Next Article in Journal
Improving Risk Assessment Model for Cyber Security Using Robust Aggregation Operators for Bipolar Complex Fuzzy Soft Inference Systems
Previous Article in Journal
New Memory-Updating Methods in Two-Step Newton’s Variants for Solving Nonlinear Equations with High Efficiency Index
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Apriorics: Information and Graphs in the Description of the Fundamental Particles—A Mathematical Proof

1
Shenkar College of Engineering, Ramat Gan 5252628, Israel
2
Department of Electrical and Electronic Engineering, Faculty of Engineering, Kiryat Hamada POB 3, Ariel 40700, Israel
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(4), 579; https://doi.org/10.3390/math12040579
Submission received: 10 January 2024 / Revised: 7 February 2024 / Accepted: 9 February 2024 / Published: 15 February 2024
(This article belongs to the Section Mathematical Physics)

Abstract

:
In our earlier work, we suggested an axiomatic framework for deducing the fundamental entities which constitute the building block of the elementary particles in physics. The basic concept of this theory, named apriorics, is the ontological structure (OS)—an undirected simple graph satisfying specified conditions. The vertices of this graph represent the fundamental entities (FEs), its edges are binary compounds of the FEs (which are the fundamental bosons and fermions), and the structures constituting more than two connected vertices are composite particles. The objective of this paper is to focus the attention on several mathematical theorems and ideas associated with such graphs of order n, including their enumeration, showing what is the information content of apriorics.
MSC:
05C90; 81V25

1. Introduction: The Use of Simple Graphs in the Description of the Fundamental Entities

Apriorics is an attempt to describe the fundamental building block of physical reality in terms of graph theory and information. The philosophical basis of apriorics was dealt with in [1], in which apriorics was connected to structuralism, a philosophical approach denying inherent meaning to any notion, and interprets each and everything solely in terms of its connections to other things. Here, we are more concerned with the mathematical aspects of the theory and less with the philosophical aspects. Hence, we focus our attention on proofs and rigorous mathematical derivations.
To be sure, also the General Theory of Information, as a multidisciplinary framework, seeks to understand and quantify information in various contexts. Proposed by physicist Giancarlo Ruffo, it builds on the foundational work of Claude Shannon’s information theory. This theory goes beyond traditional concepts of information, extending to complex systems, thermodynamics, biology, and even the quantum realm. It explores the role of information in shaping the behavior and organization of systems, emphasizing the link between entropy, complexity, and information. By doing so, the General Theory of Information provides a comprehensive perspective on how information is a fundamental element in the fabric of our universe, impacting diverse scientific domains [2,3,4,5,6,7,8,9,10,11]. Notice, however, that the General Theory of Information cannot predict the correct number of fundamental fermions and fundamental gauge bosons and the three fundamental interactions in the way that apriorics does, as is described below.
Category theory is a branch of abstract mathematics that focuses on studying relationships and structures in a generalized way. It deals with objects and morphisms (arrows) between them, emphasizing their properties and how they interact, rather than specific elements. Categories provide a framework for understanding diverse mathematical and scientific concepts, including algebra, topology, and logic. By abstracting the commonalities between different mathematical structures, category theory promotes a deeper understanding of mathematical concepts and their universal principles. Its broad applicability extends beyond mathematics, finding use in computer science, physics, and other fields for modeling and reasoning about complex systems [12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31]. However, category theory does not predict the correct number of fundamental fermions and fundamental gauge bosons and the three fundamental interactions in the way that apriorics does.
Of course, graph theory has a much wider application domain with respect to apriorics. Graph theory, being a branch of mathematics, has numerous real-life applications across various fields. Here are some examples:
  • Social networks: Graph theory is extensively used in social network analysis to model relationships between individuals or entities. It helps analyze connectivity patterns, identify influential nodes (people), and understand information flow within networks like Facebook, Twitter, or LinkedIn.
  • Transportation networks: Graphs model transportation systems such as road networks, railway lines, and airline routes. Graph algorithms optimize routes, schedule public transportation, and analyze traffic flow, contributing to urban planning and logistics management.
  • Telecommunications: Graph theory aids in designing communication networks, including the internet, mobile networks, and satellite communication systems. It optimizes data routing, analyzes network robustness, and ensures efficient transmission of information.
  • Epidemiology: Graphs model disease spread within populations, with nodes representing individuals and edges representing contacts or interactions. Graph analysis helps track and predict disease outbreaks, assess vaccination strategies, and identify key factors influencing transmission.
  • Biology and genetics: Graph theory is used to model biological systems such as protein–protein interaction networks, metabolic pathways, and gene regulatory networks. It aids in understanding biological processes, identifying essential genes or proteins, and predicting drug targets.
  • Computer networks: Graphs represent computer networks, with nodes as devices (computers and routers) and edges as connections (links and cables). Graph algorithms optimize network routing, detect network intrusions, and ensure robustness and reliability of communication systems.
  • Recommendation systems: Graph theory underlies recommendation algorithms in e-commerce, streaming services, and social media platforms. It models user–item interactions and generates personalized recommendations based on similarities between users or items.
  • Operations research: Graph theory is applied in operations research to model complex systems; optimize resource allocation; and solve logistical problems such as the traveling salesman problem, network flow problems, and facility location problems.
  • Chemistry and molecular biology: Graph theory represents molecular structures and chemical compounds, aiding in drug discovery, molecular modeling, and understanding chemical reactions. It helps analyze molecular interactions, predict compound properties, and design novel drugs.
  • Image processing and computer vision: Graph-based techniques are used in image segmentation, object recognition, and pattern recognition. Graph algorithms extract features from images, analyze image similarity, and enhance image understanding in various applications, including medical imaging and surveillance systems.
These examples demonstrate the versatility and applicability of graph theory in addressing complex real-world problems across diverse domains.
Attack graphs are graphical representations used in cybersecurity to model and analyze potential threats and vulnerabilities in a computer network. Here is how one can model threats using attack graphs:
  • Identify assets and vulnerabilities:
    Begin by identifying the assets within the network that need to be protected, such as servers, databases, and sensitive data.
    Identify potential vulnerabilities in the network, including software vulnerabilities, misconfigurations, weak passwords, and insecure network protocols.
  • Construct the attack graph:
    Represent the network as a graph, where nodes represent network components (e.g., hosts, routers, and switches) and edges represent possible attack paths between them.
    Start with an initial node representing the attacker’s entry point into the network.
    Add nodes and edges to the graph to represent the attacker’s progression through the network, exploiting vulnerabilities and gaining access to different components.
    Each node in the graph represents a state of compromise (e.g., gaining unauthorized access to a server), and each edge represents a specific attack path or exploitation technique.
  • Assign attack costs and probabilities:
    Assign costs or probabilities to edges in the graph to represent the difficulty or likelihood of a successful attack along that path.
    Factors influencing costs or probabilities may include the complexity of the attack, the strength of security measures in place, and the attacker’s skill level.
  • Analyze attack paths:
    Analyze the attack graph to identify critical paths that attackers could take to compromise sensitive assets.
    Identify common attack patterns and techniques used by adversaries to exploit vulnerabilities and move laterally within the network.
  • Mitigation and remediation:
    Use the attack graph analysis to prioritize security measures and allocate resources for mitigating vulnerabilities and reducing the risk of successful attacks.
    Implement security controls, such as firewalls, intrusion detection systems, and access controls, to disrupt or block potential attack paths identified in the graph.
    Continuously monitor and update the attack graph as new vulnerabilities are discovered or as the network configuration changes.
By modeling threats using attack graphs, organizations can gain insights into potential attack scenarios, prioritize security efforts, and enhance the resilience of their networks against cyber threats.
The computational complexity of using graphs in real-life applications can vary widely depending on the specific problem being addressed, the size and complexity of the graph, and the algorithms and techniques employed. Here are some considerations:
  • Graph representation: The complexity of representing a graph in memory depends on the number of vertices (nodes) and edges, as well as the data structures used. For sparse graphs, where the number of edges is relatively low compared to the number of vertices, adjacency lists may be more efficient than adjacency matrices.
  • Graph traversal: Algorithms for traversing graphs, such as depth-first search (DFS) or breadth-first search (BFS), have time complexities of O(V + E), where V is the number of vertices, and E is the number of edges. Traversal can become computationally expensive for large graphs or graphs with dense connectivity.
  • Shortest paths: Finding the shortest path between two vertices in a graph, using algorithms like Dijkstra’s algorithm or the Bellman–Ford algorithm, typically has a time complexity of O((V + E)logV) or O(VE), depending on the algorithm used and whether negative edge weights are allowed.
  • Graph connectivity: Determining graph connectivity, such as whether the graph is strongly connected or whether there exists a path between every pair of vertices, can be computationally intensive. Algorithms like Tarjan’s strongly connected components algorithm have a time complexity of O(V + E).
  • Graph coloring: Problems such as graph coloring, where vertices must be assigned colors such that no adjacent vertices share the same color, are known to be NP-hard. Finding an optimal coloring for an arbitrary graph can be computationally intractable, and heuristic approaches are often used in practice.
  • Maximum flow: Computing maximum flow in a graph, such as in network flow problems, can be solved efficiently using algorithms like the Ford–Fulkerson algorithm or the Edmonds–Karp algorithm, with a time complexity of O(V E2).
  • Graph clustering and community detection: Identifying clusters or communities within a graph involves partitioning the vertices into groups based on their connectivity patterns. Various algorithms exist for this task, such as the Louvain method or spectral clustering, with varying computational complexities depending on the approach.
In summary, the computational complexity of using graphs in real-life applications can range from linear time complexity for simple traversal algorithms to exponential or NP-hard complexity for more complex problems such as graph coloring or finding optimal solutions. Efficient algorithms, careful problem formulation, and leveraging problem-specific properties of the graph are essential for managing computational complexity in practical applications.
In previous works [1,32,33,34,35,36], a theory for the description of the fundamental entities, named apriorics, was suggested and elaborated. The predictions of this theory were compatible with experimental findings in elementary particle physics. In this theory, the fundamental entities (FEs) are the vertices in a simple undirected graph [37,38,39,40] called an ontological structure (OS), and they can be described by their internal connections defining the graph, without any needed reference to anything else. These nodes must satisfy the following five axioms (which are explained and justified in [32,33]):
(a)
Every node (vertex) must be connected to one other vertex (at least).
(b)
The connection between two nodes (vertices) is non-reflective (a node cannot connect to itself) and commutative (if node F1 is connected to node F2, it necessarily follows that F2 is connected to F1), but not necessarily transitive (if F1 is connected to F2 and F2 is connected to F3, it does not mean that F1 and F3 are connected).
(c)
Two nodes (vertices) can be connected by not more than one connection.
(d)
If two nodes (vertices), F1 and F2, are connected, then there must exist an additional third node (vertex), F3, connected to F1 and F2. F3 will be denoted the “mediator” between the nodes F1 and F2.
(e)
It is required that every two nodes (vertices) are different (the meaning of the word “different” is to be explained below) in terms of their connections to the other nodes (vertices).
In this paper, we show through mathematical proof that there is no ontological structure with less than seven nodes. We also show through construction that there are at least two distinct ontological structures with seven nodes. In addition, we show how the connections (edges) of those graphs can be mapped into the elementary particles (basic fermions and bosons) and how the properties of those connections (elementary particles) can be derived.
Thus, the information contained in the above set of axioms is equivalent to the information of the required particles (fundamental fermions and gauge bosons) in the standard model of elementary particles, as we show below.
The fifth axiom (axiom e) requires criteria to distinguish between two nodes (vertices) in the ontological structure (OS) graph by their connections to other nodes (vertices). The valency (number of connections) alone cannot serve to uniquely distinguish between two nodes (vertices) because, according to the equivalence theorem, every simple graph has at least two vertices of the same valency, so that axiom e will not be satisfied. An additional criterion, which might serve the purpose of distinction between two nodes (vertices), is given below:
Definition 1.
The significance set (SS) of vertex P is the set of all the valences of the nodes connected to P.
Figure 1 is given as an example. Let us look at SS(P1) =2,3,3,5, since P1 is connected to P2, P4, P5, and P6; and the valences of these nodes (vertices), which are given in parentheses in the figure, are, respectively, 3, 3, 2, and 5. By the same method, we derive SS (P5) = 4,5.
Definition 2.
The vertices P1 and P2 are considered equal; P1 = P2 if, and only if, they have the same valency and SS (P1) = SS (P2).
For example, in Figure 1, P3 ≠ P2. Both vertices have the same number of connections, 3, but they have different significance sets. SS (P2) = 3,4,5; and SS (P3) = 3,3,5.
Definition 3.
A simple, undirected graph respecting all five axioms, a to e, is to be named ontological structure (OS).
In the OS graph, every node corresponds to an FE, and every node connection (edge) corresponds to a binary combination of FEs which will be mapped to an elementary particle. The order of an OS is the number of nodes in the graph. Since each node corresponds to an FE, it is expected that the simplest description of physical reality will correspond to the OS with the lowest number of nodes.

2. Examples

It is shown in the subsequent section that the lowest-order OS graphs each contain seven vertices: two of them, designated O1(7) and O2(7), are shown in Figure 2 and Figure 3, respectively. The valency (V) and the significance sets (SSs) of the vertices included in these graphs are listed in Table 1 and Table 2.
In this paper, apriorics is shown to predict that there is no ontological structure (graph) with less than seven nodes (FEs). It is also shown through construction that there are at least two different graphs of order seven. Those are two of the simplest sub-universes, which are denoted by O1(7) and O2(7). The number of edges in O1(7) is 12, so that the universe containing this OS has 12 fermion elementary particles. The number of connections in O2(7) is thirteen, so that the universe containing this OS has thirteen elementary particles (bosons). This result does not contradict the known elementary particle physics. No other axiomatic theory in physics predicts the observed numbers of particles. Of course, one may claim it to be a pure coincidence; however, we show later that other characteristics of elementary particles can also find parallels in apriorics.
Larger graphs of the OS type can be easily constructed. For example, an OS of order eight can be obtained from O1 (7) (or O2(7)) by adding the eighth vertex, P8 (or Q8), and joining it to several nodes of O1 (7) (or O2(7)). Of course, the set of nodes of O1(7) connected to P8 must be selected such that axioms a to e are satisfied. An example of such a procedure is O1(7→8; 1,6), for which O1(7) is enlarged to a graph of order eight by adding an eighth FE (node) and connecting it to the nodes P1 and P6. Table 3 gives the V and the SS of the vertices of this OS.
Each of such augmented graphs shows the way to a universe containing multiple sub-graphs of seven elements representing our own universe. One can further continue this enlargement process by creating ontological structures of order nine from those of order eight and so on.
The adjacency matrix, A, (defined as aij = 1 iff vertex i is connected to vertex j; otherwise, aij = 0) can be used to calculate the number of the binary compounds (elementary particles) and triple compounds (composite particles) of these and other possible OS graphs. In particular, since the sum of diagonal elements of the square of the A matrix A2 are the number of connections of the nodes, the number of edges of the graph (number of binary compounds or elementary particles) is half of trace(A2). The number of triangles (that is, composite particles combined from three nodes) is sixth of trace(A3).
An ontological structure graph of significance is the one with an infinite number of nodes—O. It is created by the following method: we denote the nodes of this graph by A1,A2,A3, ……An, …, and we define the number of connections (valency) of these nodes by V(Ai) = i + 1. According to Definition 2, all the vertices are different from one another since they have different valences (SN). An example of a graph satisfying this requirement and axioms a to e is depicted in Table 4 and in Figure 4.
Table 4 was calculated as follows. Node k = 1 is connected to nodes 2 and 3. Let j be the number of the row in which the vertex k ≥ 2 appears in the first time. The vertex k is connected to all the vertices between j and k + j + 1, except the vertex k (since a vertex cannot be connected to itself, as the connections are nonreflective). Thus, the 5th node (k = 5) is joined to all the nodes between 3 and 9 (3, 4, 6, 7, 8, and 9), since the row number in which node 5 appears initially would be j = 3.
It was demonstrated [35] that the infinite set of nodes, A1, A2, …, An, respects axioms a to e and is thus an OS.
It was argued [35] that this ontological structure imparts a novel description of the space–time manifold (which only appears continuous on a scale much larger than the ontological structure scale) that yields interesting derivations, such as the exponential expansion of a matter-less universe.
For the convenience of the reader, Table 5 summarizes the mentioned terms in apriorics and their corresponding terms in the theory of graphs.
The notion of scientific data described in terms of structures was suggested by Worrall [41] and further elaborated by Psillos [42]. Kantorovich [43] emphasized the importance of describing elementary particle physic symmetries in terms of structures, and French and Ladyman [44] argued that the structuralism notion always involves a shift in attention away from entities to the structures in which they exist. According to this point of view, the structure is ontologically prior to the entities (substructures) which are a part of it.

3. Characteristics of OS Graphs

An interesting problem is the construction of the graphs of all possible OSs of a given order, n. The goal of obtaining a general solution to this problem has not been achieved yet, and we hope that experts in the enumeration of graphs satisfying specified conditions [15] will be able to help in this endeavor. We believe that the following concepts and theorems have some potential in resolving this problem.
In the subsequent theorems and proofs, we use the following notations:
V(P) denotes the valency of the vertex P.
O(n)—OS graph of order n satisfying axioms a to e.
The multiplicity of k, mk, is the number of vertices having valency k. (See Definition 4).
The index I of O(n) is the number of vertices in the OS having different valency. (See Definition 5).
Theorem 1.
Let the vertices of O(n) be P1, P2, …, Pn. Let Ki = V(Pi) (1 ≤ i ≤ n). If max(Ki) < n − 1, then it is possible to enlarge the O(n) to O(n + 1) by adding the vertex Pn+1* and by connecting it to all the n vertices of O(n).
Proof.
Let us denote by P1*, P2*, …, Pn* the vertices P1, …, Pn when they are connected to Pn+1*. It is clear that V(Pi*) =V(Pi) + 1 for 1 ≤ i ≤ n. We have to show that the set of the vertices P1*, P2*, …Pn+1* satisfies the basic axioms, a to e. The proof of the validity of axioms a to c is trivial. Since Pn+1* is connected to all the n vertices, axiom d is satisfied for Pn+1*. The fact that the set P1, …., Pn is an OS guarantees that axiom d is satisfied also for the vertices P1*, …, Pn*. Now, let us turn to axiom e. It is clear that V(Pn+1*) ≠ V(Pi*) for every i ≤ n. Since we assumed that max{ V(Pi) } < n 1, then max{ V(Pi*) } < n. It is easy to show that, for every two vertices, Pi* and Pj* in O(n + 1) (1 ≤ i ≠ j ≤ n) Pi*≠Pj* (because Pi ≠ Pj in O(n).), so that axiom e is satisfied for all the vertices of O(n + 1). □
As a result of Theorem 1, we obtain the following theorem:
Theorem 2.
In O(n), if max{V(Pi)} = n − 1, (1 ≤ i ≤ n), then by adding the vertex Pn+1* and by connecting it to all the other vertices, we do not obtain an OS.
Proof.
Suppose that V(Pk) = n 1; then, V(Pk*) = n = V(Pn+1*). Also, since Pk* and Pn+1* are connected to all the other vertices, they have the same SS, so that Pk* = Pn+1*, and axiom e is not satisfied. □
A magnitude of some use in the analysis of OS is the multiplicity of a valency, V, defined as follows.
Definition 4.
In O(n), the vertices having the same valency shall be called equivalent vertices. The number of vertices, mk, having V = k shall be called the multiplicity of k.
Example 1.
The multiplicities of the vertices of the OS O1(7) and O2(7) discussed in the previous section are given in Table 6.
Definition 5.
The index of O(n), I, is the number of vertices in the OS with a different valency.
Example 2.
In 01(7), I = 4 since there are 4 different equivalent subsets corresponding to the valencies 2, 3, 4, and 5. In O2(7), I = 5.
One direction towards the solution of the problem formulated above is to find analytical expressions of mk as a function of k and n. Let us turn now to a few theorems concerning this issue.
Theorem 3.
(a) Σimi = n. (b) 1/2·Σ i mi·i = N. Here, N is the number of edges in the OS considered.
The proof of this theorem emerges directly from Definitions 4 and 5.
Example 3.
For O1(7), 1/2·∑imi·i = 1/2·(2·2 + 2·3 + 1·4 + 2·5 + 0·6) = 12. For O2(7), 1/2·∑imi·i = 1/2·(2·2 + 1·3 + 2·4 + 1·5 + 1·6) = 13 (see Table 1 and Table 2).
Theorem 4.
In O(n), mn−1 ≤ 1.
Proof.
The theorem states that, in the OS of order n, the maximum number of vertices having n − 1 connections (i.e., connected to all the other vertices) is 1. Suppose that for the two vertices, Pk and Pi, we have V(Pk) = V(Pi) = n − 1. Then, since both Pk and Pi are connected to all the other vertices, they have the same SS, such that Pk = Pi, in contradiction to axiom e. □
Theorem 5.
In O(n), if V(Pk) = V(Pi) = n − 2, then Pk must be connected to Pi.
Proof.
If Pk is not connected to Pi, then it must be connected to all the other n − 2 vertices. The same goes for the vertex Pi. (Since Pk and Pi have valency equal to n − 2.) So, both SS(Pk) = SS(Pi) and Pk = Pi are in contradiction to axiom e. □
Theorem 6.
In O(n) mn−2 ≤ n/2.
Proof.
Let us divide the set of the n vertices P1, …, Pn into two subsets: (a) the set containing all the mn−2 interconnected vertices having valency equal to n − 2 and (b) the set of all the other n − mn−2 vertices. Each vertex of set (a) has to be connected to n − 2 − (mn−2 − 1) =n − mn−2 − 1 vertices of set (b) (since it is connected to the mn−2 − 1 valency equal to n − 2, according to Theorem 5). Hence, each vertex of set (a) has to be connected to all the n − mn−2 vertices of set (b), except one (the “unpaired” one). In order that all the vertices of set (a) will have different SSs (otherwise, part of them would be equal, in contradiction to axiom e), they must be different in the vertex to which they are not connected (the “unpaired”). Hence, the number of different vertices in set (a) cannot be greater than the number of possible “unpaired” vertices, n − mn−2. We then have mn−2 ≤ n − mn−2 or mn−2 ≤ n/2. □
Example 4.
In O1(7) and in O2(7), n = 7, so that m5 ≤ 3.
Theorem 7.
In O(n), if mn−1 = 1, then mn−2 ≤ (n − 1)/2.
Proof.
According to Theorem 6, every vertex of set (a) (defined in the proof of the previous theorem) has to be connected to the other mn−2 − 1 vertices of this set, and, since mn−1 = 1, it also has to be connected to the vertex having V = n − 1. Hence, every vertex of set (a) is connected to those mn−2 vertices. Since its V = n − 2, it has to be connected to n − 2-mn−2 vertices having a valency different from n − 2 or n − 1. The number of vertices of set (b) is n 1 − mn−2. Therefore, every vertex of set (a) has to be connected to all the n − mn−2 − 1 vertices of set (b), except one (the “unpaired” one). In order that all the vertices of set (a) will be different (according to axiom e), they must be different in the vertex to which they are not connected (the “unpaired”). Hence, the number of different vertices in set (a) cannot be greater than the number of possible “unpaired” vertices, n − mn−2 − 1. We then have mn−2 ≤ n − mn−2 − 1 or mn−2 ≤ (n − 1)/2. □
Theorem 8.
In O(n), if V(Pk) = V(Pi) = 2, then Pk cannot be connected to Pi.
Proof.
If Pk is connected to Pi, then, according to axiom d, there exists a mediator vertex, Pm, connected to both Pk and Pi. Let V(Pm) = x; then, SS(Pk) = 2,x. SS(Pi) = 2,x., so that Pk = Pi, in contradiction to axiom e. □
Theorem 9.
If mn−1 = 1, then m2 ≤ min{(n − 1)/2, I − 2}.
Proof.
Let set (a) be the set of all the m2 vertices having V = 2 and (b) be the set of all the other n- m2 vertices. Every vertex of (a) has to be connected to 2 vertices of (b) according to Theorem 8. Now, if mn−1 = 1, then every vertex of (a) must be connected to the vertex Pn−1, having V = n − 1, so that the number of possibilities of choosing the second vertex of the pair is n − m2 − 1, and so that m2 ≤ n − m2 − 1 or m2≤ (n − 1)/2. Also, every vertex of set (a) must be connected to a vertex with different valency of set (b) (since it is already connected to the vertex having valency equal to n − 1). The number of such subsets of vertices with different valency, excluding Pn−1, which is a subset of its own and the subset of vertices having V = 2, is I − 2, so that m2 ≤ I − 2. Hence, m2 ≤ min{(n − 1)/2, I − 2}. □
Theorem 10.
In O(n), if V(P) = 3 and P is connected to the vertices P1, P2, and P3, then one of these vertices, say P2, has to be connected to the other two and satisfy the condition v(P2) > 3.
Proof.
According to axiom d, if P1 is connected to P, then there must be another vertex connected to P and P1. Let this vertex be P2. The same goes for P3, which must be connected either to P1 or to P2. Hence, there is a vertex (from P1, P2, and P3) connected to the other two. Now, if this vertex is P2 and V(P2) = 3, then SS(P) = SS(P2) = 3,x,y, where x = V(P1) and y = V(P3), and P = P2. So, there exists at least one other vertex connected to P2; hence, V(P2) > 3. □
Theorem 11.
In O(n), if V(P) = 3, then P cannot be connected to more than one vertex having V = 2.
Proof.
Suppose that P is connected to P1, P2, and P3 and let V(P1) = V(P3) = 2 and V(P2) = x > 3 (according to the previous theorem). According to Theorem 10, the only possible connection of P to P1, P2, and P3 satisfies SS(P1) = SS(P3) = 3,x. So, P1 = P3, in contradiction to axiom e. □
Theorem 12.
If V(P) = 2, then P cannot be connected to more than one vertex having V = 3.
Proof.
Let P be connected to P1 and P2, and V(P1) = V(P2) = 3. According to axiom d, P1 and P2 have to be connected to each other, since if P and P1 are connected, there must be a vertex connected to both, but since V(P) = 2, this third vertex must be P2. According to Theorem 10, P1 has to be connected to P3, having V = x > 3. However, since P1 and P3 are connected, then according to axiom d, there must be a third vertex connected to both. Now, since P1 already has three connections (P, P2, and P3), no additional vertex can be connected to P1; hence, this mediator can be either P or P2. However, P has two connections already and can have no more. Thus, P3 must be connected to P2 so that SS(P1) = SS(P2) = 2,3,x, in contradiction to axiom e. □
Theorem 13.
There cannot exist an OS of the order n = 3.
Proof.
According to axioms a and d every vertex has to be connected to at least two other vertices so that all the three vertices in the graph have to be connected to each other. Hence the three vertices have the same valency = 2, and the same SS = 2,2. Thus, they are equal in contradiction to axiom e. □
Theorem 14.
There cannot exist an OS of order n = 4.
Proof.
In this case, the valency of the vertices can be 2 or 3. According to Theorem 10, the existence of a vertex having V = 3 is impossible since it necessitates the existence of a vertex having V greater than 3. Hence, all vertices must have V = 2. But according to Theorem 8, the connections between these vertices cannot be realized. □
Theorem 15.
There cannot exist an OS of order n = 5.
Proof.
Case 1: m4 = 0. According to the Theorem 6, m3 ≤ 2. Also, m2 ≤ 1 because the only available connections for a vertex having V = 2 are to two vertices having V = 3 (see Theorem 8). So, m2 + m3 + m4 ≤ 3 is in contradiction to Theorem 3a, claiming that this sum should be equal to n = 5. □
Case 2: m4 = 1. According to the Theorem 7, m3 ≤ 2. According to Theorem 9, m2 ≤ I − 2 = 1. (In this case I = 3 since there are three equivalent sets of vertices having V = 2,3,4.) Hence, m2 + m3 + m4 ≤ 1 + 2 + 1 = 4 < 5, in contradiction to Theorem 3(a). □
Theorem 16.
There cannot exist an OS of the order n = 6.
Proof.
According to Theorem 4, m5 = 0,1. Let us examine these two possibilities.
Case A.
m5 = 0.
According to Theorems 8 and 12, the only possible SS for the vertices having V = 2 are 3,4 and 4,4, so that m2 ≤ 2.
Let us show now that m4 ≠ 0. If m4 = 0, then m2 = 0 because none of the two possibilities discussed above for the vertices having V = 2 can exist. Hence, according to 3(a), m3 = 6. However, this is impossible due to Theorem 10, which prevents m3 vertices from being connected among themselves. Therefore, m4 ≠ 0.
Let us show now that m4 ≠ 1. If m4 = 1, then there is one possible SS for the vertices having V = 2, namely SS = 3,4, so that m2 = 1. According to Theorem 3(a), we obtain m3 = 6 − 1 − 1 = 4. This result is impossible since, according to Theorems 10 to 12, there are only two possible SSs for the vertices having V = 3: 2,3,4 and 3,3,4, so that m3 must be equal to 2 and not to 4. Hence, m4 ≠ 1.
Since m4 ≤ 3 (Theorem 6), let us consider the case in which m4 = 3. According to Theorem 5, the only possible SS for the vertices having V = 4 are 4,4,2,2; 4,4,3,2; and 4,4,3,3. However, these three possibilities cannot be realized since, in this case, the OS will include seven vertices (having valences equal to 2, 2, 3, 3, 4, 4, and 4) instead of 6. Therefore, m4 ≤ 2. Since we proved that m4 ≠ 0,1, there is only one possible value to m4, namely m4 = 2.
Let us show now that m2 ≠ 0. If m2 = 0, since m4 =2, then m3 = 4 (Theorem 3(a)). But this is impossible since, according to Theorem 10, there are only three possible SSs for the vertices having V = 3: 4,4,4; 3,4,4; and 3,3,4. Therefore, since m2 ≤ 2, we obtain m2 = 1,2.
We now show that m2 ≠ 1, so that m2 = 2
If m2 = 1, then (since we found that m4 = 2) m3 = 6 − 2 − 1 = 3. The handshaking lemma is a consequence of the degree sum formula, according to which the sum of the degrees (the numbers of times each vertex is touched) equals twice the number of edges N in the graph. Specifically, this means that, in the apriorics n = 6 case, we have the following (Theorem 3(b)):
i = 2 5 i   m i = 2 N
Since according to axiom d, m1 = 0 and according to axiom a, m0 = 0 this implies the following:
3   m 3 + 5   m 5   = even
Now, this is in clear contradiction to m 3 = 3 ,   m 5 = 0 ; thus, this case cannot occur.
So that m2 ≠ 1. Since we found that m2 ≤ 2 and m2 ≠ 0 we obtain m2 = 2.
We have then to find an OS of order 6 having the following multiplicities: m5 = 0, m4 = 2, m2 = 2 and m3 = 6 – 2 − 2 = 2. Let the vertices of this OS be denoted as follows: P1(4), P2(4), P3(3), P4(3), P5(2), and P6(2)—see Figure 3-1c. According to Theorem 5 P1(4) is connected to P2(4). The possible SS values for these 2 vertices are, respectively: SS = 2,2,3,4, and SS = 2,3,3,4. Hence P1(4) is connected to the 3 vertices—P3(3), P5(2) and P6(2). And P2(4) is connected to three vertices say P6(2) and P3(3), P4(3).
Now P5(2) and P6(2) cannot be connected according to theorem 8. Hence according to axiom d at least one of the vertices having V = 2, say P5(2), must be connected to P3(3) (The mediator between P5(2) and P1(4) must be one of the vertices already connected to P1(4) as all its connections are already allocated. It cannot be P6(2) due to Theorem 8 and it cannot be P2(4) which has only one V = 2 vertex in its SS structure and this is P6(2)). Since P2(4) is connected to P4(3) (circled in the figure), then according to axiom d they both have to be connected to their mediator, but this is impossible since the structure includes already six vertices and all the other vertices, except P4(3), are fully connected in accordance with their valence.
We see then that the attempt to design an OS satisfying the above-mentioned conditions (m2 = m3 = m4 = 2) results in contradiction.
Case B.
m5 = 1.
In this case, m4 ≤ 2 (Theorem 7). Also, m2 ≤ 2 because the only possible SSs for the vertex having V = 2 are 5,4 and 5,3 (since these vertices must be connected to the vertex having V = 5, and according to Theorem 8, they cannot be connected to each other). Hence, if m4 = 0, then m2 = 1, and according to Theorem 3, m3 = 4. But this result is impossible since, according to Theorems 10 and 12, there are only two possible SSs for the vertices having V = 3; SS = 5,3,3; and SS = 5,3,2. Hence, m4 ≠ 0, so that m4 = 1,2.
Let us show now that m2 ≠ 0. Suppose that m2 = 0, since m4 ≤ 2 (Theorem 7) and m3 + m4 + 1 = 6 (Theorem 3) -> m3 = 5 m4; then, m3 ≥3. The only possible SSs for the vertex having V = 3 are 5,3,3; 5,4,3; and 5,4,4. But the case where SS = 5,3,3 is impossible. To show this, let us try to form an OS satisfying this condition. Let V(P1) = 3 and SS(P1) = 5,3,3. Let P1 be connected to P2, P3, and P4, where V(P2) = 3, V(P3) = 3, and V(P4) = 5. P2 and P3 have to be connected to P4 (having V = 5). Since V(P2) = 3, and it is connected only to two vertices (P1 and P4), it has to be connected to an additional vertex, P5 (not to P3 because, in this case, SS(P3) = 5,3,3, the same as SS(P1)), and P5 has to be connected to P4. By the same token, P3 and P4 have to be connected to P6. Now, the only possible values of the V of P5 and P6 is 4 (since m2 = 0, and there are already three vertices having V = 3 and one vertex having V = 5). Therefore, SS(P2) = SS(P3) = 3,4,5. Hence, P2 = P3, in contradiction to axiom e.
We are left then with the following four possibilities: m2 = 1,2 and m4 = 1,2. For each of these cases, m3 = 5 − m2 m4, as 3   m 3 + 5   m 5   = even . It follows for m 5   = 1 that
3   m 3 = even - 5 = odd
Thus, m 3     2 . The remaining cases are given in Table 7.
We subsequently show that the attempt to design an OS satisfying the conditions of each row in this table always results in the contradiction of one of the axioms, a to e. Pay attention to the fact that, in all the cases discussed below, all the vertices have to be connected to P6(5).
Let us begin with the first row of Table 7, in which m2 = 1, m3 = 3, m4 = 1, and m5 = 1. Let us denote the vertices of the possible OS by P1(2), P2(3), P3(3), P4(3), P5(4), and P6(5). (The numbers in parentheses are the valences of the vertices). The possible SSs of P1(2) can be either SS = 4,5 or SS = 3,5. Let us discuss each of these cases separately.
Case 1.
SS(P1(2)) = 4,5.
In this case (see Figure 5d), P1(2) is connected to P5(4) and P6(5). Then, P5(4) is connected to P2(3), P3(3), and P6(5). Now, P2(3) and P3(3) have two connections (to P5(4) and P6(5)) instead of three, and the only available connection is to a vertex having V = 3. But such connections will yield that the SS of these vertices (circled in the figure) will be SS = 3,4,5, so that these two vertices will be equal, in contradiction to axiom e.
Case 2.
SS(P1(2)) = 3,5.
In this case (see Figure 5e), P1(2) is connected to P2(3) and P6(5). Then, P5(4) is connected to P2(3), P3(3), P4(3), and P6(5). (As noted earlier, all the vertices have to be connected to P6(5).) As a result, all the vertices are fully connected in accordance with their V, except the vertices having V = 3. P3(3) and P4(3) are circled in the figure. They each have only two connections instead of three. Trying to form a connection between these vertices will result in making them equal (they will both have SS = 3,4,5), in contradiction to axiom e.
The analysis of these two cases shows that it is impossible to design an OS satisfying the conditions of the first row of Table 7.
Let us examine now the second row in which m2 = 2, m3 = 1, m4 = 2, and m5 = 1. Let us denote the vertices of the possible OS by P1(2), P2(2), P3(3), P4(4), P5(4), and P6(5)—see Figure 5f. The possible SSs of P1(2) and P2(2) are, respectively, SS = 3,5, and SS = 4,5 since, as was indicated previously, they cannot be connected to each other. Hence, P1(2) has to be connected to P3(3) and P6(5), and P2(2) has to be connected to P4(4) and P6(5). At this stage, P5(4) has only two connections (to P6(5) and to P4(4)), and it cannot be connected to P1(2) and P2(2), which do not have any more available connections. Therefore, only P3(3) is available for connection. Hence, P5(4) and P4(4) (circled in the figure) each have only three connections instead of four. Hence, it is impossible to design an OS satisfying the conditions of the fourth row. □
Remark 1.
We described two OSs of order 7 in Section 2—O1(7) and O2(7)—satisfying the axioms of apriorics. There may be other OSs of order 7. The enumeration of all the OSs of order 7 and of higher orders is still an open problem in apriorics.

4. Properties of the Vertices of OS Graph

4.1. Introduction

In this section, we propose the notion of specifying properties to the nodes of the ontological structure (graph) determined uniquely by the nodes to which they are joined. This is demonstrated by analyzing the property combinations of the FE’s corresponding to the nodes of O1(7) and O2(7), which are discussed in Section 2.
How can the properties of a node (FE) be defined through its connections to the other nodes? According to the intuitive meaning of the relationship between the concept of a common property of two vertices and their connection, we can stipulate the following rules:
(a)
If two connected nodes in an ontological structure, V1 and V2, have a common property, f, then their mediator vertex connected to V1 and V2 (obligatory by axiom d) will be assigned the property f^ (complementary property).
Remark: The empirical meaning of f^ is that it facilitates the detection of f.
(b)
Two nodes of an ontological structure are joined if and only if either they have at least a common single property or one node has a complementary property of the other node.
(c)
A node in an ontological structure cannot have both a property and its complementary.
(d)
The set of properties of every node in an ontological structure must differ in at least a single property from the set of properties of any other node which is part of the same ontological structure.
Remark 2.
This rule is derived from axiom e, which requires that every two nodes be different.

4.2. Example: Intrinsic Properties of the Nodes of O1(7) and O2(7)

Following the rules specified above, the properties of the nodes belonging to O1(7) are as follows: (a) The first property, f1, is assigned to the fundamental entity P1, as shown in Figure 6. (b) Since P2 is not joined to P1, it cannot be given the same property, so that we assign to it the different property, f2. (c) P4 is not joined to P1 or to P2. Thus, an additional property, f3, is obligatory for its depiction. (d) P5 is joined to P2 and P4 so that it possesses their complementary properties, denoted as f2^ and f3^. Thus, we should note that there is freedom in this assignment of properties according to the rules elaborated above. However, this freedom will not affect the conclusions. (e) P7 is joined to P1 and P2 so that it is depicted by f1 and f2. Following the same procedure, we assign properties to other nodes, as clarified in Figure 6.
We observe that the minimal number of properties necessary for the ontological structure O1(7) is three. It can easily be demonstrated that this prediction is valid also for O2(7). The properties of O2(7) nodes are specified by g1, g2, and g3. To each of these properties, there is a complementary property, i.e., g1^, g2^, and g3^.
Table 8 and Figure 6 give the properties of the nodes of O1(7), and Table 9 and Figure 7 give those of the nodes of O2(7).
Apriorics predicts the three basic interactions corresponding to the three properties given in Table 8. This derivation is compatible with the existence of three fundamental interactions—electromagnetic, nuclear strong, and nuclear weak. These interactions bind the fundamental entities, thus forming the elementary and more complex particles.
Using Table 8, it is possible to give properties to the twelve binary compounds of O1(7) that are the twelve fermion elementary particles of the standard model. This mapping enables the classification of these particles according to their properties. These predictions of apriorics do not contradict the known empirical standard model of particle physics.
Using Table 9, it is also possible to assign properties to the thirteen binary compounds of O2(7) that are mapped to the thirteen known mediator particles (gauge bosons) that transfer the interaction between twelve elementary fermions. This designation enables the classification of these thirteen particles according to their properties. This prediction is again not contradicted by known empirical data [36].

5. Discussion: OS Graphs Used for Displaying Coreless Languages

In this paper, we described and analyzed a specified undirected simple OS graph and used it for the investigation of the fundamental entities and elementary and composite particles. We believe that these graphs can also be used in the holistic theory of knowledge [45,46] expressed in a certain language in which the meaning of every word and sentence is specified by the way it is joined to other words and sentences. Thus, it can be displayed as a graph of interconnected nodes corresponding to these words and sentences. Such a graph will have “core words” and “core sentences”, whose interpretation and truth are decided by elements which are beyond language. In our daily language, we have a multitude of core words representing objects existing in the real world. In the language used in empirical sciences, there exist a significant number of core sentences that have meaning dependent on observations and experiments. Mathematical theories depend on a core of fundamental notions joined via axioms whose justification lies externally. In each and every language, the core words and core sentences serve as means for specifying meaning to the other words and sentences of the language.
Can we contemplate a language without a core? Is it possible to imagine a language in which the meaning of its words (and sentences) will be specified solely by their interconnections?
We believe that the ontological structure is appropriate for displaying such a language, and the seven vertices of O1(7) and O2(7) can be thought of as the fundamental words in these simplest possible languages. The compounds of these nodes, which can be characterized by their properties, represent complex words and sentences.
In fact, every OS of order n represents a coreless language, including n basic words whose significance is derived solely from their interconnections. The compounds of these vertices define composite words and sentences in this language.

Author Contributions

Conceptualization, Y.S.; methodology, Y.S.; validation, Y.S. and A.Y.; formal analysis, Y.S. and A.Y.; writing—original draft preparation, Y.S.; writing—review and editing, A.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created in this study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shoshani, Y.; Yahalom, A. Apriorics and Structuralism. Found. Sci. 2020, 25, 281–296. [Google Scholar] [CrossRef]
  2. Tambuscio, M.; Ruffo, G.; Flammini, A.; Menczer, F. Fact-checking effect on viral hoaxes: A model of misinformation spread in social networks. In Proceedings of the 24th International Conference on World Wide Web 2015, Florence, Italy, 18–22 May 2015; pp. 977–982. [Google Scholar]
  3. Sulis, E.; Farías, D.I.H.; Rosso, P.; Patti, V.; Ruffo, G. Figurative messages and affect in Twitter: Differences between #irony, #sarcasm and# not. Knowl.-Based Syst. 2016, 108, 132–143. [Google Scholar]
  4. Lian, S.; Kanellopoulos, D.; Ruffo, G. Recent advances in multimedia information system security. Informatica 2009, 33, 3–24. [Google Scholar]
  5. Aiello, L.M.; Deplano, M.; Schifanella, R.; Ruffo, G. People are strange when you’re a stranger: Impact and influence of bots on social networks. In Proceedings of the International AAAI Conference on Web and Social Media 2012, Dublin, Ireland, 4–7 June 2012; p. 6. [Google Scholar]
  6. Aiello, L.M.; Ruffo, G. LotusNet: Tunable privacy for distributed online social network services. Comput. Commun. 2012, 35, 75–88. [Google Scholar] [CrossRef]
  7. Ruffo, G. Learning Single and Multiple Instance Decision Trees for Computer Security Applications. PhD’s Thesis, Department of Computer Science, University of Turin, Turin, Italy, 2000. [Google Scholar]
  8. Aiello, L.M.; Barrat, A.; Cattuto, C.; Ruffo, G.; Schifanella, R. Link creation and profile alignment in the aNobii social network. In Proceedings of the 2010 IEEE Second International Conference on Social Computing, Minneapolis, MN, USA, 20–22 August 2010; pp. 249–256. [Google Scholar]
  9. Crispo, B.; Ruffo, G. Reasoning about accountability within delegation. In Proceedings of the International Conference on Information and Communications Security 2001, Xi’an, China, 13–16 November 2001; pp. 251–260. [Google Scholar]
  10. Lai, M.; Patti, V.; Ruffo, G.; Rosso, P. Stance evolution and twitter interactions in an Italian political debate. In Proceedings of the Natural Language Processing, and Information Systems: 23rd International Conference on Applications of Natural Language to Information Systems, NLDB 2018, Paris, France, 13–15 June 2018. [Google Scholar]
  11. Lai, M.; Tambuscio, M.; Patti, V.; Ruffo, G.; Rosso, P. Stance polarity in political debates: A diachronic perspective of network homophily and conversations on Twitter. Data Knowl. Eng. 2019, 124, 101738. [Google Scholar] [CrossRef]
  12. Eilenberg, S.; Mac Lane, S. General theory of natural equivalences. Trans. Am. Math. Soc. 1945, 58, 247. [Google Scholar] [CrossRef]
  13. Eilenberg, S.; Mac Lane, S. Group Extensions and Homology. Ann. Math. 1942, 43, 757–831. [Google Scholar] [CrossRef]
  14. Marquis, J.-P. Category Theory. In Stanford Encyclopedia of Philosophy; Department of Philosophy, Stanford University: Stanford, CA, USA, 2019. [Google Scholar]
  15. Reck, E. The Prehistory of Mathematical Structuralism, 1st ed.; Oxford University Press: Oxford, UK, 2020; pp. 215–219. [Google Scholar]
  16. Baez, J.C.; Stay, M. Physics, Topology, Logic and Computation: A Rosetta Stone. New Structures for Physics. Lect. Notes Phys. 2010, 813, 95–172. [Google Scholar]
  17. Adámek, J.; Herrlich, H.; Strecker, G.E. Abstract and Concrete Categories; Heldermann: Berlin, Germany, 2004. [Google Scholar]
  18. Barr, M.; Wells, C. Category Theory for Computing Science, 3rd ed.; Reprints in Theory and Applications of Categories; Prentice Hall: New York, NY, USA, 2012; Volume 22. [Google Scholar]
  19. Barr, M.; Wells, C. Toposes, Triples and Theories; Reprints in Theory and Applications of Categories; Springer: Berlin/Heidelberg, Germany, 2005; Volume 12, MR 2178101. [Google Scholar]
  20. Borceux, F. Handbook of categorical algebra. In Encyclopedia of Mathematics and its Applications; Cambridge University Press: Cambridge, UK, 1994; pp. 50–52. [Google Scholar]
  21. Freyd, P.J. Abelian Categories; Reprints in Theory and Applications of Categories; Harper & Row: New York, NY, USA, 2003; Volume 3. [Google Scholar]
  22. Freyd, P.J.; Scedrov, A. Categories, Allegories; North Holland Mathematical Library: Amsterdam, The Netherlands, 1990; Volume 39. [Google Scholar]
  23. Goldblatt, R. Studies in logic and the foundations of mathematics. In Topoi: The Categorial Analysis of Logic; Elsevier: Dover, UK, 2006; Volume 94. [Google Scholar]
  24. Herrlich, H.; Strecker, G.E. Category Theory, 3rd ed.; Heldermann: Berlin, Germany, 2007. [Google Scholar]
  25. Kashiwara, M.; Schapira, P. Categories and Sheaves. In Grundlehren der Mathematischen Wissenschaften; Springer: Berlin/Heidelberg, Germany, 2006; Volume 332. [Google Scholar]
  26. Lawvere, F.W.; Rosebrugh, R. Sets for Mathematics; Cambridge University Press: Cambridge, UK, 2003. [Google Scholar]
  27. Lawvere, F.W.; Schanuel, S.H. Conceptual Mathematics: A First Introduction to Categories, 2nd ed.; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
  28. Leinster, T. Higher Operads, Higher Categories; Cambridge University Press: Cambridge, UK, 2004; p. 448. [Google Scholar]
  29. Leinster, T. Basic Category Theory. In Cambridge Studies in Advanced Mathematics; Cambridge University Press: Cambridge, UK, 2014; Volume 143. [Google Scholar]
  30. Lurie, J. Higher Topos Theory. In Annals of Mathematics Studies; Princeton University Press: Princeton, NJ, USA, 2009; Volume 170. [Google Scholar]
  31. Mac Lane, S. Categories for the Working Mathematician. In Graduate Texts in Mathematics, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 1998; Volume 5. [Google Scholar]
  32. Shoshani, Y. Introduction to Formal Ontology. In Philosophy of the Natural Sciences; Weingartner, P., Schurz, G., Eds.; Hölder-Pichler-Tempsky GmbH: Vienna, Austria, 1989; pp. 202–209. [Google Scholar]
  33. Shoshani, Y. Philosophical Origin of Quarks. Phys. Essays 1991, 4, 566–576. [Google Scholar] [CrossRef]
  34. Shoshani, Y. Apriorics and the Proliferation of Elementary Particles in Non-Interacting Universes. Phys. Essays 1998, 11, 512–520. [Google Scholar] [CrossRef]
  35. Shoshani, Y. Apriorics and a New Meaning of Space and Time. Phys. Essays 2010, 23, 285–292. [Google Scholar] [CrossRef]
  36. Shoshani, Y. The Emergence and Potential of Apriorics. Phys. Essays 2014, 27, 126–130. [Google Scholar] [CrossRef]
  37. Bondi, J.A.; Murty, U.S.R. Graph Theory (Graduate Texts in Mathematics); Springer: New York, NY, USA, 2008. [Google Scholar]
  38. Trudeau, R.J. Introduction to Graph Theory; Dover Publications: New York, NY, USA, 1993. [Google Scholar]
  39. Barabási, A.L. Network Science; Cambridge University Press: Cambridge, UK, 2016. [Google Scholar]
  40. Harris, J.; Hirs, J.L. Combinatorics and Graph Theory (Undergraduate Texts in Mathematics); Springer: New York, NY, USA, 2008. [Google Scholar]
  41. Worrall, J. Structural Realism: The Best of Both worlds? Dialectica 1989, 43, 99–124. [Google Scholar] [CrossRef]
  42. Psillos, S. Is Structural Realism Possible? Philip Stud. Suppl. 2001, 68, S13–S24. [Google Scholar] [CrossRef]
  43. Kantorovich, A. Ontic Structuralism and the Symmetries of Particle Physics. J. Gen. Philos. Sci. 2009, 40, 73–84. [Google Scholar] [CrossRef]
  44. French, S.; Ladyman, J. In Defense of Ontic Structural Realism. In Scientific Structures; Bokulich, P., Bokulich, A., Eds.; Springer: Ordrecht, The Netherlands, 2011; Chapter 2. [Google Scholar]
  45. Harary, F.; Palmer, E.M. Graphical Enumeration; Academic Press: New York, NY, USA, 1973. [Google Scholar]
  46. Young, J. Truth, Coherence, and the Vienna Circle. Synthese 1991, 86, 467–482. [Google Scholar] [CrossRef]
Figure 1. The significance set. Pi(k) means the node Pi is connected to k edges.
Figure 1. The significance set. Pi(k) means the node Pi is connected to k edges.
Mathematics 12 00579 g001
Figure 2. The OS O1(7).
Figure 2. The OS O1(7).
Mathematics 12 00579 g002
Figure 3. The OS O2(7).
Figure 3. The OS O2(7).
Mathematics 12 00579 g003
Figure 4. Connectivities of the nodes belonging to O .
Figure 4. Connectivities of the nodes belonging to O .
Mathematics 12 00579 g004
Figure 5. Graphs corresponding to the proof of Theorem 16. The subfigures demonstrate the impossibility of various ontological structures of order 6 as described in the text.
Figure 5. Graphs corresponding to the proof of Theorem 16. The subfigures demonstrate the impossibility of various ontological structures of order 6 as described in the text.
Mathematics 12 00579 g005
Figure 6. Properties of the vertices of O1(7).
Figure 6. Properties of the vertices of O1(7).
Mathematics 12 00579 g006
Figure 7. Properties of the vertices of O2(7).
Figure 7. Properties of the vertices of O2(7).
Mathematics 12 00579 g007
Table 1. The OS O1 (7).
Table 1. The OS O1 (7).
VertexVSS
P125,5
P224,5
P333,5,5
P433,4,5
P542,3,5,5
P652,3,3,4,5
P752,2,3,4,5
Table 2. The OS O2(7).
Table 2. The OS O2(7).
VSS
Q125,6
Q224,6
Q334,5,6
Q443,4,5,6
Q542,4,5,6
Q652,3,4,4,6
Q762,2,3,4,4,5
Table 3. The V and SS of the vertices of O1(7→8; 1,6).
Table 3. The V and SS of the vertices of O1(7→8; 1,6).
VertexVSS
P132,5,6
P224,5
P333,5,6
P433,4,6
P542,3,5,6
P662,3,3,3,4,5
P752,3,3,4,6
P823,6
Table 4. Connectivities of the vertices belonging to O.
Table 4. Connectivities of the vertices belonging to O.
Vertex No.Connected to Vertices
12,3
21,3,4
31,2,4,5
42,3,5,6,7
53,4,6,7,8,9
64,5,7,8,9,10,11
74,5,6,8,9,10,11,12
85,6,7,9,10,11,12,13,14
95,6,7,8,10,11,12,13,14,15
Table 5. Comparison of the terms used in apriorics and the corresponding terms in graph theory.
Table 5. Comparison of the terms used in apriorics and the corresponding terms in graph theory.
Terms in AprioricsTerms in Graph Theory
Ontological structure, OSUndirected simple graph satisfying axioms a to e
Fundamental entity (FE)Vertex
B compound (BC)Edge
Order of OSOrder of the graph
Number of BCsSize of the graph
Significance set (SS)See Definition 1
Equality between verticesSee Definition 2
Table 6. Multiplicities of the OS O1(7) and O2(7).
Table 6. Multiplicities of the OS O1(7) and O2(7).
Valency23456
O1(7) 22120
O2(7) 21211
Table 7. The possible multiplicities of the V = 2,3,4.
Table 7. The possible multiplicities of the V = 2,3,4.
V = 2V = 3V = 4
131
212
Table 8. Properties of the vertices of O1(7).
Table 8. Properties of the vertices of O1(7).
Properties
P1f1
P2f2
P3f1^,f3
P4f3
P5f2^,f3^
P6f1^,f2^,f3^
P7f1,f2
Table 9. Properties of the vertices of O2(7).
Table 9. Properties of the vertices of O2(7).
VertexProperties
Q1g1
Q2g2
Q3g3
Q4g1^,g3
Q5g2^,g3^
Q6g1^,g3^
Q7g1,g2,g3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shoshani, Y.; Yahalom, A. Apriorics: Information and Graphs in the Description of the Fundamental Particles—A Mathematical Proof. Mathematics 2024, 12, 579. https://doi.org/10.3390/math12040579

AMA Style

Shoshani Y, Yahalom A. Apriorics: Information and Graphs in the Description of the Fundamental Particles—A Mathematical Proof. Mathematics. 2024; 12(4):579. https://doi.org/10.3390/math12040579

Chicago/Turabian Style

Shoshani, Yakir, and Asher Yahalom. 2024. "Apriorics: Information and Graphs in the Description of the Fundamental Particles—A Mathematical Proof" Mathematics 12, no. 4: 579. https://doi.org/10.3390/math12040579

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop