2023-05-21

285: Some Parts of Legitimate Formulas for ZFC Set Theory

<The previous article in this series | The table of contents of this series | The next article in this series>

A description/proof of some parts of legitimate formulas for ZFC set theory

Topics


About: set

The table of contents of this article


Starting Context



Target Context


  • The reader will have a description and a proof of the proposition that some expressions can be parts of legitimate formulas for the ZFC set theory.

Orientation


There is a list of definitions discussed so far in this site.

There is a list of propositions discussed so far in this site.


Main Body


1: Note


The subset axiom states that when S is a set, S1:={sS|ϕ(s,A1,A2,...,An)} is a set where Ai is any set that is not S1 and ϕ is something called formula. The reason why Ai is not allowed to be S1 is that otherwise, ϕ(s,S1)=sS1 would be allowed, which would not really determine what would be in S1. Likewise, the replacement axiom involves a formula.

Let us note that Ai is externally determined, which means that Ai cannot be constructed base on s. For example, Ai cannot be like A2=A1s or A2={as|a>2}.

Any formula in the ZFC set theory has to be legitimate, which means that the formula uses only the argument sets, some other set variables defined legitimately inside the formula, ,=,,,,,¬,,, and (~) as to avoid ambiguity, where any 'other set variable defined legitimately inside the formula' is p ψ(p,...) or p ψ(p,...) where ψ(p,...) is a legitimate part. Let us mean by 'legitimate set variable' an argument variable or a set variable defined legitimately inside the formula, hereafter.

It is not so obvious whether an expression like 'p p{...}' where {...} is a set is a part of a legitimate formula, because { } is not declared to be usable in legitimate formulas by definition: {...} being a set is not enough; it has to be able to be expressed legitimately with only the certified elements.

But once an expression like p p={...}, is confirmed to be legitimate, p can be used representing {...} thereafter. That is the reason why we deal with such expressions in Descriptions.

If the requirement for such a formula seems to be too restrictive (and too arbitrary), I understand that the ZFC theory is only listing what can be safely called sets, not saying that what cannot be expressed with a legitimate formula cannot be a set (there is an article that argues my thoughts on that point). Anyway, we stick to what the ZFC theory guarantees in this article.


2: Description 1


For any legitimate set variable, p, and any expression, e, if pe is legitimate, p=e is legitimate where e is {sS|ϕ(s,...)} for example.

On the other hand, if p=e is legitimate, pe is legitimate.

In fact, if p=e is legitimate, ep is legitimate.

Furthermore, if p=e and p=e are legitimate, ee and e=e are legitimate.

So, in the following Descriptions, if a 1 form is described, also the other forms ares implied, even if without being mentioned.


3: Proof 1


Let us suppose that pe is legitimate. p=e is (pp,pe)(pe,pp), but pe is a legitimate part.

Let us suppose that p=e is legitimate. pe is p=e,pp, but p=e is a legitimate part.

Let us suppose that p=e is legitimate. ep is p=e,pp.

Let us suppose that p=e and p=e are legitimate. ee is p=e,p=e,pp. e=e is p=e,p=e,p=p.


4: Description 2


For any legitimate set variable, p, any expression, ϕ1(...), such that sϕ1(...) is legitimate when s is any legitimate set variable, and any legitimate expression, ϕ2(s,...), p{sϕ1(...)|ϕ2(s,...)} is legitimate.


5: Proof 2


p{sϕ1(...)|ϕ2(s,...)} is (pϕ1(...))ϕ2(p,...).


6: Description 3


For any legitimate set variables, p,S1,S2,...,Sn, p{S1,S2,...,Sn} is legitimate.


7: Proof 3


p{S1,S2,...,Sn} is (p=S1)(p=S2)...(p=Sn).


8: Description 4


For any legitimate set variables, p,S1,S2, pS1,S2 is legitimate.


9: Proof 4


S1,S2 is {S1,{S1,S2}}. p{S1,{S1,S2}} is (p=S1)(p={S1,S2}), and p={S1,S2} is legitimate by Description 3 and Description 1.


10: Description 5


For any legitimate set variables, p,S, pPow(S) is legitimate where Pow() means the power set of the argument.


11: Proof 5


pPow(S) is pS, so, is legitimate.


12: Description 6


For any legitimate set variables, p,S1,S2,...,Sn, pS1×S2×...×Sn is legitimate.


13: Proof 6


As is shown in the proof of the proposition that the product of any finite number of sets is a set, S1×S2={sPow(Pow(S1S2))|s1S1,s2S2,s=s1,s2}. But sPow(Pow(S1S2)) is (s=Pow(S1S2))(sPows) and is legitimate, because s=Pow(S1S2) and sPows are legitimate by Description 5 and Description 1. s=, is legitimate by Description 4 and Description 1. Then, pS1×S2 is legitimate by Description 2.

pS1×S2×S3 is (p=(S1×S2))(p(p×S3)), which is legitimate by the previous paragraph and Description 1, and so on.


14: Description 7


For any legitimate set variables, p,S1,S2, 'p is a relation from S1 to S2' is legitimate.


15: Proof 7


'p is a relation from S1 to S2' is pPow(S1×S2), which is (p=S1×S2)(pPowp). p=S1×S2 and pPowp are legitimate by Descriptions 5, 6, and 1.


16: Description 8


For any legitimate set variables, p,S1,S2, 'p is a function from S1 to S2' is legitimate.


17: Proof 8


The set of all such possible functions is F={fPow(S1×S2)|(s1S1,s2S2,s1,s2f)((s1S1,s2S2,s2S2,(s1,s2f)(s1,s2f))(s2=s2))}. So, pF, which is 'p is a function from S1 to S2', is legitimate by Descriptions 1, 2, 4, 5, and 6.


18: Description 9


For any legitimate set variables, p,f,S1,S2,S3, where f is a function, f:S1S2, pf|S3, where f|S3 is the restriction of f, is legitimate.


19: Proof 9


f|S3={sf|s3S3,s2S2,s=s3,s2}. So, pf|S3 is legitimate by Descriptions 1, 2, and 4.


20: Description 10


For any legitimate set variables, p,f,S, where f is a function, p=f(S) is legitimate when S is a member of the domain of f.


21: Proof 10


p=f(S) is pf,p=S,p, which is legitimate by Descriptions 1 and 4.


22: Description 11


For any legitimate set variables, p,S, and any ordering, <, that can apply to p and S, p<S or pS is legitimate, if the ordering is legitimately defined, which means that as the ordering is really a relation, which is a set, the relation has to be able to be expressed as a legitimate set variable.


23: Proof 11


As < is really a relation, R, p<S or pS is p,SR or p,SRp=S, respectively, which is legitimate by Description 4.


24: Description 12


For any legitimate set variables, p,f, where f is a function, pimg(f) is legitimate where img() is the image of the argument.


25: Proof 12


pimg(f) is p,p,pf, which is legitimate by Description 4.


26: Description 13


For any legitimate set variables, p,f, where f is a function, pdom(f) is legitimate where dom() is the domain of the argument.


27: Proof 13


pdom(f) is p,p,pf, which is legitimate by Description 4.


28: Description 14


For any legitimate set variables, p,S,s, where sS, and any ordering, <, pseg(S,<,s), which is the initial segment of S with respect to < and s, is legitimate.


29: Proof 14


pseg(S,<,s) is p{pS|p<s}, which is legitimate by Descriptions 2 and 11.


30: Description 15


For any legitimate set variables, <,S, '< is a linear ordering on S' is legitimate.


31: Proof 15


'< is a linear ordering on S' is <∈Pow(S×S)s1,s2,s3S(s1,s2∈<s2,s3∈<)s1,s3∈<s1S,s1,s1∉<s1S(s2S,¬s1=s2)((s1,s2∈<s2,s1∈<)¬(s1,s2∈<s2,s1∈<)).


32: Description 16


For any legitimate set variables, <,S, '< is a well-ordering on S' is legitimate.


33: Proof 16


'< is a well-ordering on S' is '< is a linear ordering on S' SS(mS(sS,(¬m=s),m,s∈<).


34: Description 17


For any legitimate set variables, f,S1,S2, 'f is an injective function from S1 into S2' is legitimate.


35: Proof 17


'f is an injective function from S1 into S2' is 'f is an function from S1 into S2' (p1S1(p2S1,¬p2=p1)(p3S2,p1,p3f,p4S2,p2,p4f,¬p3=p4)). Note that as the condition that f is a function is in place, it is guaranteed that there are unique p3 and p4, so, if the found p3 and p4 satisfy ¬p3=p4, it will be OK.


36: Description 18


For any legitimate set variables, f,S1,S2, 'f is a surjective function from S1 onto S2' is legitimate.


37: Proof 18


'f is an surjective function from S1 onto S2' is 'f is an function from S1 into S2' p2S2,p1S1,p1,p2f.


38: Description 19


For any legitimate set variables, f,S1,S2, 'f is a bijective function from S1 onto S2' is legitimate.


39: Proof 19


'f is a bijective function from S1 onto S2' is 'f is an injective function from S1 into S2' 'f is a surjective function from S1 onto S2'.


40: Description 20


For any legitimate set variables, p,S, 'p is equinumerous with S', denoted as pS, is legitimate.


41: Proof 20


pS is 'p,p is a bijective function from p onto S'.


42: Description 21


For any legitimate set variable, p, 'p is an ordinal number' is legitimate.


43: Proof 21


'p is an ordinal number' is S<, '< is a well-ordering on S', 'p is the ϵ-image of (S,<)'. 'p is the ϵ-image of (S,<)' is S1(f, 'f is a function from S to S1', sS,f(s)={sS1|s<s,s=f(s)}) p=imgf.


44: Description 22


For any legitimate set variables, p,S, 'p is a cardinal number of S' is legitimate.


45: Proof 22


'p is a cardinal number of S' is 'p is the least ordinal number equinumerous to S', which is 'p is an ordinal number' pS (p,p is an ordinal number' pS,¬p=p)p<p.


46: Description 23


For any legitimate set variable, p, 'p is a cardinal number' is legitimate.


47: Proof 23


'p is a cardinal number' is S,p is a cardinal number of S'.


48: Description 24


For any legitimate set variable, S, and any net, n:DT where D is any directed set and T is any topological space, 'n is frequently in S' is legitimate.


49: Proof 24


'n is frequently in S' is dD(dD,dd)n(d)S.


50: Description 25


For any legitimate set variable, S, and any net, n:DT where D is any directed set and T is any topological space, 'n is eventually in S' is legitimate.


51: Proof 25


'n is eventually in S' is dD(dD,dd)n(d)S.


52: Description 26


For any legitimate set variables, p,S1,S2,...,Sn, pS1S2...Sn is legitimate.


53: Proof 26


'pS1S2...Sn' is 'pS1pS2...pSn'.


54: Description 27


For any legitimate set variables, p,S, and any legitimate function variable, f, 'psSf(s)' is legitimate.


55: Proof 27


'psSf(s)' is 'sS,pf(s)'.


56: Description 28


For any legitimate set variable, p, and any ordinal number variable, o, pVo, where Vo means the set of sets defined by V0=,Vo=ooPowVo, is legitimate.


57: Proof 28


'pVo' is 'δ,δ is an ordinal number' ,oδ,SV,V is a function from δ to S,αδ,V(α)=ααPowV(α),pV(o)'.


58: Description 29


For any legitimate set variable, p, 'p is grounded' is legitimate.


59: Proof 29


'p is grounded' is 'o,o is an ordinal number ,pVo'.


60: Description 30


For any legitimate set variables, p,S, 'p=rankS' is legitimate.


61: Proof 30


'p=rankS' is 'p is an ordinal number SVp¬(op,SVo)'.


62: Description 31


For any legitimate set variables, p,S, 'pS' is legitimate.


63: Proof 31


'pS' is '¬pS'.


64: Description 32


For any legitimate set variable, S, 'S is an open interval on R' is legitimate.


65: Proof 32


'S is an open interval on R' is 'p1,p2(p1,p2Rp1,p2Sp1p2p3R(p3Sp1<p3<p2))'.


66: Description 33


For any legitimate set variable, S, 'S is a closed interval on R' is legitimate.


67: Proof 33


'S is a closed interval on R' is 'p1,p2(p1,p2Rp1,p2Sp1p2p3R(p3Sp1p3p2))'.


68: Description 34


For any legitimate set variable, S, 'S is a left-open-right-closed interval on R' is legitimate.


69: Proof 34


'S is a left-open-right-closed interval on R' is 'p1,p2(p1,p2Rp1Sp2Sp1p2p3R(p3Sp1<p3p2))'.


70: Description 35


For any legitimate set variable, S, 'S is a left-closed-right-open interval on R' is legitimate.


71: Proof 35


'S is a left-closed-right-open interval on R' is 'p1,p2(p1,p2Rp1Sp2Sp1p2p3R(p3Sp1p3<p2))'.


72: Note


All the text books I have read (I do not say all the text books in the world) is like "Any formula has to be legitimate." and begin to present formulas that are not so obvious how they are legitimate, at least for me. For example, they begin to use {...} which is not any elementary component.

So, I had to list what compounds could be safely used in legitimate formulas.

Of course, those listed above are only what I have particularly noticed so far.


References


<The previous article in this series | The table of contents of this series | The next article in this series>