 and j = 3, all the ~ij 's are pairwise distinct. In fact, as
a consequence of the next lemma, this is true also for all j &gt; 3.</p>
        <p>The rst four tuples of the multi-set approximating sequence of S are:</p>
        <p>Also in this case, for j = 2 and j = 3, all the ij 's are pairwise distinct and
this holds also for j &gt; 3. Observe that the unknowns &amp;i and &amp;j are distinguished
by the multi-set approximating sequence before than by the set-approximating
sequence: indeed, 11 6= 31, whereas ~11 = ~31.</p>
      </sec>
      <sec id="sec-4-6">
        <title>All sets in the tuples of a set-approximating system are well-founded hered</title>
        <p>itarily nite sets. The initial tuples of a multi-set approximating sequence may
contain proper multi-sets (as in the above example). However, as a consequence
of the following lemma (whose proof can be found in the extended version [CP18]
of this paper), after at most n steps all pairs of distinct unknowns are
distinguished and each tuple contains only proper sets.</p>
        <p>Lemma 2. Let S (&amp;1; : : : ; &amp;n) be a normal set-system, and let h~ij j 1 6 i 6
ngi j2N and h ij j 1 6 i 6 ni j2N be its set- and multi-set approximating
sequences, respectively. The following conditions hold:
(a) for i; i0 2 f1; : : : ; ng and j; k &gt; 0, we have
~ij 6= ~ij0 =) (~ij+k+1 6= ~ij0+k+1 ^ ij 6=
j
i0 )
(namely, if at step j &gt; 0 two unknowns are distinguished by the
set-approximating sequence, then they are also distinguished by the multi-set
approximating sequence; in addition, they remain distinguished in all subsequent
steps);
(b) for j; k &gt; 0 and i 2 f1; : : : ; ng, we have
~ij = ~j+1 =) ~ij = ~j+k+2</p>
        <p>i i
(namely, as soon as ~ij = ~j+1 holds for some j &gt; 0, the set-approximation
i
value of &amp;i remains unchanged for all subsequent steps);
(c) for i; i0 2 f1; : : : ng and j &gt; n, we have
(i 6= i0 =) ~ij 6= ~i0 ) ^ h i j 1 6 i 6 ni = h~i j 1 6 i 6 ni</p>
        <p>j j j
(namely, starting from step n, all pairs of distinct unknowns are distinguished
and the set- and multi-set approximating sequences coincide).
approximating sequence
i 2 f1; : : : ; ng and j 2 N:</p>
      </sec>
      <sec id="sec-4-7">
        <title>Point a) in the above lemma suggests that even though set and multi-set</title>
        <p>approximating sequences will eventually \separate" all solutions of a set
system, multi-set can introduce inequalities rst. This is our rst motivation for
extending the notion of RA-code to multi-sets and use such code-extension to
approximate regular RA-codes. The second motivation is given in Remark 3.
De nition 7. Given a normal set system S (&amp;1; : : : ; &amp;n) and its multi-set
approximating sequence h ij j 1 6 i 6 ngi j2N, we de ne the corresponding code
hRA( ij ) j 1 6 i 6 ngi j2N by recursively putting, for
(</p>
        <p>RA( i0) := 0
RA( ij+1) := Pum=i 1 2 RA( ij;u) :
(10)
(11)
j
We also de ne the corresponding code increment sequence h i j 1 6 i 6 ni j2N
by putting, for i 2 f1; : : : ; ng and j 2 N:
ij := RA( ij+1)</p>
        <p>RA( ij ) :</p>
        <p>Plainly, RA( ij ) &gt; 0, for all i 2 f1; : : : ; ng and j 2 N.</p>
        <p>Remark 3 Consider a normal set system S (&amp;1; : : : ; &amp;n) and its solutions
~1; : : : ; ~n. The values RA( i1) and RA( i10 ) are equal if and only if j~ij = j~i0 j.
The values RA( i2) and RA( i20 ) are equal if and only if the multi-sets of the
cardinalities of elements in ~i and ~i0 are equal. The values RA( i3) and RA( i30 )
are equal if and only if the multi-sets of multi-sets of the cardinalities of elements
of elements in ~i and ~i0 are equal, and so on.</p>
      </sec>
      <sec id="sec-4-8">
        <title>In preparation for the proof of the existence and uniqueness of a solution to the code system associated with any normal set system, we state the technical properties contained in the following lemma, whose proof can be found in the extended version [CP18] of this paper.</title>
        <p>Lemma 3. Let S (&amp;1; : : : ; &amp;n) be a normal set system of the form
with index map IS , code approximating sequence
and code increment sequence h ij j 1 6 i 6 ngi j2N. Then, for i 2 f1; : : : ; ng
and j 2 N, the following facts hold:
hRA( ij ) j 1 6 i 6 ngi j2N,
(i) RA( ij+1) = i0 +
(ii) i0 = mi,</p>
        <p>+ ij ,
(iii) ij+1 = Pum=i 1 2 RA( ij;u) (2 i;u</p>
        <p>j
(iv) i2j+1 6 0 6 i2j ,
(v) j ij+1j 6 j i j, and</p>
        <p>j
(vi) limj!1 ij = 0.</p>
        <p>1),</p>
      </sec>
      <sec id="sec-4-9">
        <title>We are now ready to prove the main result of the paper.</title>
        <p>Theorem 4. For any given normal set system, the corresponding code system
admits always a unique solution.</p>
        <p>Proof. Let S (&amp;1; : : : ; &amp;n) be a normal set system of the form (8), and let
hRA( ij ) j 1 6 i 6 ngi j2N and h ij j 1 6 i 6 ngi j2N be its code
approximating sequence and code increment sequence, respectively. Also, let C (x1; : : : ; xn)
be the code system
.
.</p>
        <p>.</p>
        <p>Existence: By Lemma 3(i),(iv),(vi), using the Leibniz criterion for alternating
series, it follows that each of the sequences fRA( ij )gj2N is convergent, for i 2
f1; : : : ; ng. Let us put i := limj!1 RA( ij ), for i 2 f1; : : : ; ng. From (10), we
have</p>
        <p>RA( ij+1) =
mi
X 2 RA( ij;u); for j 2 N :
u=1
Then, by taking the limit of both sides as j approaches in nity, it follows that
i =
for i 2 f1; : : : ; ng, where i;u is a shorthand for IS (i;u), with IS the index map
of S (&amp;1; : : : ; &amp;n), proving that the n-tuple h 1; : : : ; ni is a solution of the code
system C (x1; : : : ; xn).</p>
        <p>Uniqueness: Next we prove that the solution h 1; : : : ; ni is unique. Let
h 10; : : : ; n0i be any solution of the code system C (x1; : : : ; xn). To show that
h 10; : : : ; n0i = h 1; : : : ; ni it is enough to prove that</p>
        <p>RA
2j
i
2j+1 ; for j 2 N and i 2 f1; : : : ; ng;
i
(12)
holds. Indeed, from (12), it follows immediately
i = lim RA
j!1
2j
i
6 i0 6 lim RA
j!1
i2j+1 =
i ;
for every i 2 f1; : : : ; ng, showing that h 10; : : : ; n0i = h 1; : : : ; ni.</p>
        <p>We prove (12) by induction on j, for all i 2 f1; : : : ; ng.</p>
        <p>
          For the base case j = 0, we observe that since i0 = Pum=i 1 2
usual, i0;u stands for I0S (i;u)), then
0
i;u (where, as
RA
and recalling that i0 = Pum=i 1 2
i 2 f1; : : : ; ng and u 2 f1; : : : ; mig:
holds for some j 2 N, and prove that it holds for j + 1 as well. From (
          <xref ref-type="bibr" rid="ref13">13</xref>
          )
0i;u , the following inequalities hold, for every
2j
        </p>
        <p>RA i;u
2 RA( i2;ju+1) 6 2
6 i0;u 6 RA
i;u 6 2 RA( i2;ju)
0
2j+1
i;u
mi
X 2 RA( i2;ju+1) 6
u=1
for every i 2 f1; : : : ; ng and u 2 f1; : : : ; mig. Hence, by repeating the very same
steps as above, one can deduce also the inequalities</p>
        <p>
          RA
2(j+1)
i
= RA
2j+2
i
for i 2 f1; : : : ; ng, proving that (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ) holds for j + 1 too. This completes the
induction, and also the proof of the theorem.
        </p>
        <p>Remark 5 To show that the code RA is well-de ned over the whole HF1=2, we
proceed as follows. Given a hereditarily nite hyperset ~ 2 HF1=2, let ~1; : : : ; ~n
be the distinct elements of the transitive closure trCl (f~g) of f~g, where ~1 = ~.
Then we have
.
.</p>
        <p>.
8 ~1 = f~1;1; : : : ; ~1;m1 g
&gt;
&gt;
&lt;
&gt;
&gt;
:~n = f~n;1; : : : ; ~n;mn g
(14)
for suitable hypersets ~i;j 2 f~1; : : : ; ~ng, with i 2 f1; : : : ; ng and j 2 f1; : : : ; mig.</p>
        <p>Consider the set system S (&amp;1; : : : ; &amp;n)
associated with (14), where &amp;i;j = &amp;` i ~i;j = ~`, for all i; ` 2 f1; : : : ; ng and
j 2 f1; : : : ; mig. Plainly, S (&amp;1; : : : ; &amp;n) is normal and ~1; : : : ; ~n is its solution.
By Theorem 4, let 1; : : : ; n be the solution to the code system associated with
S (&amp;1; : : : ; &amp;n). Then RA(~i) = i, for i 2 f1; : : : ; ng, and, in particular, RA(~) =
RA(~1) = 1. Further, it is immediate to check that, for every normal set system
S 0(x01; : : : ; x0m) containing ~ in its solution, say at position k 2 f1; : : : ; mg, if
10; : : : ; m0 is the solution to the corresponding code system, then k0 = 1. In
other words, the value RA(~) computed by the above procedure is independent of
the normal set system used. By the arbitrariness of ~, it follows that RA(~) is
de ned for every hyperset ~ 2 HF1=2.
5</p>
        <p>A</p>
        <p>rst step towards injectivity
As already remarked, the problem of establishing the injectivity of the map
RA is still open. As an initial example, we provide here a very partial result.
However, the arguments used in the proof below do not seem to easily generalize
even to the narrower task of proving the injectivity of RA over the well-founded
hereditarily nite sets only.</p>
        <p>Lemma 4. For all i 2 N, we have:
(a) RA(hi) 6= RA(hi+1), and
(b) RA(hi) 6= RA(hi+2),
where hj is the j-th element of HF in the Ackermann ordering.</p>
        <p>Proof. Let i 2 N. From (iii) and (iv) of Lemma 1 and from (4), we have
RA(hi+1) = RA(hi)</p>
        <p>
          RA(h2low(i) 1) + RA(h2low(i) ) :
(
          <xref ref-type="bibr" rid="ref5">15</xref>
          )
If i is even, then low(i) = 0, and therefore
On the other hand, if i is odd, then low(i) 6= 0, and so, by (3):
        </p>
        <p>RA(h2low(i) 1) = 0 6= 1 = RA(h2low(i) ) :</p>
        <p>RA(h2low(i) ) &lt; 1 = RA(fh0g) 6 RA(h2low(i) 1) :</p>
      </sec>
      <sec id="sec-4-10">
        <title>In any case, we have RA(h2low(i) )</title>
        <p>
          RA(h2low(i) 1) 6= 0, proving (a), by (
          <xref ref-type="bibr" rid="ref5">15</xref>
          ).
        </p>
      </sec>
      <sec id="sec-4-11">
        <title>Concerning (b), we begin by putting</title>
        <p>
          j := RA(h2j )
h2j 1, and therefore:
Hence, we have j 6= 1 also for j &gt; 2, since RA(h2j ) = 2 RA(hj) &lt; 1. But
then, from (
          <xref ref-type="bibr" rid="ref5">15</xref>
          ), we have, for every i 2 N:
        </p>
        <p>RA(hi+2)</p>
        <p>R(hi) = RA(hi+2)</p>
        <p>R(hi+1) + RA(hi+1)</p>
        <p>R(hi)
=</p>
        <p>low(i+1) + low(i) 6= 0 ;
since either i or i + 1 is even and so either low(i) = 1 or low(i+1) = 1, whereas,
as we proved above, low(i) 6= 1 6= low(i+1). This proves (b), completing the
proof of the lemma.</p>
        <p>Remark 6 While the value of RA i0 is 0 for any i 2 f1; : : : ; ng, the value
of RA i1 | rst approximation of RA ( i)|is the cardinality of i, and the
subsequent approximations oscillate within the interval [0; j ij].</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>By turning labels into sets, the encoding proposed in this paper can be used on
a variety of structures, going from labelled graphs to Kripke models. This can be
done in many di erent ways and in [DPP04,PP04] the reader can nd a rather
general|albeit non optimised|technique to carry out this label elimination
task. A label elimination performed to optimise code computation (or its form)
is under study.</p>
      <sec id="sec-5-1">
        <title>The algorithmic side of RA is also under study. A possible direction towards</title>
        <p>its usage|for example in bisimulation computation|starts from the observation
that only the computation of a bounded number of digits is actually necessary
to realise all the inequalities in any given set system.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>The authors thank Eugenio Omodeo for very pleasant and fruitful conversations,
and an anonymous reviewer for his/her comments.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Ack37]
          <string-name>
            <given-names>W.</given-names>
            <surname>Ackermann</surname>
          </string-name>
          , Die Widerspruchfreiheit der allgemeinen Mengenlehre,
          <source>Mathematische Annalen</source>
          <volume>114</volume>
          (
          <year>1937</year>
          ),
          <volume>305</volume>
          {
          <fpage>315</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [Acz88]
          <string-name>
            <given-names>P.</given-names>
            <surname>Aczel</surname>
          </string-name>
          ,
          <article-title>Non-well-founded sets</article-title>
          , vol.
          <volume>14</volume>
          <source>of CSLI Lecture Notes</source>
          , Stanford, CA,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [BM96]
          <string-name>
            <given-names>J.</given-names>
            <surname>Barwise</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Moss</surname>
          </string-name>
          , Vicious circles,
          <source>CSLI Lecture Notes</source>
          , Stanford, CA,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [CP18]
          <string-name>
            <given-names>D.</given-names>
            <surname>Cantone</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Policriti</surname>
          </string-name>
          ,
          <article-title>Encoding sets as real numbers (Extended version)</article-title>
          ,
          <source>Tech. Report arXiv:1806</source>
          .09329 [cs],
          <year>June 2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [DOPT15]
          <string-name>
            <surname>Giovanna D'Agostino</surname>
          </string-name>
          , Eugenio G. Omodeo, Alberto Policriti, and
          <string-name>
            <surname>Alexandru</surname>
            <given-names>I. Tomescu</given-names>
          </string-name>
          ,
          <article-title>Mapping sets and hypersets into numbers</article-title>
          ,
          <source>Fundam. Inform</source>
          .
          <volume>140</volume>
          (
          <year>2015</year>
          ), no.
          <issue>3-4</issue>
          ,
          <issue>307</issue>
          {
          <fpage>328</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [DPP04]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dovier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Piazza</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Policriti</surname>
          </string-name>
          ,
          <article-title>An e cient algorithm for computing bisimulation equivalence</article-title>
          ,
          <source>Theor. Comput. Sci</source>
          .
          <volume>311</volume>
          (
          <year>2004</year>
          ), no.
          <issue>1-3</issue>
          ,
          <issue>221</issue>
          {
          <fpage>256</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Eul83]
          <string-name>
            <given-names>L.</given-names>
            <surname>Euler</surname>
          </string-name>
          ,
          <article-title>De serie Lambertina Plurimisque eius insignibus proprietatibus</article-title>
          .,
          <source>Acta Acad. Scient. Petropol</source>
          .
          <volume>2</volume>
          (
          <issue>1783</issue>
          ),
          <volume>29</volume>
          {51, reprinted in Euler, L. Opera Omnia, Series Prima, Vol.
          <volume>6</volume>
          :
          <string-name>
            <given-names>Commentationes</given-names>
            <surname>Algebraicae</surname>
          </string-name>
          . Leipzig, Germany: Teubner, pp.
          <volume>350</volume>
          {
          <issue>369</issue>
          ,
          <year>1921</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [FH83]
          <string-name>
            <given-names>M.</given-names>
            <surname>Forti</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Honsell</surname>
          </string-name>
          ,
          <article-title>Set theory with free construction principles, Annali Scuola Normale Superiore di Pisa, Classe di Scienze IV (</article-title>
          <year>1983</year>
          ), no.
          <volume>10</volume>
          ,
          <issue>493</issue>
          {
          <fpage>522</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [Gel34]
          <string-name>
            <given-names>Aleksandr</given-names>
            <surname>Gelfond</surname>
          </string-name>
          , Sur le septieme Probleme de Hilbert,
          <string-name>
            <surname>Bulletin de l'Academie des Sciences de l'URSS. VII</surname>
          </string-name>
          (
          <year>1934</year>
          ), no.
          <issue>4</issue>
          ,
          <issue>62</issue>
          {
          <fpage>634</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [Hil02]
          <string-name>
            <given-names>D.</given-names>
            <surname>Hilbert</surname>
          </string-name>
          , Mathematical problems,
          <source>Bulletin of the American Mathematical Society</source>
          <volume>8</volume>
          (
          <year>1902</year>
          ), no.
          <volume>10</volume>
          ,
          <issue>437</issue>
          {
          <fpage>479</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [Lam58]
          <string-name>
            <given-names>J.H.</given-names>
            <surname>Lambert</surname>
          </string-name>
          ,
          <article-title>Observations variae in Mathesin Puram, Acta Helvitica, physico-mathematico-anatomico-botanico-medica</article-title>
          <volume>3</volume>
          (
          <issue>1758</issue>
          ),
          <volume>128</volume>
          {
          <fpage>168</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>[OPT17] Eugenio</surname>
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Omodeo</surname>
          </string-name>
          , Alberto Policriti, and
          <string-name>
            <surname>Alexandru</surname>
            <given-names>I. Tomescu</given-names>
          </string-name>
          ,
          <article-title>On sets and graphs</article-title>
          .
          <source>perspectives on logic and combinatorics</source>
          , Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [Pol13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Policriti</surname>
          </string-name>
          ,
          <article-title>Encodings of sets and hypersets</article-title>
          ,
          <source>Proc. of the 28th Italian Conference on Computational Logic</source>
          , Catania, Italy,
          <source>September 25-27</source>
          ,
          <year>2013</year>
          . (
          <string-name>
            <given-names>D.</given-names>
            <surname>Cantone</surname>
          </string-name>
          and M. Nicolosi Asmundo,
          <source>eds.)</source>
          , vol.
          <volume>1068</volume>
          , CEUR Workshop Proceedings, ISSN
          <volume>1613</volume>
          -
          <issue>0073</issue>
          ,
          <year>2013</year>
          , pp.
          <volume>235</volume>
          {
          <fpage>240</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [PP04]
          <string-name>
            <given-names>C.</given-names>
            <surname>Piazza</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Policriti</surname>
          </string-name>
          , Ackermann Encoding, Bisimulations, and OBDDs,
          <source>Theory and Practice of Logic Programming</source>
          <volume>4</volume>
          (
          <year>2004</year>
          ), no.
          <issue>5-6</issue>
          ,
          <issue>695</issue>
          {
          <fpage>718</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>