Next Article in Journal
A Clustering Ensemble Framework with Integration of Data Characteristics and Structure Information: A Graph Neural Networks Approach
Previous Article in Journal
A Preventive Replacement Policy for a System Subject to Bivariate Generalized Polya Failure Process
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Collatz Attractors Are Space-Filling

by
Idriss J. Aberkane
1,2
1
UNESCO-UniTwin Complex Systems Digital Campus, ECCE e-Lab, Strasbourg Université, CEDEX, 67081 Strasbourg, France
2
Scanderia Online Education, 66 Avenue des Champs-Elysées, 75008 Paris, France
Mathematics 2022, 10(11), 1835; https://doi.org/10.3390/math10111835
Submission received: 5 May 2022 / Revised: 23 May 2022 / Accepted: 24 May 2022 / Published: 26 May 2022
(This article belongs to the Section Dynamical Systems)

Abstract

:
The algebraic topology of Collatz attractors (or “Collatz Feathers”) remains very poorly understood. In particular, when pushed to infinity, is their set of branches discrete or continuous? Here, we introduce a fundamental theorem proving that the latter is true. For any odd x, we first define A x n as the set of all odd numbers with S y r ( x ) in their Collatz orbit and up to n more digits than x in base 2. We then prove lim n | A x n | 2 n + c 1 with c > 4 for all x and, in particular, c = 0 for x = 1 , which is a result strictly stronger than that of Tao 2019.

1. Introduction

The Collatz conjecture—that all orbits of the 3 x + 1 discrete dynamical system reach 1—remains extremely relevant both to the fundamental study of ergodic number theory and to the applied one of chaotic cryptology. For example, Bocart 2018 [1] demonstrated that it could be successfully used to develop a readily applicable proof-of-work algorithm independent of large prime numbers for the cryptocurrency industry. In a previous publication [2], we studied and exhibited the particular geometry of the Collatz basins of attraction (hereunder, “attractors”) and connected it to the also difficult Furstenberg conjecture, of which the entire complexity lies in that “base 2 and base 3 representations share no common structure” (Furstenberg 1960 [3] and 1967 [4], and Shmerkin 2021 [5]). Collatz attractors, also known as “Collatz feathers” [6] or “Collatz seaweeds”, are forming complex quivers among natural numbers, but very little is still known of their particular geometry and topological properties. Here, we intend to simplify and extend the arithmetic and algebraic formalism we introduced in [2] (where the reader may find a more thorough bibliography) in order to obtain four fundamental lemmas and one fundamental theorem to break new ground in the study of the geometric algebra and, in particular, discrete algebraic topology of these otherwise mostly unknown structures.

2. Definitions

A few actions naturally appear in the study of Collatz attractors [2] so it is useful to abbreviate them all here. For all odd x,
  • S ( x ) : = 2 x + 1 . It is equivalent to “appending an end digit 1 to x in base 2”. S n (0) is, therefore the nth Mersenne number.
  • G ( x ) : = 2 x 1 . It is equivalent to “intercalating a digit 0 before the final digit 1 of x in base 2”. G n ( 3 ) is the ( n + 1 ) th Mersenne number + 2.
  • V ( x ) : = 4 x + 1 = G ( S ( x ) ) . It is equivalent to “appending an end pair of digits 01 to x in base 2”. V n ( 1 ) is the ( 2 ( n + 1 ) ) t h Mersenne number divided by 3.
  • D ( x ) : = 64 x + 49 .
  • A ( x ) : = 2 x 1 3 = G ( x ) 3 for x 2 mod 3 (we will note “x in [ 2 ] 3 ”).
  • C ( x ) : = 4 x 1 3 = S ( G ( x ) ) 3 for x 1 mod 3 (we will note “x in [ 1 ] 3 ”).
Furthermore:
  • x y is defined as “x and y have a common number in their Collatz orbit”. The relation is reflexive, transitive, and symmetric.
  • S y r ( x ) means “the first odd number in the forward Collatz orbit of x”.
  • A x is “the attractor of x” defined as all numbers with S y r ( x ) in their forward Collatz orbit. A x n stands for “the elements of A x with at most n more digits than x in base 2”.
  • A x ¯ denotes “the complement of set A x ”. | A x n | is the number of elements in A x n
  • The “closure of {x}” by any action is the set of all possible compositions of this action on x.
  • Let V x be the closure of { x } by V, and note V x n as its elements written at most with n more digits than x in base 2.
  • Let D x be the infinite sequence:
    { { x ; S ( x ) } ; { D ( x ) ; S ( D ( x ) ) } ; . . . ; { D k ( x ) ; S ( D k ( x ) ) } ; . . . } .
    We further define D x n as the elements of D x with at most n more binary digits than x.
  • We note [ x ] as “the binary length of x” and D [ x ] + k as “a D sequence starting with a number of binary length [ x ] + k
  • The “V-closure” of D x , noted as V D x , is the closure of this set by action V. The V-closure of each pair { a ; S ( a ) } in D x is called P a . Note that P a n always has exactly n elements. V D x n is, therefore, of the following form:
    { P x n ; P [ x ] + 6 n 6 ; . . . ; P [ x ] + 6 k n 6 k ; . . . }
  • A C ( V x ) is defined as an “action A on all elements of V x in [ 2 ] 3 and action C on all elements of V x in [ 1 ] 3 ”. Let us also note A C k + 1 ( x ) , action A C on the V-closure of A C k ( x ) and initiate with A C 0 ( x ) = x . Note that A C ( x ) is equivalent to A C ( V x ) , but we may use the latter when we want to specify a parameter n for the maximum binary length being considered.
  • The notation ⨆ as in k = 1 n x k is not understood as the general disjoint union but more simply as “ k = 1 n x k with each x k being already disjoint from the others”.

3. Preparatory Lemmas

Lemma 1
(Lemma of irreducibility). For all odd x, A x is the closure of { x } by actions A, C, and V. Each of its non-x element has a uniquely ordered, finite, and non-cyclic decomposition into actions A, C, and V from x, and the only possible cycle is from x to itself.
Proof. 
3 ( 4 x + 1 ) + 1 = 12 x + 4 = 4 ( 3 x + 1 ) so x V ( x ) as x is odd. As residue classes in base 3 are periodic by V, it always reaches numbers where actions C and A are applicable. If x is in [ 0 ] 3 , then V ( x ) is in [ 1 ] 3 and V 2 ( x ) in [ 2 ] 3 . Since 3 ( ( 2 x 1 ) 3 ) + 1 = 2 x , we have that for any x in [ 2 ] 3 , A ( x ) x , and since 3 ( ( 4 x 1 ) 3 ) + 1 = 4 x , we also have C ( x ) x for any x in [ 1 ] 3 .
For any x in [ 2 ] 3 , we could generalize action A to output the sequence ( 2 2 k 1 x 1 ) 3 for all k > 1 because all elements of such sequence also converge to S y r ( x ) , but we already have them counted in all iterations of action V over A ( x ) . The same goes for action C: it is generalizable with ( 2 2 k x 1 ) 3 for all k > 1 with x in [ 1 ] 3 , but we will already have those numbers counted in any iteration of action V on C ( x ) .
To prove that each element of A x has a unique non-cyclic decomposition into actions A, C, and V, we now define a one-to-one correspondence between any S y r ( y ) and either action. For any odd y, either 3 y + 1 is divisible by exactly 2, by exactly 4, or by at least 8. If 3 y + 1 is divisible by 2, then A ( ( 3 y + 1 ) 2 ) = y ; if it is divisible by 4, then C ( ( 3 y + 1 ) 4 ) = y ; and if it is divisible by 8 or more, there are always finite k and z such that y = V k ( z ) and S y r ( y ) = S y r ( z ) .
Any odd x in A x leads to S y r ( x ) , so the only possible cycle is x to itself. For example, 1 is the only fixed point of C so the cycle in A 1 is 1 1 . □
Remark 1.
We already have that no composition of C, and V may be cyclical as both actions are strictly increasing, but proving that no composition of A, C, and V be cyclical, as they combine coprimes 2 and 3, would be of at least the same complexity as proving the Furstenberg × 2 × 3 conjecture, of which the entire difficulty lies in that “base 2 and base 3 representations share no known common structures” (Furstenberg 1960 [3] and 1967 [4], and Shmerkin 2021 [5]). We already have, however, that, in any base 2 k ,
 1.
A n ( x ) always ends with the representation of the ( n + 1 ) t h Mersenne number, e.g., by 1 1 k 2
 2.
V n ( x ) always ends with the representation of the ( 2 ( n + 1 ) ) t h Mersenne number divided by 3, e.g., by 01 01 k 2
 3.
C n ( x ) always ends with the representation of number 2 n + 1 + 1 e.g., by 0 0 k 1 2
The chaoticity of A C V compositions (that is, any legal word of the form X 1 ( X k ( X k + 1 ( x ) ) . ) , where X k is representing exactly one of either operation and x is any odd number) and hence the difficulty of proving the non-existence of cycles directly come from the fact that A is allowed to delete digits and that both A and C contain divisions by 3. However, the beauty of chaotic cryptology is that, whenever a simple system appears to be intractably chaotic, it comes with the participation trophy of at least offering a strong (and straightforward) industrial chaotic cipher.
Lemma 2
(Lemma of prolificity). Let x be odd with no odd y such that x = V ( y ) . There is always a unique odd z such that D z A C ( x ) .
Proof. 
  • Let x be in [ 1 ] 3 , then so is V 3 ( x ) . V ( x ) is in [ 2 ] 3 and so is V 4 ( x ) . A ( V ( x ) ) = S ( C ( x ) ) , A ( V 4 ( x ) ) = S ( C ( V 3 ( x ) ) , and C ( V 3 ( x ) ) = D ( C ( x ) ) . Thus, A C ( x ) = D C ( x ) . For example, A C ( 7 ) = D 9
  • Let x be in [ 0 ] 3 ; then, V ( x ) is in [ 1 ] 3 and A C ( x ) = D C ( V ( x ) ) . For example A C ( 9 ) = D 49
  • Let x be in [ 2 ] 3 ; then, V 2 ( x ) is in [ 1 ] 3 and A C ( x ) = D C ( V 2 ( x ) ) { A ( x ) } , with A ( x ) not in D C ( V 2 ( x ) ) . For example, A C ( 11 ) = D 241 { 7 } . Note A ( x ) (in the example, A ( x ) = 7 ) always has a V-sequence of its own so A C ( A ( x ) ) will in turn output another D sequence.
Remark 2.
For any odd x, A C ( x ) outputs a D sequence (and if x is in [ 2 ] 3 , a single additional odd number), in which V-closure is an infinite sequence of V sequences (since no element of any D sequence can be written V ( y ) with y being odd). Then, V A C ( x ) is an infinite sequence of V sequences and V A C k ( x ) is an infinite k-sequence (a sequence of sequences k times) of V sequences. | V x n | is a polynomial of n of degree 1 (it is exactly equal to n 2 ), and the amount of numbers up to extra binary length n from x in each V A C k ( x ) is a polynomial of n of degree k + 1 . This algebraic property is the reason we call Lemma 2 that of "prolificity". Its first immediate consequence is that lim n | A x n | , being an infinite sequence of positive-valued polynomials of n of incremented degree and with a positive coefficient for each term of maximal degree, is now necessarily at least of the form A e a n + c for some constants A , a , and c.
Lemma 3
(Lemma of homogeneity). All residue classes in base 3 are equally frequent in A C k ( V x n ) when n and k tend toward infinity.
Proof. 
V 3 ( x ) = 2 6 x + 21 with 2 6 1 mod 3 and 21 = 210 3 , so
  • Let x end in a 0 0 k 3 ; then, for all k, V 3 k ( x ) ends in ( a + 1 ) 0 0 k 3 and V 3 k + 1 ( x ) ends in ( a + 2 ) 0 0 k 1 3 .
  • Let x end in a 2 2 k 3 ; then, for all k, V 3 k ( x ) ends in ( a + 1 ) 2 2 k 3 .
  • If x ends in 22 3 , A ( x ) is in [ 2 ] 3 . If x ends in 12 3 , A ( x ) is in [ 0 ] 3 . If x ends in 02 3 , A ( x ) is in [ 1 ] 3 .
  • If x ends in 21 3 , C ( x ) is in [ 0 ] 3 . If x ends in 11 3 , C ( x ) is in [ 2 ] 3 . If x ends in 01 3 , C ( x ) is in [ 1 ] 3 .
Remark 3.
Concordant with Lemma 3, we can verify that actions D and S already preserve the periodicity of residue classes in base 3: if x is in [ 0 ] 3 , D ( x ) is in [ 1 ] 3 ; if x is in [ 1 ] 3 , D ( x ) is in [ 2 ] 3 ; and if x is in [ 2 ] 3 , D ( x ) is in [ 0 ] 3 . Furthermore, if x is in [ 0 ] 3 , S ( x ) is in [ 1 ] 3 ; if x is in [ 1 ] 3 , S ( x ) is in [ 0 ] 3 ; and if x is in [ 2 ] 3 , S ( x ) is in [ 2 ] 3 . The Lemma of homogeneity is an essential result to construct the following “Lemma of density”, which in turn is the most critical preparatory result for the fundamental Lemma 1.
Lemma 4
(Lemma of density). As n , every P x V D y A z n , is associated with a single sequence F = k = 1 D [ x ] + a k A z n , where a is a pseudorandom variable, of which the average is less than 2, and
lim n | V F n | | k = 1 P [ x ] + k n k | 1
Proof. 
By Lemma 2 for any { x ; S ( x ) } in some D a , there are always y and z such that A C ( P x ) = { D y ; D z } . Let us review all the possible cases.
  • For x in [ 0 ] 3 , y = C ( S ( x ) ) and z = C ( V ( x ) ) . If x began with 10 2 , [ y ] = [ x ] + 1 and [ z ] = [ x ] + 2 ; otherwise, [ y ] = [ x ] + 2 and [ z ] = [ x ] + 3 .
  • For x in [ 1 ] 3 , y = C ( x ) and z = C ( V ( S ( x ) ) ) . If x began with 10 2 , [ y ] = [ x ] + 0 and [ z ] = [ x ] + 3 ; otherwise, [ y ] = [ x ] + 1 and [ z ] = [ x ] + 4
  • For x in [ 2 ] 3 , y = A ( x ) and z = C ( V 2 ( x ) ) . If x began with 10 2 , [ y ] = [ x ] 1 and [ z ] = [ x ] + 4 ; otherwise, [ y ] = [ x ] + 0 and [ z ] = [ x ] + 5
For simplification, we assume the two cases of x beginning with either 10 2 or 11 2 are at worst equifrequent but 10 2 (which is always outputing smaller numbers) will in fact be more frequent because for any a beginning in 11 2 , 3 a always begins in 10 2 , whereas exactly one third of all odd a beginning in 10 2 (for example, those beginning in 1011 2 ) are such that 3 a also begins with 10 2 (See Figure 27 in Rahn et al., 2021 [2]).
Thus, assuming the limiting conditions of Lemma 3, we can now associate a unique disjoint pair { D [ x ] + a 1 ; D [ x ] + a 2 } to each A C ( P x ) . From all cases we reviewed above, we have that a k is a pseudorandom variable, in which the pseudorandomness entirely comes from the Furstenberg principle that “base 2 and base 3 representations share no known common structure”, and its actual (and again, unknown) structure is in fact at the heart of the Bocart proof of work (we may call the larger family “base-change ciphers”). However, what we now know is that the mean of a k over all k is less than 2 because all of the possible cases are {1; 2; 0; 3; −1; 4} if x began with 10 2 and {2; 3; 1; 4; 0; 5} if x began with 11 2 , and within each prefix starting condition ( 10 2 or 11 2 ), Lemma 3 guarantees their being equifrequent.
Hence, to each P x , there is a unique k = 1 D [ x ] + a k , in which V-closure contains at least k = 1 P [ x ] + a k . As P [ x ] + a k contains exactly n a k elements with up to n more binary digits than x; if we take the limiting condition of a 2 , each of them must be associated with at least k additional (disjoint) elements to have
lim n | V F n | | k = 1 P [ x ] + k n k | 1
Those additional elements are always found in V D [ x ] + a k \ P [ x ] + a k . □
Remark 4.
Lemma 2 established that any | A z n | was growing exponentially with n. Lemma 4 now further states that, as n goes to infinity, | A z n | fits each P x D y A z n and is associated with a unique collection F with particular density conditions. As we will see in Theorem 1, this now provides enough information to pinpoint the general formula for lim n | A z n | .

4. Fundamental Theorem of Collatz Attractors

Theorem 1.
For x odd, there is always c > 4 in R , depending only on x, with
lim n | A x n | 2 n + c 1
In particular, for x = 1 , c = 0 .
Proof. 
We intend to prove the number of distinct elements in A x n , in which excluding x itself will bring it arbitrarily close to the following formula as n grows:
x = 0 n c k = 0 x n c k k + 1 = 2 n c 1
For x = 1 , c = 0 , as 2 n 1 covers all the odd numbers written with n more digits than 1 in base 2.
To achieve this result, we will demonstrate that the development of any | A x n | and | A 1 n | in particular follows a power series that is at least a sum of progressively iterated sums, of which the first term is of the following form:
P 1 ( n ) = k = 1 n ( n k ) = 1 2 ( n ) ( n 1 )
and which, iterated, gives a progression of the following form:
P 2 ( n ) = k = 1 n 1 2 ( n k ) ( n k 1 ) = 1 2 · 3 ( n ) ( n 1 ) ( n 2 )
Then,
P 3 ( n ) = k = 1 n 1 2 · 3 ( n k ) ( n k 1 ) ( n k 2 ) = 1 2 · 3 · 4 ( n ) ( n 1 ) ( n 2 ) ( n 3 )
Thus, in general,
P 0 ( n ) = n P j + 1 ( n ) = k = 1 n ( P j ( n k ) ) = ( n j ) P j ( n ) j + 1
Therefore, finally,
j = 0 n P j ( n ) = x = 0 n k = 0 x n k k + 1 = 2 n 1
By Lemma 4, we have that, as n , there is always a non-surjective f:
f : P y n A x n A x n ; f ( P y n ) = k = 0 V D [ x ] + 2 k n 2 k
and
lim n | k = 0 V D [ x ] + 2 k n 2 k | | k = 0 P [ x ] + k n k | 1
Now note that, as | P x n | = n ,
| a = 1 n P [ y ] + a n a | = a = 1 n ( n a ) = P 1 ( n )
Additionally,
| f ( a = 1 n P [ y ] + a n a ) | | b = 1 n a = 1 b P [ y ] + a n a | = b = 1 n a = 1 b ( n a ) = P 2 ( n )
In general,
| f k + 1 ( P x n ) | = | k = 1 n f k ( P x n ) | k = 1 n P k ( n ) = P k + 1 ( n )
Thus, for any P x D y ,
lim n | A { x ; S ( x ) } n | k = 0 n P k ( n ) 2 n 1
Let us now take any odd y as the initial condition, assuming only that, without any loss of generality, there is no odd a such that y = V ( a ) (because if there was, we would just redefine y:=a). By Lemma 2, there is always a unique z so that A C ( y ) = D z . The binary length of z is at worst [ y ] + 3 , indeed if y is in [ 0 ] 3 , z = C ( V ( y ) ) which, in the worst case of y beginning with 11 2 , has three more binary digits than y. Therefore, lim n | A { z ; S ( z ) } n | = 2 n 3 modulo the existence of at most one cycle in all of A y . As V D z = k = 0 P [ z ] + 6 k , we now have, still modulo, the existence of at most one cycle:
lim n | A y n | 2 n 3 lim n k = 0 n 3 6 2 n 3 6 k 2 n 3 = 1
With the worst starting conditions already taken into account (hence the n 3 ) and now also considering the worst possible cycle (adding up to n 3 1 ), we now have that, for any odd x, lim n A x n always tends toward at least more than
1 2 x = 0 n 3 k = 0 x n 3 k k + 1 > 2 n 4 1
Note that A x n can have 2 n + c elements with c positive, depending only on the initial conditions, for example, on whether x or V ( x ) ends in 22 3 or 222 3 , etc., defining how many consecutive times decreasing action A is applied in the early iterations of A x .
If we now take the case of A 1 , its particular starting conditions are that, since A ( 5 ) = 3 and C ( 1 ) = 1 , A C ( 1 ) = D 1 , 3 D 1 and V 2 ( 3 ) = 53 = 1222 3 .
Therefore, A C ( 3 ) = D 17 , with A ( 17 ) = 11 , A ( 11 ) = 7 , C ( 7 ) = 9 , C ( S ( 9 ) ) = 25 , and C ( V ( 9 ) ) = 49 . Thus, the initial development of A 1 contains D 1 , D 3 = 11 2 (of which the first V series is already counted in D 1 , but Equation (2) is iterated at k = 1 ), D 7 = 111 2 , D 9 = 1001 2 , D 11 = 1011 2 , D 17 = 10001 2 , D 25 = 11001 2 , and D 49 = 110001 2 . With { D 1 ; D 3 ; D 7 ; D 9 ; D 11 ; D 17 ; D 25 ; D 49 } for initial conditions, c = 0 modulo the existence of a cycle, but as the only cycle in A 1 is C(1)=1, we have lim n | A 1 n | 2 n = 1  □

5. Discussion

While the previous demonstration was one of discrete algebraic topology, following an interesting request from the reviewers, we outline here another simpler graph-theoretical demonstration of the ACV-closure of any odd { x } being space-filling. In fact, one of the reasons we ventured to call Theorem 1 a “Fundamental theorem” is that there may be a great diversity of ways to demonstrate it.
We already know that the closure of any odd { x } by actions S and G up to the additional binary length n, which in this case is strictly equivalent to all the odd numbers of length lesser or equal to [ x ] + n and beginning with all the first characters of x minus the last one, is in bijection with the powerset of the set with n elements and, therefore, has exactly 2 n elements. Importantly, for the sake of this demonstration, we will only consider x [ 1 ] 3 , but if x [ 2 ] 3 , then we would consider A ( x ) until it is either in [ 1 ] 3 or [ 0 ] 3 , and with x [ 0 ] 3 , we just use the fact that, then, V ( x ) [ 1 ] 3 .
There are already 3 k strings of k characters out of the alphabet { A , C , V } , but no odd number exists such that it can remain whole under both A and C so | A x n | cannot be of the form 3 n . For any string to belong to A x n , the alphabet { A , C , V } is endowed with a grammar interdicting certain strings and determined by both the residue class of odd numbers in base 3 and the total binary characters added or subtracted by actions A, C, and V. Let us begin by determining the latter:
  • A ( y ) = G ( y ) 3 so [ A ( y ) ] = [ y ] 1 if x began with 10 2 or [ y ] + 0 otherwise.
  • C ( y ) = S ( G ( y ) ) 3 so [ C ( y ) ] = [ y ] + 0 if x began with 10 2 or [ y ] + 1 otherwise.
  • V ( y ) = G ( S ( y ) ) so [ V ( y ) ] = [ y ] + 2 for all y in A x n
By Lemma 3, for all y in A x n , n A ( y ) and C ( y ) may be in any base 3 residue class with equal frequency.
Additionally, note that prefixes 10 2 and 11 2 are not equally frequent with action · 3. Indeed, if for all y beginning with 11 2 , 3 y always begin with 10 2 , exactly one third of all odd numbers beginning in 10 2 —precisely, those greater than the V n ( 1 ) (for those with an odd number of digits in base 2) or than the S ( V n ( 1 ) ) (for those with an even number of digits) of the same length as theirs—are such that 3 y will also begin with 10 2 , thus favoring this outcome after either actions A or C with a limit frequency of 2 3 when n (Figure 27 in Rahn et al., 2021 [2]). Action V on the other hand leaves the base 2 prefix intact.
Exactly one out of three times, each action (V, A and C) will only be allowed to be followed by action V only, which also appends two more base 2 digits. Otherwise, action C appends 1 3 digit on average, and action A removes 2 3 digits on average, meaning that C 3 ( y ) has 1 more digits than y if y was on the right 2 3 of the odd numbers beginning with 10 2 (for example, [ S ( 3 4 ) ] = [ 163 ] = 8 and [ C 3 ( S ( 3 4 ) ) ] = [ 385 ] = 9 = [ 163 ] + 1 ).
If in any ACV string we note V , A , and C as the total number of characters V, A, and C, respectively, then all strings in A x n must verify the following topological invariant:
2 V 2 3 A + 1 3 C n
By Lemma 3, the following limit is also verified when V , A , and C are counted on all of A x n :
l i m n A C = 1
and since V is defined for all base 3 residue classes in A x n while there is no other operation defined for residue class 0 3 , we also have
l i m n V A + C = 3 2
As A and C are equifrequent, we may represent “A or C exclusively and with equal frequency” with X, and when n , | A x n | will equal the number of paths in the binary tree where 2 3 of all nodes (each representing a word) have a V and X vertices and 1 3 only a V one. This is strictly equivalent to the binary tree where each node has exactly 2 3 chances of being allowed to branch non-exclusively in either V or X with equal frequency (thus branching to just X with a total frequency of exactly 2 3 · 1 2 = 1 3 ) and 1 3 to branch non-exclusively and equifrequently in V V or V X . In this tree, we now count all of the existing words, verifying
0 2 V 1 3 X n
If A x n was only closed by two distinct actions, both defined equifrequently on all elements and with the binary length characteristics of V (for example V 1 : = 4 x + 1 and V 2 : = 4 x + 3 ), it would be in bijection with the powerset of the set with n 2 elements. However, the tree we defined is at least equivalent to V 1 adding two binary digits and to V 2 adding two exactly half of the times and subtracting 1 3 the other half. Thus counting all occurrences of V 2 and only the pathways with a net-positive binary length extension, we now have that A x n is at least as large as the powerset of the set with n 2 + n k = 1 1 3 k elements. Therefore,
lim n | A x n | 2 n 2 · k = 1 2 n 3 k 1
so:
lim n | A x n | 2 n 1
Remark 5.
This alternative approach to proving the space-fillingness of Collatz feathers is particularly fertile conceptually. Indeed, the ACV-closure of any { x } can now, by the development of Equation (19) and although it uses three distinct actions so would start with a maximum of 3 k n branches, be interpreted as 3 n · l o g ( 2 ) l o g ( 3 ) with l o g ( 2 ) l o g ( 3 ) being the Hausdorff dimension of the triadic Cantor set (the set of all real numbers that can be written without any digit 1 in base 3). Practitioners of the Furstenberg conjecture know that Cantor sets are in turn a larger family containing sets left invariant by either × 3 mod 1 or × 2 mod 1 but never by both ([4]). l o g ( 2 ) l o g ( 3 ) is also the inverse of the Hausdorff dimension of the Sierpinski triangle, a natural figure in the evaluation of the 3-adic distance, which gives us some insight into the geometry of A x n when n . With this in mind, it would be particularly interesting to further study the structure (and iterated morphisms) of the attractors of the 7 x + 1 , 5 x + 1 and Juggler sequences with the deliberate intent of constructing ("pathological") objects of an intermediate cardinality between 0 and 1 as such constructions, though never achieved, are already known not to contradict ZFC [7,8]. All in all, we really believe that the Collatz conjecture, the Furstenberg × 2 × 3 conjecture, and the Continuum Hypothesis should be much more tightly related in the literature.

6. Conclusions

Theorem 1, for the particular case of c = 0 when x = 1 , already implies that “almost all Collatz orbits converge to 1”, which is a result strictly stronger (and shorter) than Tao 2019 [9], where it was only obtained that almost all Collatz orbits attained almost bounded values, leaving not only the possibility of cycles but also the limitation of almost boundedness. Such is not the case here: on the one side, all the elements in A 1 converge to 1 so none other than 1 belongs to a cycle, and on the other side, the elements of A 1 are proven to cover almost all of N . Additionally, pushed to infinity, Collatz attractors are therefore space-filling as their cardinality is of the form 2 n + c .
However, Theorem 1 does not yet prove that all Collatz orbits converge to 1. Rather, it proves that | A 1 n ¯ | | A 1 n | vanishes when n tends toward infinity (which by the way is consistent with the computational findings presented in Figure 15 in Rahn et al., 2021 [2]). Hence, | A 1 n ¯ | can never reach a formula of the form 2 n + c for some integer (possibly negative) constant c < n . At worst, it may only reach x n + c with x < 2 . On the other side though, no Collatz attractor can vanish. Thus, in conclusion, by Lemma 1, we have
lim n | A 1 n ¯ | | A 1 n | = 0
However, for all odd x of binary length m, we always have:
lim n | A x n | | A 1 n | > 1 2 m 4 > 0

Funding

This work was supported by a personal grant to the author from Mohammed VI University, Morocco, under the auspices of Mostafa Terrab, Chairman and CEO of the OCP Group and Chairman of Mohammed VI University.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This work is dedicated to the memories of John Horton Conway (1937–2020), Michael Atiyah (1929–2019), Solomon Feferman (1928–2016), and Alan T. Waterman, Jr. (1918–2008).

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Bocart, F. Inflation propensity of Collatz orbits: A new proof-of-work for blockchain applications. J. Risk Financ. Manag. 2018, 11, 83. [Google Scholar] [CrossRef] [Green Version]
  2. Rahn, A.; Sultanow, E.; Henkel, M.; Ghosh, S.; Aberkane, I.J. An algorithm for linearizing the Collatz convergence. Mathematics 2021, 9, 1898. [Google Scholar] [CrossRef]
  3. Furstenberg, H.; Kesten, H. Products of random matrices. Ann. Math. Stat. 1960, 31, 457–469. [Google Scholar] [CrossRef]
  4. Furstenberg, H. Disjointness in ergodic theory, minimal sets, and a problem in Diophantine approximation. Math. Syst. Theory 1967, 1, 1–49. [Google Scholar] [CrossRef]
  5. Shmerkin, P. Slices and distances: On two problems of Furstenberg and Falconer. arXiv 2021, arXiv:2109.12157. [Google Scholar]
  6. Spilsbury, M. Collatz Feather. 2018. Available online: https://www.michaelspilsbury.com/collatz-feather-details (accessed on 23 May 2022).
  7. Godel, K.; Brown, G.W. The Consistency of the Axiom of Choice and of the Generalized Continuum-Hypothesis with the Axioms of Set Theory; Princeton University Press: Princeton, NJ, USA, 1940. [Google Scholar]
  8. Cohen, J. The independance of the continuum hypothesis II. Proc. Natl. Acad. Sci. USA 1964, 51, 105–110. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  9. Tao, T. Almost all orbits of the Collatz map attain almost bounded values. arXiv 2019, arXiv:1909.03562. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Aberkane, I.J. Collatz Attractors Are Space-Filling. Mathematics 2022, 10, 1835. https://doi.org/10.3390/math10111835

AMA Style

Aberkane IJ. Collatz Attractors Are Space-Filling. Mathematics. 2022; 10(11):1835. https://doi.org/10.3390/math10111835

Chicago/Turabian Style

Aberkane, Idriss J. 2022. "Collatz Attractors Are Space-Filling" Mathematics 10, no. 11: 1835. https://doi.org/10.3390/math10111835

APA Style

Aberkane, I. J. (2022). Collatz Attractors Are Space-Filling. Mathematics, 10(11), 1835. https://doi.org/10.3390/math10111835

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop