An Automated Approach to the Collatz Conjecture

被引:3
|
作者
Yolcu, Emre [1 ]
Aaronson, Scott [2 ]
Heule, Marijn J. H. [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
来源
AUTOMATED DEDUCTION, CADE 28 | 2021年 / 12699卷
关键词
TERMINATION;
D O I
10.1007/978-3-030-79876-5_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We explore the Collatz conjecture and its variants through the lens of termination of string rewriting. We construct a rewriting system that simulates the iterated application of the Collatz function on strings corresponding to mixed binary-ternary representations of positive integers. Termination of this rewriting system is equivalent to the Collatz conjecture. To show the feasibility of our approach in proving mathematically interesting statements, we implement a minimal termination prover that uses the automated method of matrix/arctic interpretations and we perform experiments where we obtain proofs of nontrivial weakenings of the Collatz conjecture. Finally, we adapt our rewriting system to show that other open problems in mathematics can also be approached as termination problems for relatively small rewriting systems. Although we do not succeed in proving the Collatz conjecture, we believe that the ideas here represent an interesting new approach.
引用
收藏
页码:468 / 484
页数:17
相关论文
共 50 条
  • [41] EVOLUTIONARY APPROACH TO COLLATZ PROBLEM
    Pospichal, Jiri
    MENDEL 2011 - 17TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING, 2011, : 56 - 61
  • [42] High-uncertainty audio signal encryption based on the Collatz conjecture
    Renza, Diego
    Mendoza, Sebastian
    Ballesteros L, Dora M.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 62 - 69
  • [43] Performance Evaluation of Proof-of-Work and Collatz Conjecture Consensus Algorithms
    Aljassas, Hamad Mousa A.
    Sasi, Sreela
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [44] A novel Collatz conjecture-based digital image watermarking method
    Tuncer, Turker
    Kurum, Huseyin Yuce
    CRYPTOLOGIA, 2022, 46 (02) : 128 - 147
  • [47] A tropical algebraic collatz conjecture based key exchange protocol for IoT environment
    J. Jackson
    R. Perumal
    International Journal of Information Technology, 2025, 17 (1) : 485 - 493
  • [48] Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture
    Ma, Haoyu
    Li, Shijia
    Gao, Debin
    Jia, Chunfu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3271 - 3285
  • [49] Collatz Conjecture for 2100000-1 is True - Algorithms for Verifying Extremely Large Numbers
    Ren, Wei
    Li, Simin
    Xiao, Ruiyang
    Bi, Wei
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 411 - 416
  • [50] Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture
    Al-Hyari, Abeer
    Obimbo, Charlie
    Abu-Faraj, Mua'ad M.
    Al-Taharwa, Ismail
    IEEE ACCESS, 2024, 12 : 4825 - 4844