Pattern Recognition on Oriented Matroids by Andrey O. Matveev
Author:Andrey O. Matveev [Matveev, Andrey O.]
Language: eng
Format: mobi, pdf
Publisher: De Gruyter
Published: 2017-07-26T21:00:00+00:00
Hence, eq. (5.43) follows.
We conclude this section by applying standard techniques from the poset theory to the lattice (P) and to the (X, k)-blocker map.
Proposition 5.34. Let Pbea finite bounded poset.
(i) The composite map
is a closure operator on the lattice of antichains (P).
(ii) The poset is a self-dual lattice; the restriction map is an anti-automorphism of is a sub-meet-semilattice of the lattice (P).
(iii) For any its preimage under the (X, k)-blocker map is a convex sub-join-semilattice of the lattice (P). The greatest element of is
Proof. In view of Lemma 5.32(ii) and Lemma 5.33, the assertions (i) and (ii) follow from the well-known results on closure operators.
To prove assertion (iii), pick arbitrary elements where for some A ∈ (P), and note that If is the greatest element of is the one-element subposet Finally, if B is a nontrivial antichain of P, then by eq. (5.44) the element is the greatest element of Since the (X, k)-blocker map is order-reversing, we see that the subposet of (P) is convex.
Download
Pattern Recognition on Oriented Matroids by Andrey O. Matveev.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12881)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10210)
Hello! Python by Anthony Briggs(10131)
The Mikado Method by Ola Ellnestam Daniel Brolund(10020)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9988)
Dependency Injection in .NET by Mark Seemann(9524)
Hit Refresh by Satya Nadella(9001)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8532)
The Kubernetes Operator Framework Book by Michael Dame(8273)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8061)
Practical Computer Architecture with Python and ARM by Alan Clements(8007)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7986)
Robo-Advisor with Python by Aki Ranin(7980)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7921)
Grails in Action by Glen Smith Peter Ledbrook(7891)
Building Low Latency Applications with C++ by Sourav Ghosh(7870)
Svelte with Test-Driven Development by Daniel Irvine(7863)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7858)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7780)