Algorithmics of Checking whether a Mapping Is Injective, Surjective, and/or Bijective

نویسندگان

  • E. Cabral Balreira
  • Olga Kosheleva
  • Vladik Kreinovich
چکیده

In many situations, we would like to check whether an algorithmically given mapping f : A → B is injective, surjective, and/or bijective. These properties have a practical meaning: injectivity means that the events of the action f can be, in principle, reversed, while surjectivity means that every state b ∈ B can appear as a result of the corresponding action. In this paper, we discuss when algorithms are possible for checking these properties. 1 Formulation of the Problem States of real-life systems change with time. In some cases, this change comes “by itself”, from laws of physics: radioactive materials decays, planets go around each other, etc. In other cases, the change comes from our interference: e.g., a spaceship changes trajectory after we send a signal to an engine to perform a trajectory correction. In many situations, we have equations that describe this change, i.e., we know a function f : A → B that transform the original state a ∈ A into a state f(a) ∈ b at a future moment of time. In such situations, the following two natural problems arise. The first natural question is: Are the changes reversible? For example, when we erase the value of the variable in a computer, by replacing it with 0s, the changes are not reversible: there is not trace of the original value left, and so reconstructing the original value is not possible. In such situations, two different original states a ̸= a′ leads to the exact same new state f(a) = f(a′). If different states a ̸= a′ always lead to different states f(a) ̸= f(a′), then, in principle, we can reconstruct the original state a based on the new state f(a). In mathematical terms, mapping f : A → B that map different elements into different ones are called injective, so the question is whether a given mapping is injective. The second natural question is: Are all the states b ∈ B possible as a result of this dynamics, i.e., is it true that every state b ∈ B can be obtained as f(a) for some a ∈ A. In mathematical terms, mappings that have this property are called surjective. We may also want to check whether a mapping is both injective and surjective, i.e., in mathematical terms, whether it is a bijection. Thus, in practice, it is important to be able to check whether a given mapping is injective, surjective, or bijective; see, e.g., [1]. In this paper, we analyze this problem from an algorithmic viewpoint. 2 Case of Polynomial and, More Generally, Semi-Algebraic Mappings Case study. Let us first consider the case when the set A and B are semialgebraic sets, i.e., when each of these sets is characterized by a finite collection of polynomial equalities and inequalities with rational coefficients. For example, the upper half of the unit circle centered at the point (0, 0) is a semi-algebraic set, since it can be described as the set of all the pairs (x1, x2) that satisfy two polynomial inequalities: x1 + x 2 2 ≤ 1 and x2 ≥ 0. We also assume that the mapping f : A → B is semi-algebraic – in the sense that the graph {(a, f(a) : a ∈ A} of this function is a semi-algebraic set. For example, every polynomial mapping is, by definition, semi-algebraic. Polynomial mappings are very important, since every continuous function on bounded set can be, within any given accuracy, approximated by a polynomial. Since in practice, we only know the actual consequences of each action with some accuracy, this means that every action can be represented by a polynomial mapping. First result: algorithms are possible. In the polynomial case and, more generally, in the semi-algebraic case, all three above questions are algorithmically decidable: Proposition 1. There exists an algorithm, that, given two semi-algebraic sets A and B and a semi-algebraic mapping f : A → B, checks whether f is injective, surjective, and/or bijective. Proof. Under the conditions of the proposition, each of the relations a ∈ A, b ∈ B, and f(a) = b can be described by a finite set of polynomial equalities and inequalities. A polynomial is, by definition, a composition of additions and multiplications. Thus, both the injectivity and surjectivity can be described in terms of the first order language with variables running over real numbers, and elementary formulas coming from addition, multiplication, and equality. Namely, injectivity can be described as ∀a∀a′ ∀b ((a ∈ A& a′ ∈ A& f(a) = b& f(a′) = b& b ∈ B) → a = a′), and surjectivity can be described as ∀b (b ∈ B → ∃a (a ∈ A& f(a) = b)). For such formulas, there is an algorithm – originally proposed by Tarski and later modified by Seidenberg – that decides whether a given formula is true or not; see, e.g., [3, 6]. Thus, our problems are indeed algorithmically decidable. Remark 1. One of the main open problems in this area is Jacobian Conjecture, according to which every polynomial map f : C → C from n-dimensional complex space into itself for which the Jacobi determinant det ( ∂fi ∂xj ) is equal to 1 is injective; see, e.g., [2]. This is an open problem, but for any given dimension n and for any given degree d of the polynomial, the validity of the corresponding case of this conjecture can be resolved by applying the Tarski-Seidenberg algorithm. How efficient are the corresponding algorithms? The following results show that the existence of the above algorithms do not mean that these algorithms are necessary efficient, even for polynomial mappings. Proposition 2. The problem of checking whether a given polynomial mapping f : IR → IR is injective is, in general, NP-hard. Proof. By definition, a problem is NP-hard if every problem from the class NP can be reduced to it; see, e.g., [5]. Thus, to prove that this problem is NP-hard, let us reduce a known NP-hard problem to it. As such a known problem, we take a subset problem: given n+1 positive integers s1, . . . , sn, S, check whether there exist values x1, . . . , xn ∈ {0, 1} for which n ∑ i=1 si ·xi = S. For each instance of this problem, let us form the following polynomial mapping f(x1, . . . , xn, xn+1) = (x1, . . . , xn, P (x1, . . . , xn) · xn+1), where P (x1, . . . , xn) def = n ∑ i=1 xi · (1 − xi) + ( n ∑ i=1 si · xi − S )2 . If the original instance of the subset sum problem has a solution (x1, . . . , xn), then for this solution, we have P (x1, . . . , xn) = 0 and thus, vectors (x1, . . . , xn, 0) ̸= (x1, . . . , xn, 1) are mapped into the same vector (x1, . . . , xn, 0), so f is not injective. Vice versa, if the original instance of the subset sum problem does not have a solution, then P (x1, . . . , xn) is always positive – otherwise, the tuple (x1, . . . , xn) would be a solution. Thus, once we know y = (y1, . . . , yn, yn+1) = f(x1, . . . , xn, xn+1), we can recover xi as follows: xi = yi for i ≤ n and xn+1 = yn+1/P (x1, . . . , xn). So, the above mapping f is injective if and only if the original instance of the subset problem has a solution. The reduction is proven, so the problem of checking injectivity is indeed NP-hard. Proposition 3. The problem of checking whether a given polynomial mapping f : IR → IR is surjective is, in general, NP-hard. Proof. This is proven by the same reduction as in the previous proof: when P (x1, . . . , xn) = 0 for some x1, . . . , xn, then the element (x1, . . . , xn, 1) is not in the range of the mapping; on the other hand, when P is always positive, the mapping is surjective. Proposition 4. The problem of checking whether a given polynomial mapping f : IR → IR is bijective is, in general, NP-hard. Proof. This is proven by the same reduction as in the previous two proofs. Remark 2. It would be interesting to find out whether the following problems are NP-hard: – checking whether a given injective polynomial mapping is also surjective, and – checking whether a given surjective polynomial mapping is also injective. Polynomial mapping with computable coefficients. For such mappings, the corresponding questions become algorithmically undecidable. A real number x is called computable if there exists an algorithm that, given a natural number n, returns a rational number rn which is 2 −m-close to x. Equivalently, instead of specifying the sequence 2−n, we can require the existence of an algorithm that, given a rational number ε > 0, produces a rational number which is ε-close to x; see, e.g., [4, 7]. Proposition 5. No algorithm is possible that, given a polynomial mapping f : IR → IR with computable coefficients, decides whether this mapping is injective. Proof. The proof is based on the known fact that no algorithm is possible that, given a computable real number a, decides whether this number is equal to 0 or not. We can thus take n = 1 and f(x) = a · x. This mapping is injective if and only if a ̸= 0. Since we cannot algorithmically decide whether a ̸= 0, we thus cannot algorithmically check whether a given mapping is injective. Proposition 6. No algorithm is possible that, given a polynomial mapping f : IR → IR with computable coefficients, decides whether this mapping is surjective. Proposition 7. No algorithm is possible that, given a polynomial mapping f : IR → IR with computable coefficients, decides whether this mapping is bijective. Proof. These two results are proven by the same reduction as the previous proposition. Proposition 8. No algorithm is possible that, given an injective polynomial mapping f : [0, 1] → [0, 1] with computable coefficients, decides whether this mapping is also surjective. Proof. Indeed, for all a ∈ [0, 0.5], the mapping f(x) = (1 − a) · x is injective, but it is surjective only for a = 0. Proposition 9. No algorithm is possible that, given an surjective polynomial mapping f : IR → IR with computable coefficients, decides whether this mapping is also injective. Proof. Indeed, for n = 1, the mapping f(x) = −a · x + x is always surjective, but it is injective only when a = 0, i.e., when a = 0.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Locally Constrained Homomorphisms on Graphs of Bounded Treewidth and Bounded Degree

A homomorphism from a graph G to a graph H is locally bijective, surjective, or injective if its restriction to the neighborhood of every vertex of G is bijective, surjective, or injective, respectively. We prove that the problems of testing whether a given graph G allows a homomorphism to a given graph H that is locally bijective, surjective, or injective, respectively, are NP-complete, even w...

متن کامل

Answers to Some of the Homework Problems

1. We just write out (i). Recall that X1 ∪ X2 = {x : x ∈ X1 or x ∈ X2}. Hence x ∈ X1 =⇒ x ∈ X1 ∪ X2, so that X1 ⊆ X1 ∪ X2. By symmetry, X1 ⊆ X1 ∪ X2. Finally, suppose that Y is a set such that X1 ⊆ Y and X2 ⊆ Y . Let x ∈ X1 ∪X2. Then x ∈ X1 or x ∈ X2. If x ∈ X1, then x ∈ Y since X1 ⊆ Y . Similarly, if x ∈ X2, then x ∈ Y . Thus in either case x ∈ Y , so that X1 ∪X2 ⊆ Y . 2. (i) Injective, not su...

متن کامل

Product decomposition for surjective 2-block NCCA

It is known that injective Cellular Automata (CA) are surjective. In general, the converse is not true, and there are many algebraic CA counterexamples. However, there are interesting subclasses where this might be true. For example, if a surjective CA has entropy 0 then it is almost injective (Moothathu (2011)) and it is not known if it is actually injective. The author believes there are some...

متن کامل

On Epimorphisms and Monomorphisms of Hopf Algebras

We notice that for a Hopf algebra H , its antipode S is both an epimorphism and a monomorphism from H to H in the category of Hopf algebras over a field. Together with the existence of Hopf algebras with non-injective or non-surjective antipode, this proves the existence of non-surjective epimorphisms and non-injective monomorphisms in the category of Hopf algebras. Using Schauenburg’s free Hop...

متن کامل

Some Properties Preserved by Weak Nearness

We show that the properties of being injective, surjective, continuous, strongly surjective, stably solvable, carry over to weakly-near maps. We also prove a data dependence theorem for equations of the form A(x) = z, where A is weakly-near to some bijective map.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014