Preprint
Article

This version is not peer-reviewed.

On the Salient Regularities of Strings of Assembly Theory

Submitted:

07 November 2024

Posted:

08 November 2024

Read the latest preprint version here

Abstract
Using assembly theory of strings of any natural radix $b$ we find some of their salient regularities. In particular, we show that the upper bound of the assembly index depends quantitatively on the radix $b$ and the longest length $N$ of a string that has the assembly index of $N-k$ is given by $N_{(N-1)}=b^2+b+1$ and by $N_{(N-k)}=b^2+b+2k$ for $2 \le k \le 9$. We also provide particular forms of such strings. Knowing the latter bound, we conjecture that the maximum assembly index of a string of length $N_{(N-2)} \le N \le N_{\text{max}}$ is given by $a_{\text{max}}^{(N,b)} = \lfloor N/2 \rfloor + b(b+1)/2$, where $N_{\text{max}} = 4b^4$ if $b$ is even and $N_{\text{max}} = 4(b^4+1)$ otherwise. For $k=1$ such odd length strings are nearly balanced and there are four such different strings if $b=2$ and seventy-two if $b=3$. We also show that each $k$ copies of an $n$-plet contained in a string decrease its assembly index at least by $k(n-1) - a$, where $a$ is the assembly index of this $n$-plet. Finally, we show that the assembly depth of a minimum assembly index string is equal to the assembly index of this string, the assembly depth of a maximum assembly index string satisfies $d_{a_{\text{max}}}^{(N,b)} \ge \left\lceil \log_2(N) \right\rceil$. Since these results are, in general, also valid for $b=1$, assembly theory subsumes information theory.
Keywords: 
;  ;  ;  ;  

1. Introduction

Assembly theory (AT), formulated in 2017, introduced the concept of an initial pool [1].
Definition 1.
We call a set P 0 ( b ) { 0 , 1 , , b 1 } that contains b N different basic symbols c, the initial assembly pool.
The reader will find numerous results on AT in refs. [1,2,3,4,5,6,7,8,9,10], for example. Here, we extend the results of our previous study [9] concerning bitstrings to strings of any natural radix b. We consider the formation of strings C k ( N , b ) of length N containing symbols from the initial assembly pool P 0 ( b ) within the AT framework in consecutive assembly steps from basic symbols c and strings (doublets, triplets, n-plets) assembled in previous steps. The ancient Greek verb symbállein means putting only two things (“symbols”) together [11].
In fact, any embodiment of AT, with basic symbols representing LEGO® blocks, chemical bonds, graphs, monomers, etc. assembled in any n-dimensional space ( n C ) [12] corresponds to the string AT version. This is because in AT an assembly step always consists in joining two parts only, which can be thought of as the left and right fragments of the newly formed string. Put simply, AT explains and quantifies selection and evolution [7] but it is through the word (aka string or message), in particular a nucleotide sequence in the case of b = 4 , all AT things come into existence [13].
Definition 2.
We call a set P s ( b ) that contains basic symbols and strings assembled in previous steps { 1 , 2 , , s 1 } the working assembly pool.
An assembly step s may consist of
c 1 c 2 = C k ( 2 , b ) , C l ( N l , b ) c 2 = C k ( N l + 1 , b ) , c 1 C m ( N m , b ) = C k ( 1 + N m , b ) , C l ( N l , b ) C m ( N m , b ) = C k ( N l + N m , b ) ,
where c 1 , c 2 P 0 ( b ) , C l ( N l , b ) , C m ( N m , b ) P s 1 ( b ) , and C k P s ( b ) . Using Definitions 1 and 2, the assembly index (ASI) of a string is the minimal achievable value of a difference between the cardinalities of the working and initial assembly pools (ASPs) leading to this string, since at each assembly step the cardinality of the working ASP increases by one. Therefore, the working ASP 2 cannot be identified with the initial ASP 1; the initial ASP 1 must not contain strings of basic symbols (see Appendix G).

2. Results

Theorems 1 and 2 were already stated in our previous study [9] for b = 2 . We restate them here b for clarity.
Theorem 1.
A quadruplet is the shortest string that allows for more than one ASI for all b.
Proof. 
N = 2 provides b 2 available doublets with unit ASI. N = 3 provides b 3 available triplets with ASI equal to two. Only N = 4 provides b 4 quadruplets that include b 2 quadruplets with ASI equal to two, that is b quadruplets C k , min ( 4 , b ) = [ * * * * ] and b ( b 1 ) quadruplets C l , min ( 4 , b ) = [ * * ] , while the ASI of the remaining b 4 b 2 quadruplets is three. □
For example, to assemble the quadruplet C k , min ( 4 , 4 ) = [ 0202 ] , we need to assemble the doublet [ 02 ] and reuse it from the first step ASP P 1 , while there is nothing available to reuse, in the case of the quadruplet C l ( 4 , 4 ) = [ 0123 ] .
Where the symbol value can be arbitrary, we write * assuming that it is the same within the string. If we allow for the 2nd possibility different from *, we write ★. Thus, C k ( 2 , b ) = [ * * ] , for example, is a placeholder for all b strings, while C l ( 2 , b ) = [ * ] a placeholder for all b ( b 1 ) strings. Furthermore, we consider the degenerate case of just one basic symbol ( b = 1 ).
Theorem 2.
The minimum ASI a ( N ) ( C min ) as a function of N corresponds to the shortest addition chain for N (OEIS A003313) for all b.
Proof. 
Strings C min for which a ( N ) ( C min ) = min k { a ( N , b ) ( C k ) } , k { 1 , 2 , , b N } can be formed in subsequent steps s by joining the longest string assembled so far with itself until N = 2 s is reached. Therefore, if N = 2 s , then min k { a ( 2 s ) ( C k ) } = s = log 2 ( N ) . Only b 2 strings have such ASI if N = 2 s , including respectively b and b ( b 1 ) strings
C k ( 2 s , b ) = [ * * ] , C l ( 2 s , b ) = [ * * ] ,
and the assembly pathway of each of the strings (2) is unique. At each assembly step, its length doubles.
An addition chain for N N having the shortest length s N (commonly denoted as l ( N ) ) is defined as a sequence 1 = a 0 < a 1 < < a s = N of integers such that j 1 , a j = a k + a l for k l < j . Thus, an addition chain starts with one, not zero, as zero is the neutral element of addition. For the same reason, two is considered the smallest prime, as one is the neutral element of multiplication. Hence, j = 1 k = l = 0 and the first step in creating an addition chain for N is always a 1 = 1 + 1 = 2 ; the ASI of any doublet is one. The second step in creating an addition chain can be a 2 = 1 + 1 = 2 , a 2 = 1 + 2 = 3 , or a 2 = 2 + 2 = 4 . The 1st case does not represent the shortest addition chain, the 2nd one corresponds to assembling a triplet based on the previously assembled doublet, and the 3rd one corresponds to assembling a quadruplet from this doublet. Therefore, four is the smallest number achievable in two ways since a 2 = 2 + 2 = 4 and a 3 = 3 + 1 = 4 , where the latter case corresponds to assembling a quadruplet by joining a basic symbol to a triplet, which is not the shortest way for assembling a quadruplet having a minimum ASI.
Thus, finding the shortest addition chain for N corresponds to finding the ASI of a string containing basic symbols and/or doublets and/or triplets containing these doublets for N 2 s since due to Theorem 1 only they provide the same assembly indices { 0 , 1 , 2 } . □
The assembly pathways of strings a min ( N ) of length N 2 s are not unique. For example, a string C min ( 5 , b ) = [ 01010 ] can be assembled in three steps from three working ASPs P 3 ( 2 ) = { 0 , 1 , 01 , 0101 } , P 3 ( 2 ) = { 0 , 1 , 10 , 1010 } , and P 3 ( 2 ) = { 0 , 1 , 01 , 010 } .
Theorem 3.
The strings C min ( 2 s , b ) can contain at most two symbols if b > 1 . Other minimum ASI strings of length N 2 s can contain at most three symbols if b > 2 .
Proof. 
Minimum ASI strings of length N = 2 s are formed by joining the newly assembled string to itself, where a clear or mixed doublet is created in the first step. Minimum ASI strings of other lengths admit a doublet and a triplet containing this doublet and an additional basic symbol.
To formally prove the first part, we can also use mathematical induction on the assembly step s. If s = 1 , then the minimum ASI strings C min ( 2 , b ) are doublets of the form [ c 1 c 2 ] , where c 1 , c 2 P 0 ( b ) . If c 1 = c 2 , the string contains one distinct symbol, and if c 1 c 2 , the string contains two distinct symbols. In both cases, the number of distinct symbols does not exceed two. Now assume that for some k N , all minimum ASI strings C min ( 2 k , b ) contain at most two distinct symbols. We must show that C min ( 2 k + 1 , b ) also contains at most two distinct symbols. Consider constructing C min ( 2 k + 1 , b ) by joining two identical minimum ASI strings C min ( 2 k , b )
C min ( 2 k , b ) C min ( 2 k , b ) = C min ( 2 k + 1 , b ) ,
with each other. By the inductive hypothesis, each C min ( 2 k , b ) contains at most two distinct symbols. Therefore, their concatenation also contains at most two distinct symbols. By induction, for all s N , the minimum ASI string C min ( 2 s , b ) contains at most two distinct symbols.
We will now show that other minimum ASI strings of length N 2 s can contain at most three distinct symbols if b > 2 . We provide the construction of minimum ASI strings with three symbols. In the first step s = 1 , we create a doublet [ c 1 c 2 ] where c 1 , c 2 P 0 ( b ) and c 1 c 2 . Next, we combine the existing doublet [ c 1 c 2 ] with a new symbol c 3 P 0 ( b ) where c 3 { c 1 , c 2 } . This forms a triplet [ c 1 c 2 c 3 ] , introducing a third distinct symbol and further increasing the ASI by 1. We continue assembling by joining the longest string formed so far with itself or with previously formed strings, maintaining the minimal increase in ASI.
Assume a contrario that there exists a minimum ASI string C min ( N , b ) of length N 2 s that contains four or more distinct symbols. To incorporate a fourth symbol, at least one additional assembly step is required beyond what is needed for the three symbols. This additional step implies an increase in ASI, which contradicts the minimality of C min ( N , b ) . Thus, Theorem 3 is proven. □
The strings having non-minimum ASI can contain all symbols. For example, the string [14]
C k = [ 01234012340123401234 ] ,
has ASI a ( 20 , 5 ) ( C k ) = 6 = a min ( 20 ) + 1 and contains all five basic symbols P 0 ( 5 ) { 0 , 1 , 2 , 3 , 4 } .
Theorem 4.
A string containing the same three doublets has the same ASI as a string containing two pairs of the same doublets, provided that both strings have the same distributions of other repetitions and have the same lengths.
Proof. 
Without loss of generality (w.l.o.g.), consider the following two strings of the same length N + 8 with * 01 and the same distributions of other repetitions (if there are any other repetitions)
C k = [ 01 01 01 * ] , C l = [ 01 01 22 22 ] ,
where * 01 . Creating a doublet takes one assembly step. Each appending of a doublet to an assembled string counts as another assembly step. Hence, in a general case (i.e., for strings C k , C l containing also other symbols), the string C k requires six additional assembly steps, the same as the string C l , which completes the proof. □
Theorem 5.
A string containing the same three doublets has the same ASI as a string containing the same two triplets, provided that both strings have the same distributions of other repetitions.
Proof. 
W.l.o.g. consider the following two strings of the same length N + 6 with the same distributions of other repetitions
C k = [ 01 01 01 ] , C l = [ 010 010 ] .
Creating a triplet takes two assembly steps. Hence, in the general case, the string C k requires four additional assembly steps, the same as the string C l , which completes the proof. □
Theorem 6.
A string containing the same two triplets has the same ASI as a string containing two pairs of the same doublets, provided that both strings have the same distributions of other repetitions and have the same lengths.
Proof. 
The proof stems from Theorems 4 and 5. □
Theorem 7.
A string containing the same two quadruplets of the minimum ASI has the same ASI as a string containing the same three triplets, provided that both strings have the same distributions of other repetitions and have the same lengths.
Proof. 
W.l.o.g. consider the following two strings of the same length N + 9 with the same distributions of other repetitions
C k = [ 0101 0101 ] , C l = [ 010 010 010 ] .
Creating such a quadruplet takes two assembly steps. Hence, in a general case, the string C k requires five additional assembly steps, the same as the string C l , which completes the proof. □
Theorem 8.
A string containing the same two quadruplets of the maximum ASI has the same ASI as a string containing a doublet and the same two triplets based on this doublet, provided that both strings have the same distributions of other repetitions.
Proof. 
W.l.o.g. consider the following two strings of the same length N + 8 with the same distributions of other repetitions
C k = [ 0001 0001 ] , C l = [ 110 10 110 ] .
Creating such a quadruplet takes three assembly steps. Hence, in a general case, the string C k requires five additional assembly steps, the same as the string C l , which completes the proof. □
Theorem 9.
A string containing the same two doublets and the same two triplets not based on this doublet has the same ASI as a string containing a doublet and the same two triplets based on this doublet, provided that both strings have the same distributions of other repetitions and have the same lengths.
Proof. 
W.l.o.g. consider the following two strings of the same length N + 10 with the same distributions of other repetitions
C k = [ 110 00 110 00 ] , C l = [ 110 10 110 * ] ,
where * { 11 , 10 } . In a general case, the string C k requires seven additional assembly steps, the same as the string C l , which completes the proof. □
In general, Theorems 1-9 show that
  • k copies of a doublet in a string decrease the ASI of this string at least by k 1 ;
  • k copies of a triplet in a string decrease the ASI of this string at least by 2 k 2 ;
  • k copies of a minimum ASI quadruplet in a string decrease the ASI of this string at least by 3 k 2 ;
  • k copies of a maximum ASI quadruplet in a string decrease the ASI of this string at least by 3 k 3 ;
where, the phrase "at least" is meant to indicate that other repetitions, such as e.g. doublets forming multiple quadruplets, etc. can further decrease the ASI of the string. This observation allows us to state the following theorem.
Theorem 10.
Each k r copies of an n r -plet C r ( n r , b ) contained in a string C m ( N , b ) decrease its ASI at least by k r ( n r 1 ) a ( n r , b ) C r . That is
a ( N , b ) ( C m ) N 1 r = 1 R k r ( n r 1 ) a ( n r , b ) C r ,
where R is the total number of repeated n r -plets.
Proof. 
W.l.o.g. consider the following string
C m ( N , b ) = [ [ c 1 c 2 c n ] [ c 1 c 2 c n ] ] ,
containing two copies of an n-plet C l ( n , b ) = [ c 1 c 2 c n ] . The n-plet C l ( n , b ) can be assembled in a ( n , b ) C l steps and appended to the assembled string C m in one step. Consider that the ASI of the n-plet C l ( n , b ) is a ( n , b ) C l = n 1 , i.e. the n-plet does not have any repetitions that can be reused. Then one copy of this n-plet - as expected - does not decrease the ASI of the string C m ( N , b ) , as 1 ( n 1 ) ( n 1 ) = 0 , while more copies k decrease it by ( n 1 ) ( k 1 ) . On the other hand, if a ( n , b ) C l < n 1 then even a single copy of this n-plet will decrease the ASI of C m . □
For example, due to the presence of three copies of a 5-plet [ 01001 ] , each with a ( 5 , 6 ) ( [ 01001 ] ) = 3 , in a string
C k ( 24 , 6 ) = [ 12 | 01001 | 21 | 01001 | 235 | 01001 | 52 ] ,
its ASI amounts to a ( 24 , 6 ) ( C k ) = 24 1 ( 3 · ( 5 1 ) 3 ) = 14 . The relation (10) provides the upper bound on ASI as it does not describe a situation in which n-plet for n > 2 is assembled on a doublet also present in one copy in the string. For example, the string a ( 14 , 9 ) ( [ 56101781014301 ] ) = 10 , while 14 1 ( 2 ( 3 1 ) 2 ) = 11 . We note that the maximum ASI decrease is provided by 2 s -plets of the minimum ASI and amounts to k ( n 1 ) log 2 ( n ) = k ( 2 s 1 ) s .
Another quantity quantifying the complexity of a string is the assembly depth (ASD) defined [15] as
d s ( N k , b ) ( C k ) max d ( N l , b ) ( C l ) , d ( N m , b ) ( C m ) + 1 ,
where d 0 ( 1 , b ) ( c ) 0 , and d ( N l , b ) ( C l ) and d ( N m , b ) ( C m ) are the ASDs of two substrings C l , C m of the string C k that were joined in step s, where for N 4 , and if there are more assembly pathways with different depths w j leading to a string, which happens if at least two independent assembly steps are possible, the minimum pathway depth is the ASD of this string. Hence, the ASD captures the notion of an independent assembly step.
Theorem 11.
If a working ASP contains strings having the same ASD they were assembled in independent assembly steps.
Proof. 
W.l.o.g. assume a contrario that two strings C l , C m in the working ASP have the same ASD, i.e., d ( N l , b ) ( C l ) = d ( N m , b ) ( C m ) , but C m was used in the assembly of C l along with a basic symbol c. Then
d s ( N l , b ) ( C l ) = max d ( N m , b ) ( C m ) , d ( 1 , b ) ( c ) + 1 = d ( N m , b ) ( C m ) + 1 d ( N m , b ) ( C m ) ,
which contradicts our assumption and completes the proof. □
In other words, if two strings C l , C m in the working ASP have the same ASD, their assembly pathways are unrelated to each other; by the defining equation (13) neither of them could have been used in the assembly pathway of the other.
Theorem 12.
The ASD of any minimum ASI string C min ( N , b ) is equal to the ASI of this string, d a min ( N , b ) = a min ( N ) .
Proof. 
We need to show that d a min ( N , b ) = a min ( N ) . While constructing the minimum ASI string, we start with a doublet and follow the shortest addition chain for N, joining this doublet with itself or with a basic symbol to form a triplet. At each assembly step, the ASD increases by one, as we join the assembled string with a string or a basic symbol from the working ASP and we cannot perform independent assembly steps. Since, by Theorem 2, the minimum ASI corresponds to the length of the shortest addition chain l ( N ) , we have
d s ( N , b ) C min ( N , b ) = l ( N ) = a min ( N ) .
This completes the proof (see Appendix F for additional comments). □
Theorems 11 and 12 show that
  • the working ASP of a minimum ASI string cannot contain strings assembled in independent assembly steps,
  • the working ASP of a non-minimum ASI string must contain at least two such strings, and
  • the assembly pathway of a maximum ASI string will tend to maximize their number in the working ASP, and hence to minimize the possible ASD, taking into account the saturation of the working ASP, as the number of distinct n-plets in the working ASP cannot exceed b n .
Theorem 13.
The ASD of any maximum ASI string C max ( N , b ) satisfies
d a max ( N , b ) = log 2 ( N ) .
Proof. 
Let d ( N ) d a max ( N , b ) . For N = 2 we have d ( 2 ) = 1 , as we are joining basic symbols from the initial ASP. This is the base case. In an assembly tree of ASD d ( N ) , the maximum number of leaves that can be combined is 2 d ( N ) , because at each assembly step, we join two substrings. Therefore, the maximum length N max of a C max string that can be assembled with ASD d ( N ) satisfies:
N max 2 d ( N ) .
This implies that
d ( N ) log 2 ( N max ) ,
and leads to the relation (16), since both d ( N ) and N max are natural numbers and the latter does not have to be a power of two. We can also use mathematical induction. For N 2 and for N + 1 we have respectively
d ( N ) = log 2 ( N ) 2 d ( N ) 1 < N 2 d ( N ) , d ( N + 1 ) = log 2 ( N + 1 ) 2 d ( N + 1 ) 1 1 < N 2 d ( N + 1 ) 1 , max 2 d ( N ) 1 , 2 d ( N + 1 ) 1 1 < N min 2 d ( N ) , 2 d ( N + 1 ) 1 ,
where d ( N ) N implies that either d ( N + 1 ) = d ( N ) or d ( N + 1 ) = d ( N ) + 1 . Hence,
d ( N + 1 ) = d ( N ) 2 d ( N ) 1 < N 2 d ( N ) 1 , d ( N + 1 ) = d ( N ) + 1 2 d ( N ) 1 < N 2 d ( N ) ,
which completes the proof. □
Theorems 12 and 13 are somehow counterintuitive. For example, the string C max ( 11 , 2 ) = [ 10100001110 ] has the ASI a max ( 11 , 2 ) = 8 and the ASD d a max ( 11 , 2 ) = 4 , while the string C min ( 11 , 2 ) = [ 10101010101 ] has a smaller ASI a min ( 11 ) = 5 but a larger ASD d a min ( 11 , 2 ) = 5 .
For example, the ASD of a string C max ( 7 , 2 ) = [ 0001110 ] is d a max ( 7 , 2 ) = log 2 ( 7 ) = 3 as
00 d 1 = 1 , 00 w 1 = 1 , 00 w 1 = 1 , 00 w 1 = 1 , 01 d 2 = 1 , 01 w 2 = 1 , 01 w 2 = 1 , 000 w 2 = 2 , 11 d 3 = 1 , 11 w 3 = 1 , 0001 w 3 = 2 , 0001 w 3 = 3 , 110 d 4 = 2 , 0001 w 4 = 2 , 00011 w 4 = 3 , 00011 w 4 = 4 , 0001 d 5 = 2 , 000111 w 5 = 3 , 000111 w 5 = 4 , 000111 w 5 = 5 , 0001110 d 6 = 3 , 0001110 w 6 = 4 , 0001110 w 6 = 5 , 0001110 w 6 = 6 ,
even though this string can be assembled with three larger pathway depths w 6 = { 4 , 5 , 6 } and the ASD of a minimum ASI string C min ( 7 , 2 ) = [ 0101010 ] is
01 d 1 = 1 , 0101 d 2 = 2 , 010101 d 3 = 3 , 0101010 d 4 = 4 .
Similarly, the ASD of a string C max ( 8 , 2 ) = [ 00011101 ] is d a max ( 8 , 2 ) = log 2 ( 8 ) = 3 as
00 d 1 = 1 , 00 w 1 = 1 , 00 w 1 = 1 , 01 w 1 = 1 , 01 d 2 = 1 , 01 w 2 = 1 , 01 w 2 = 1 , 001 w 2 = 2 , 11 d 3 = 1 , 11 w 3 = 1 , 0001 w 3 = 2 , 0001 w 3 = 3 , 0001 d 4 = 2 , 0001 w 4 = 2 , 00011 w 4 = 3 , 00011 w 4 = 4 , 1101 d 5 = 2 , 000111 w 5 = 3 , 000111 w 5 = 4 , 000111 w 5 = 5 , 00011101 d 6 = 3 , 00011101 w 6 = 4 , 00011101 w 6 = 5 , 00011101 w 6 = 6 .
However, the non-maximum ASI string C k ( 8 , 2 ) = [ 01001011 ] has only two doublets that can be assembled in independent steps. Hence, its ASD cannot be decreased to log 2 ( 8 )
01 d 1 = 1 , 01 w 1 = 1 , 11 d 2 = 1 , 010 w 2 = 2 , 010 d 3 = 2 , 010010 w 3 = 3 , 010010 d 4 = 3 , 0100101 w 4 = 4 , 01001011 d 5 = 4 , 01001011 w 5 = 5 .
The seven-bit string is the longest string that can have the maximum ASI a max ( 7 , 2 ) = 7 1 = 6 . There are four such bitstrings containing two clear triplets and the starting bit at the end or the ending bit at the start, that is
[ * * * * ] and [ * * * ] ,
and their lengths cannot be increased without a repetition of a doublet, which keeps the ASI at the same level a max ( 8 , 2 ) = 8 2 = 6 .
This observation and Theorem 2 motivated us to develop a general method to construct the longest possible string having the ASI a max ( N , b ) ( C ( N 1 ) ) = N 1 , as a function of the radix b. We denote the length of this string by N ( N 1 ) or N ( N 1 ) ( b ) , and we call this string a C ( N 1 ) string.
After a few groping try-outs, we eventually reached two stable methods (cf. Appendices, Methods Appendix A and Appendix B). In both methods, we start with an initial balanced string of length 3 b containing b clear triplets ordered as
[ 0001112 ( b 2 ) ( b 1 ) ( b 1 ) ( b 1 ) ] .
The doublets that can be inserted into the initial string (26) can be arranged in a b × b matrix
Preprints 138884 i001
where the crossed out entries on a diagonal cannot be reused, as they would create repetitions in this string. If we assume that we shall not insert doublets between the clear triplets of the string (26), we can also cross out the entries in the first superdiagonal of the matrix (27). The strings of odd lengths generated by these general methods are not only the longest but also the most balanced. This can be stated in the following theorem.
Theorem 14
( N ( N 1 ) ). The longest length of a string that has the ASI of N 1 is given by
N ( N 1 ) = 3 b + ( b 1 ) 2 = b 2 + b + 1
(OEIS A353887) and this string is nearly balanced, that is
N ( N 1 ) = b N c + 1 ,
where N c = b + 1 is the number of occurrences of all but one symbol within the string, and its Shannon entropy is
H ( C ( N 1 ) ) = c = 0 b 1 p c log 2 ( p c ) = ( b 1 ) N ( N 1 ) 1 b N ( N 1 ) log 2 N ( N 1 ) 1 b N ( N 1 ) N ( N 1 ) 1 + b b N ( N 1 ) log 2 N ( N 1 ) 1 + b b N ( N 1 ) = = 1 b 2 b 2 + b + 1 log 2 b + 1 b 2 + b + 1 b + 2 b 2 + b + 1 log 2 b + 2 b 2 + b + 1 log 2 ( b ) .
The proof of Theorem 14 is given in Appendix D. A C ( N 1 ) string must contain all clear triplets and all doublets and if it is generated by Method Appendix A or Appendix B it is terminated with 0 and has a form
C ( N 1 ) = [ 000111222 0 ] .
Although the case for b = 1 is degenerate, as no information can be conveyed using only one symbol ( H ( C ( N 1 ) ) = 0 in this case), nothing precludes the assembly of such defunct strings and the formula (28) yields the correct result; the string [ 000 ] is the longest string with a max ( N , 1 ) = N 1 by Theorem 1, as for b = 1 the upper and the lower bound on the ASI are the same, a max ( N , 1 ) = a min ( N ) (OEIS A003313). This is the only case where the maximum ASI is not a monotonically nondecreasing function of N.
For b = 3 , only two doublets can be introduced without repetitions into the initial string (26), leading to twelve unique strings of length N ( N 1 ) = 13
[ 000111222 | 0210 ] , [ 000111222 | 1020 ] , [ 20 | 21 | 000111222 ] , [ 21 | 02 | 000111222 ] , [ 0001112 | 02 | 22 | 10 ] , [ 0001112 | 10 | 22 | 20 ] , [ 21 | 000 | 20 | 111222 , [ 000 | 20 | 111222 | 10 ] , [ 02 | 000111222 | 10 ] , [ 20 | 00 | 21 | 0111222 ] , [ 21 | 0001112 | 02 | 22 ] , [ 21 | 000111222 | 02 ] .
Finally, we have to multiply the cardinality of this set by 3 ! = 6 to account for permutations. For example, the first string [ 0001112220210 ] , is equivalent to five strings [ 0002221110120 ] , [ 1110002221201 ] , [ 1112220001021 ] , [ 2220001112102 ] , and [ 2221110002012 ] . Hence, there are seventy-two different strings of length N ( N 1 ) ( 3 ) = 13 .
Subsequently, we considered other C ( N k ) strings of length N ( N k ) with the maximum ASI a max ( C ( N k ) ) = N k for k > 1 .
Theorem 15
( N ( N k ) ). For all b > 1 and 2 k 9 the longest length of a string that has the ASI of N k is given by
N ( N k ) = b 2 + b + 2 k .
The proof of Theorem 15 is given in Appendix E. This result disproves our upper bound Conjecture 1 for b = 2 stated in our previous study [9]. If the strings of Theorem 15 are based on strings generated by Method Appendix A or Appendix B, for b > 2 they owe their properties to the following distributions of symbols
C ( N 2 ) = [ 010000111222 10 0 ] , C ( N 3 ) = [ 01010000111222 10 0 ] , C ( N 4 ) = [ 0101010000111222 10 0 ] , C ( N 5 ) = [ 010101000000111222 10 0 ] , C ( N 6 ) = [ 01010100000011111222 10 0 ] , C ( N 7 ) = [ 0101010000000111111222 10 0 ] , C ( N 8 ) = [ 010101000000011011111222 10 0 ] , C ( N 9 ) = [ 01010100100000011011111222 10 0 ] .
For the strings of the form (34) the fractions in the Shannon entropy are
p 0 = b + k + f 0 b 2 + b + 2 k , p 1 = b + k + f 1 b 2 + b + 2 k , p 2 , , b 1 = b + 1 b 2 + b + 2 k ,
where f 0 = 3 , f 1 = 1 if k = 5 and f 0 = 2 , f 1 = 0 otherwise, as [ 00 ] is inserted into C ( N 5 ) , [ 11 ] into C ( N 6 ) and [ 01 ] or [ 10 ] otherwise. This leads to Shannon entropy
H ( C ( N k ) ) = b 2 b 2 b 2 + b + 2 k log 2 b + 1 b 2 + b + 2 k b + k + f 1 b 2 + b + 2 k log 2 b + k + f 1 b 2 + b + 2 k b + k + f 0 b 2 + b + 2 k log 2 b + k + f 0 b 2 + b + 2 k .
The entropies (30) and (36) are shown in Figure 1. Radix b = 4 is the smallest one at which the entropy (36) is a monotonically decreasing function. For b { 2 , 3 } there is a local entropy minimum for k = 5 and for b = 2 an additional local entropy minimum for k = 2 .
Conjecture 16
( N max > N ( N k ) ). If b > 1 and N ( N 2 ) N N max then
a max ( N , b ) = a max ( N 1 , b ) + 1 iff N = 2 l , a max ( N 1 , b ) iff N = 2 l + 1 , .
or equivalently
a max ( N , b ) = N 2 + b ( b + 1 ) 2 ,
where
N max = 4 b 4 iff b = 2 l , 4 ( b 4 + 1 ) iff b = 2 l + 1 , .
In other words, if N N ( N 2 ) , then ASI increases by one, where N increases by two ( b ( b + 1 ) / 2 are triangular numbers, OEIS A000217).
First, we note that maximum ASI must rise. If it were constant for N > N ^ m a x , then at some even larger N it would inevitably become lower than the minimum ASI bound 2 which also rises, and this would be a contradiction. W.l.o.g. we aim to prove this conjecture for b = 2 . We note that inserting any doublet into a C ( N 3 ) ( 12 , 2 ) string (A19) at any position creates a triplet. Using the equation (10) of Theorem 10 we have
a s = a s 2 + 1 , N s = N s 2 + 2 , a s = N s 1 r = 1 R r k r ( n r 1 ) a C r ( n r , b ) , a s 2 = N s 2 1 p = 1 R s 2 k p ( n p 1 ) a C p ( n p , b ) , a s a s 2 = ( N s 2 + 2 ) 1 r = 1 R r k r ( n r 1 ) a C r ( n r , b ) N s 2 1 p = 1 R p k p ( n p 1 ) a C p ( n p , b ) = = 2 r = 1 R r k r ( n r 1 ) a C r ( n r , b ) + p = 1 R p k p ( n p 1 ) a C p ( n p , b ) = 1 , r = 1 R r k r ( n r 1 ) a C r ( n r , b ) = p = 1 R p k p ( n p 1 ) a C p ( n p , b ) + 1 ,
for any step s if only N ( N 2 ) N s N max . Now, assume that r , a C r ( n r , b ) = n r 1 and p , a C p ( n p , b ) = n p 1 . Then
r = 1 R r ( k r 1 ) ( n r 1 ) = p = 1 R p ( k p 1 ) ( n p 1 ) + 1 , r = 1 R r n r k r r = 1 R r n r r = 1 R r k r + R r = p = 1 R p n p k p p = 1 R p n p p = 1 R p k p + R p + 1 .
The proof of the Conjecture 16 must show the conditions for the equations (40) and (41) to hold. We note that the assumption used in the equation (41) is valid only for n r N ( N 1 ) and n p N ( N 1 ) . The bounds of Theorems 14 and 15 and Conjecture 16 are illustrated in Figure 2.
The results thus far led us to a simple method of determining the ASI of a maximum ASI and a minimum ASD string and strengthened our Conjectures 3 and 4 stated in the previous study [9]. The method is based on unique 2 s -plets and powers of two, as shown in Table 1. First, a maximum ASI string is sequenced, every two symbols to find the number n U A D of unique adjoining doublets × 2 ( b ) . In particular, a C ( N 1 ) string (A3) or (A4) contain the maximum of N ( N 1 ) / 2 unique adjoining doublets, a C ( N 2 ) string (A13) contains the maximum of N ( N 2 ) / 2 1 unique adjoining doublets, and so on. In general, a C ( N k ) string contains the maximum of
n U A D = N ( N k ) 2 k + 1 = b ( b + 1 ) / 2 = l = 1 b l iff k = 1 , b ( b + 1 ) / 2 + 1 = l = 1 b l + 1 iff k 1 , .
unique adjoining doublets, where N ( N k ) is given by the relations (28) or (33), which is independent of k.
Subsequently, these doublets form × 4 ( b ) unique adjoining quadruplets, quadruplets form × 8 ( b ) unique adjoining octuples, and so on depending on the length of the string N and the radix b, as there can be at most b 2 s unique 2 s -plets. The columns "last 2 s " indicate if the assembled string should be terminated with a single substring of length 2 s in descending order. The empty fields in the respective columns for N > 1 indicate that a given × 2 s substring can be interpreted as either a "regular" single × 2 s substring or a last × 2 s substring if × 2 s = 1 .
For example, the N ( N 3 ) string (A20) of length N ( N 3 ) = 18 for b = 3 can be assembled as
Preprints 138884 i002
Similarly, the N ( N 1 ) string (A3) of length N ( N 1 ) = 21 for b = 4 can be assembled, as shown in Table 1 as
Preprints 138884 i003
For N < 15 and for other small N this combinatorics is valid also for b = 1 , where obviously max × 2 s = 1 . For example, the string of length N = 15 can be assembled in six steps as
Preprints 138884 i004
However, this is the 1st exception for b = 1 as the ASI of this string is five if it is assembled using doublet [ 00 ] and triplet [ 000 ] . For b = 1 the method produces OEIS A014701 sequence corresponding to the number of steps to reach 1 starting from N 0 and assigning N s + 1 = N s 1 if N s is odd and N s + 1 = N s / 2 otherwise.
We further note that the method illustrated in Table 1 cannot be used to construct the maximum ASI string. For example, both the following two distributions of doublets for N = 6 satisfy the distributions of Table 1. However, only the left one correctly reflects the maximum ASI of the assembled string.
Preprints 138884 i005
as the right one can be assembled in four steps with P 4 ( 2 ) = { 0 , 1 , 01 , } . Similarly, only the top distribution of doublets below correctly reflects the maximum ASI of the assembled string for N = 10
Preprints 138884 i006
as the bottom one can be assembled in six steps with P 6 ( 2 ) = { 0 , 1 , 11 , 011 , } . Furthermore, this method tends to exaggerate the estimated maximum ASI value, that is,
a max ( N , b ) a method ( N , b ) ( C k ) ,
where a method ( N , b ) is the ASI of a string C k determined by the method illustrated in Table 1. For example, the first six strings below contain four unique doublets instead of the required three. Therefore
C 1 = [ 00 | 10 | 01 | 11 ] , a ( 8 , 2 ) ( C 1 ) = 5 , a method ( 8 , 2 ) ( C 1 ) = 7 , C 2 = [ 00 | 10 | 11 | 01 ] , a ( 8 , 2 ) ( C 2 ) = 5 , a method ( 8 , 2 ) ( C 2 ) = 7 , C 3 = [ 00 | 01 | 10 | 11 ] , a ( 8 , 2 ) ( C 3 ) = 5 , a method ( 8 , 2 ) ( C 3 ) = 7 , C 4 = [ 00 | 01 | 11 | 10 ] , a max ( 8 , 2 ) ( C 4 ) = 6 , a method ( 8 , 2 ) ( C 4 ) = 7 , C 5 = [ 00 | 11 | 10 | 01 ] , a ( 8 , 2 ) ( C 5 ) = 5 , a method ( 8 , 2 ) ( C 5 ) = 7 , C 6 = [ 00 | 11 | 01 | 10 ] , a ( 8 , 2 ) ( C 6 ) = 5 , a method ( 8 , 2 ) ( C 6 ) = 7 , C 7 = [ 00 | 01 | 11 | 00 ] , a max ( 8 , 2 ) ( C 7 ) = 6 = a method ( 8 , 2 ) ( C 7 ) = 6 .
Further research should consider researching the formula equivalent to (28) that captures a quadruplet repetition, similarly as b 2 + b 1 + b 0 captures a doublet repetition.

3. Discussion

Applications of AT seem to be promising. It offers a new lens for studying the construction of biological molecules like DNA and proteins. By analyzing the steps needed to assemble these molecules from basic building blocks, researchers can gain deeper insights into the evolutionary constraints and optimizations that shape biological pathways. This perspective also sheds light on the efficient construction of cellular structures and helps to identify the minimum number of assembly steps that define biological complexity, reinforcing the idea that life is characterized by highly organized pathways. Furthermore, AT provides an essential tool for understanding the growth of complexity in biological systems over evolutionary time. By quantifying the assembly steps required to form increasingly complex organisms, scientists can map the trajectory of evolutionary development and identify key transitions that lead to higher levels of structural and functional complexity. It can guide the design and optimization of synthetic biological systems by minimizing the number of steps required to build new biological pathways, making bioengineering more efficient and scalable. The ability to model and simplify complex biological processes using AT could lead to the development of more robust and adaptable synthetic organisms.
Strings having lengths N ( N 1 ) (e.g. (A3) or (A4)) are necessarily the most balanced: all but one symbol occur b + 1 times and one symbol occurs b + 2 times within a string C ( N 1 ) . However, if the length of a string is constant, it will tend to evolve to decrease the Shannon entropy [16,17] and, hence, to become less balanced. As the energy of a black hole that can be thought of as a balanced bitstring [18] can be two times the energy of the entropy variation sphere that it generates [19], this tendency to imbalance seems to be associated with the minimum energy condition. For example, the Shannon entropy of the SARS-CoV genome containing N = 29903 nucleobases decreased from H = 1.3565 to 1.3562 within two years after the Wuhan outbreak [9,16]. The minimum ASI for this length of the string, given by the OEIS A003313, is a min ( 29903 ) = 19 . Perhaps, entropy (36) has other local entropy minima for b < 4 and for k > 9 and is a monotonically decreasing function only for b 4 . This could be the reason nature has chosen the non-binary radix b = 4 and four nucleobases to encode genetic information.

Author Contributions

WB: first concept of a general method for constructing the string of length N ( N 1 ) leading to Theorem 14; the concept of the doublet matrix (27); outline of the general Method Appendix A; proposition of Theorem 9; a string with exactly two copies of all doublets idea and the formula for its length; numerous clarity corrections and improvements; PM: outline of the general Method Appendix B; the hint for ASI combinatorics; creation of a software supporting Conjecture 16; creation of a string C max ( 24 , 2 ) ; numerous clarity corrections and improvements; AT: formal proof of Theorem 3; proof that the Shannon entropy (30) can be approximated by log 2 ( b ) for large b; proof of the Theorem 12; conceptualization of the proof of the Theorem 13 and equation (17); the 1st paragraph of the discussion Section 3; numerous clarity corrections and improvements; SŁ: The remaining part of the study.

Funding

This research received no external funding.

Data Availability Statement

The public repository for the code written in the MATLAB computational environment and C++ is given under the link https://github.com/szluk/Evolution_of_Information (accessed on 19 September 2024).

Acknowledgments

The authors thank Mariola Bala for her motivation and Rafał Winiarski for noting that the relation (10) is inequality. SŁ thanks his wife, Magdalena Bartocha, for her everlasting support, and his partner and friend, Renata Sobajda, for her prayers.

Conflicts of Interest

Authors Wawrzyniec Bieniawski and Piotr Masierak were employed by the company Łukaszyk Patent Attorneys. The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Appendix A. Method A for Generating C (N-1) String

We start with a string of clear triplets (26). In the 1st step, we create a string containing doublets on the first subdiagonal of the matrix (27) starting with 10
[ 102132 ( b 2 ) ( b 3 ) ( b 1 ) ( b 2 ) ] ,
and we append it to the string (26). With this step, we also eliminate the doublets on the second superdiagonal starting with the doublet 02, as well as the doublet ( b 1 ) 1 . In the 2nd step, we create a string containing doublets on the third superdiagonal beginning with the doublet 03
[ 0314 ( b 5 ) ( b 2 ) ( b 4 ) ( b 1 ) ] ,
and append it to the string created so far. With this step, we also remove the doublet ( b 2 ) 0 and the middle part of the second subdiagonal containing { 31 , 42 , , ( b 2 ) ( b 4 ) } . And so on. Finally, we append 0 if b is even. This process is illustrated in Figure A1 and for 3 b 13 generates the following C ( N 1 ) strings
[ 000111222 | 10 | 20 ] , [ 000111222333 | 102132 | 03 | 0 ] , [ 000111222333444 | 10213243 | 0314 | 20 | 40 ] , [ 000111222333444555 | 1021324354 | 031425 | 0415 | 2053 | 0 ] , [ 000111222333444555666 | 102132435465 | 03142536 | 041526 | 2064 | 0516 | 30 ] , [ 000111222333444555666777 | 10213243546576 | 0314253647 | 04152637 | 2075 | 051627 | 306174 | 0 ] , [ | 1021324354657687 | 031425364758 | 0415263748 | 2086 | 05162738 | 30617285 | 0718 | 40 ] , [ | 102132435465768798 | 03142536475869 | 041526374859 | 2097 | 0516273849 | 3061728396 | 071829 | 408195 | 0 ] , [ | 102132435465768798 a 9 | 031425364758697 a | 0415263748596 a | 20 a 8 | 05162738495 a | 3061728394 a 7 | 0718293 a | 408192 a 6 | 091 a | 50 ] , [ | 102132435465768798 a 9 b a | 031425364758697 a 8 b | 0415263748596 a 7 b | 20 b 9 | 05162738495 a 6 b | 3061728394 a 5 b 8 | 0718293 a 4 b | 408192 a 3 b 7 | 091 a 2 b | 50 a 1 b 6 | 0 ] , [ | 102132435465768798 a 9 b a c b | 031425364758697 a 8 b 9 c | 0415263748596 a 7 b 8 c | 20 c a | 05162738495 a 6 b 7 c | 3061728394 a 5 b 6 c 9 | 0718293 a 4 b 5 c | 408192 a 3 b 4 c 8 | 091 a 2 b 3 c | 50 a 1 b 2 c 7 | 0 b 1 c | 60 ] .
Figure A1. Doublet matrices for 1 b 16 that illustrate the generation of N ( N 1 ) strings according to Method Appendix A. Colored doublets are appended to the initial string of clear triplets in the order indicated by arrows starting from the 1st column or row. Finally, 0 is appended at the end, if b is even.
Figure A1. Doublet matrices for 1 b 16 that illustrate the generation of N ( N 1 ) strings according to Method Appendix A. Colored doublets are appended to the initial string of clear triplets in the order indicated by arrows starting from the 1st column or row. Finally, 0 is appended at the end, if b is even.
Preprints 138884 g0a1

Appendix B. Method B for Generating C (N-1) String

This method is similar to the Method Appendix A. We also start with a string of clear triplets (26) and the matrix of doublets (27) with a crossed diagonal and the first superdiagonal. In the first step, we append the doublet 0 ( b 1 ) (top right doublet of the matrix of doublets (27)) at the end of the string (26). Next, we generally perform the following pairs of iterations:
1.
we check subsequent subdiagonals until we find one that does not contain a doublet present in the string created so far, we append it at the end of this string and proceed to step 2;
2.
we check subsequent superdiagonals until we find one that does not contain a doublet present in the string created so far, we append it at the end of this string and proceed to step 1.
Finally, we append 0 if b is even. The method is illustrated in Figure A2 and for 3 b 13 generates the C ( N 1 ) strings in the form
[ 000111222 | 0210 ] , [ 000111222333 | 03 | 102132 | 0 ] , [ 000111222333444 | 04 | 10213243 | 0314 | 20 ] , [ 000111222333444555 | 05 | 1021324354 | 031425 | 304152 | 0 ] , [ 000111222333444555666 | 06 | 102132435465 | 03142536 | 405162 | 041526 | 30 ] , [ 000111222333444555666777 | 07 | 10213243546576 | 0314253647 | 3041526374 | 051627 | 506172 | 0 ] , [ | 08 | 1021324354657687 | 031425364758 | 304152637485 | 05162738 | 607182 | 061728 | 40 ] , [ | 09 | 102132435465768798 | 03142536475869 | 30415263748596 | 0516273849 | 5061728394 | 071829 | 708192 | 0 ] , [ | 0 a | 102132435465768798 a 9 | 031425364758697 a | 30415263748596 a 7 | 05162738495 a | 60718293 a 4 | 061728394 a | 8091 a 2 | 08192 a | 50 ] , [ | 0 b | 102132435465768798 a 9 b a | 031425364758697 a 8 b | 30415263748596 a 7 b 8 | 05162738495 a 6 b | 5061728394 a 5 b 6 | 0718293 a 4 b | 708192 a 3 b 4 | 091 a 2 b | 90 a 1 b 2 | 0 ] , [ | 0 c | 102132435465768798 a 9 b a c b | 031425364758697 a 8 b 9 c | 30415263748596 a 7 b 8 c 9 | 05162738495 a 6 b 7 c | 5061728394 a 5 b 6 c 7 | 0718293 a 4 b 5 c | 8091 a 2 b 3 c 4 | 08192 a 3 b 4 c | a 0 b 1 c 2 | 0 a 1 b 2 c | 60 ] .
Figure A2. Doublet matrices for 1 b 13 that illustrate the generation of N ( N 1 ) strings according to Method Appendix B. Colored doublets are appended to the initial string of clear triplets in the order indicated by arrows starting from the 1st column or row. Finally, 0 is appended at the end, if b is even.
Figure A2. Doublet matrices for 1 b 13 that illustrate the generation of N ( N 1 ) strings according to Method Appendix B. Colored doublets are appended to the initial string of clear triplets in the order indicated by arrows starting from the 1st column or row. Finally, 0 is appended at the end, if b is even.
Preprints 138884 g0a2

Appendix C. A String with Exactly Two Copies of All Doublets and No Repeated Triplets

A string that has exactly two copies of all doublets and no repeated triplets can have a form (for b = { 1 , 2 , 3 , 4 , 5 } )
[ 0000 ] [ 00001111 | 010 ] [ 000011112222 | 1021 | 202010 ] [ 0000111122223333 | 102132 | 101202303203130 ] [ 00001111222233334444 | 10213243 | 1012023034041304242143203140 ]
and has a length of
N 2 D = 2 b 2 + b + 1 .
A suboptimal method for its generating (with repeated triplets) is illustrated in Figure A3.
Figure A3. Doublet matrices for 1 b 8 that illustrate the generation of N 2 D strings containing exactly two copies of all doublets. Colored doublets are appended to the initial string of clear quadruplets in the order indicated by arrows starting from the 1st column or row. Finally, 0 ( b 1 ) 0 is appended at the end. The 1st superdiagonal is appended as 01234 .
Figure A3. Doublet matrices for 1 b 8 that illustrate the generation of N 2 D strings containing exactly two copies of all doublets. Colored doublets are appended to the initial string of clear quadruplets in the order indicated by arrows starting from the 1st column or row. Finally, 0 ( b 1 ) 0 is appended at the end. The 1st superdiagonal is appended as 01234 .
Preprints 138884 g0a3

Appendix D. Proof of C (N-1) String Theorem

The N ( N 1 ) given by the formula (28) is an odd number for all b. The first element 3 b is the length of the initial string (26) containing b clear triplets and b 2 b ( b 1 ) is the number of doublets available in the matrix (27) after crossing out b doublets on its diagonal and b 1 doublets on its superdiagonal that are present in the starting string (26). By definition, a C ( N 1 ) string cannot have any repetitions. To be the longest, it must contain all doublets in the matrix (27) and all clear triplets. Furthermore, to be the most patternless, this string must maximize Shannon entropy; must be the most balanced. For the string of the form (29) the fractions in the Shannon entropy are
p 0 = N c + 1 N ( N 1 ) , p 1 , 2 , , b 1 = N c N ( N 1 ) ,
where w.l.o.g. we assume that the symbol occurring N c ( b ) + 1 times within the string is c = 0 . To see that the Shannon entropy (30) of a C ( N 1 ) string can be approximated by log 2 ( b ) for large b, first notice that 1 b 2 < 0 and b 2 + b + 1 > 0 , b > 1 . Furthermore, b > 0 , b + 1 b 2 + b + 1 , which implies that the first term
log 2 b + 1 b 2 + b + 1 < 0 .
Similarly the second term,
log 2 b + 2 b 2 + b + 1 < 0 .
Hence, the entropy (30) can be approximated by the dominant contribution from the first term, which is log 2 ( b ) .
The strings given by the relation (28) are not the shortest possible ones. Strings satisfying the equation (29) and satisfying min ( b N c ( b ) + 1 ) > N ( N 1 ) ( b 1 ) are given by b 2 + 1 (OEIS A002522). They can be constructed to contain all possible doublets but without any triplets, starting with an initial balanced string of length 2 b containing b clear doublets ordered from the main diagonal of the doublet matrix (27). Furthermore, their entropies are smaller than the entropies of the strings given by the equation (28). Namely b > 1
1 b 2 b 2 + b + 1 log 2 b + 1 b 2 + b + 1 b + 2 b 2 + b + 1 log 2 b + 2 b 2 + b + 1 > b ( 1 b ) b 2 + 1 log 2 b b 2 + 1 b + 1 b 2 + 1 log 2 b + 1 b 2 + 1 .
Now, assume a contrario that a string C ( N 1 ) longer than N ( N 1 ) can be constructed, say of length N ( N 1 ) = N ( N 1 ) + 1 . But in this case, the corresponding H ( C ( N 1 ) ) < H ( C ( N 1 ) ) . The string of the length given by the formula (28) maximizes the Shannon entropy if it must additionally satisfy the relation (29). Thus, Theorem 14 is proven.

Appendix E. Proof of C (N-k) String Theorem

We start by noting that for b = 1 , N ( N 2 ) ( 1 ) = 5 , as the ASI of [ 00000 ] is the same as the ASI of [ 000000 ] , N ( N 3 ) ( 1 ) = 7 , as the ASI of strings of seven and eight same symbols is three, there is no N ( N 4 ) ( 1 ) , and so on. Hence, Theorem 15 does not hold for b = 1 .
A C ( N 1 ) string contains all doublets. Hence, inserting any basic symbol into any position inevitably leads to a repetition of a doublet. W.l.o.g. we append it at the start of the C ( N 1 ) string, obtaining a string
C k = [ * 000111222 ] , a max ( N ( N 1 ) + 1 , b ) ( C k ) = N 2 .
Another symbol can be introduced to this string without an additional doublet repetition provided that it adjoins the previously introduced symbol, which gives a string
C l = [ * 000111222 ] , a max ( N ( N 1 ) + 2 , b ) ( C l ) = N 2 ,
leading to the repetition of the doublet * or * 0 but not both of them (here we allow = * ). Hence, both the length and the ASI of this string increase by one. Finally, 0 can be appended at the start of this string without an additional doublet repetition provided that 0 and * = 0 and the string becomes
C ( N 2 ) = [ 0 0000111222 ] , a max ( N ( N 1 ) + 3 , b ) ( C ( N 2 ) ) = N 2 ,
leading to the mutually exclusive repetition of the doublet 0 , 0 or 00, so that also both length and the ASI of this string increase by one. An insertion of another symbol into the string (A13) at any position will maintain or even decrease the ASI of this newly formed string. For example, appending 0 at the start of the C ( N 2 ) string (A13), where = 1
[ 0010000111222 ] .
creates a 001 triplet based on 00 doublet leading to a decrease of the ASI of this longer string to a = N 4 as compared to a = N 2 of the string (A13).
C ( N 2 ) string (A13) must contain only two copies of a doublet. Hence, a clear quadruplet ( b b b b ) and a pattern binding different symbols adjoining this quadruplet, such as [ a b b b b c a b c ] , [ a b b b b a b a ] , etc. must be present, so that any C ( N 2 ) string contains only one pair of repeated doublets a b , b b , or { b c , b a } (See also Appendix C). For example, for N = 10 , sixteen bitstrings
[ 0100011110 ] , [ 0111100010 ] , [ 0111101000 ] , [ 0100001110 ̲ ] , [ 0001011110 ] , [ 0001111010 ] , [ 0101111000 ] , [ 0111000010 ]
(an additional eight are given by swapping 0 with 1) have the ASI a = N 2 = 8 , where the underlined string (A15) is the one that we created for b = 2 . Each string C ( N 2 ) (A15) contains three pairs of doublets [ 01 ] , [ 10 ] , and [ * * ] overlapped in such a way that only one pair can be reused from the ASP to decrease the maximum N 1 ASI by one.
Searching for a C ( N 3 ) string, w.l.o.g. we append * 0 at the start of the C ( N 2 ) string (A13)
C k = [ * 010000111222 ] , a max ( N ( N 1 ) + 4 , b ) ( C k ) = N 3 .
If * = 1 , we have the same three doublets 10. Otherwise, we have two pairs of the same doublets * 0 and 10. Both cases are equivalent by Theorem 4. An insertion of another symbol to this string may maintain or even decrease the ASI of this newly formed string. To maximize its ASI, another symbol must adjoin *. Hence, we append at the start, where and * 0 , a string
C l = [ * 010000111222 ] , a max ( N ( N 1 ) + 5 , b ) ( C l ) = N 3 ,
has an increased length and ASI. W.l.o.g. for b = 2 we have four bitstrings (A17), wherein three of them
C 1 ( 12 , 2 ) = [ 000100001110 ] , a C 1 ( 12 , 2 ) = 12 4 = 8 , C 2 ( 12 , 2 ) = [ 110100001110 ] , a C 2 ( 12 , 2 ) = 8 , C 3 ( 12 , 2 ) = [ 100100001110 ] , a C 3 ( 12 , 2 ) = 8 ,
have the same non-maximum ASI and only one have the maximum ASI
C ( N 3 ) ( 12 , 2 ) = [ 010100001110 ] , a max ( N ( N 1 ) + 5 , 2 ) ( C ( N 3 ) ( 12 , 2 ) ) = 12 3 = 9 ,
and cannot be further extended along with the increment of the ASI. Therefore
C ( N 3 ) ( N , b ) = [ 01010000111222 10 ] , a max ( N ( N 1 ) + 5 , b ) ( C ( N 3 ) ( N , b ) ) = N 3 ,
and the ASI of this newly formed string increases again. However, the insertion of another symbol into this string will maintain or even decrease the ASI of this newly formed string. Any C ( N 3 ) string must contain only three copies of a doublet, two copies of a triplet, or two pairs of different doublets. W.l.o.g. we have found the following C ( N k ) strings for b = 2 and 4 k 8
C ( N 2 ) ( 10 , 2 ) = [ 0100001110 ] , a max ( 10 , 2 ) = 8 , C ( N 3 ) ( 12 , 2 ) = [ 010100001110 ] , a max ( 12 , 2 ) = 9 [ 01 ] to C max ( 10 , 2 ) , C ( N 4 ) ( 14 , 2 ) = [ 01010100001110 ] , a max ( 14 , 2 ) = 10 [ 01 ] to C max ( 12 , 2 ) , C ( N 5 ) ( 16 , 2 ) = [ 0101010000001110 ] , a max ( 16 , 2 ) = 11 [ 00 ] to C max ( 14 , 2 ) , C ( N 6 ) ( 18 , 2 ) = [ 010101000000111110 ] , a max ( 18 , 2 ) = 12 [ 11 ] to C max ( 16 , 2 ) , C ( N 7 ) ( 20 , 2 ) = [ 01010100000001111110 ] , a max ( 20 , 2 ) = 13 [ 01 ] to C max ( 18 , 2 ) , C ( N 8 ) ( 22 , 2 ) = [ 0101010000000110111110 ] , a max ( 22 , 2 ) = 14 [ 10 ] to C max ( 20 , 2 ) , C ( N 9 ) ( 24 , 2 ) = [ 010101001000000110111110 ] , a max ( 24 , 2 ) = 15 [ 01 ] to C max ( 22 , 2 ) ,
which led us to the strings (34) for all b > 1 . Thus, Theorem 15 is proven.

Appendix F. Additional Comments for the Proof of Theorem 12

We can also use mathematical induction on the length N of the string, if is is a power of two. For the base case ( N = 2 0 = 1 ) the string consists of a single basic symbol c P 0 ( b ) . Hence, its ASI is a min ( 1 ) 0 and its ASD d s ( 1 , b ) 0 . Therefore, d s ( 1 , b ) = a min ( 1 ) = 0 . Assume now that for all strings of length 2 k less than N, the ASD equals the minimum ASI, that is
d a min ( 2 k , b ) = a min ( 2 k ) 2 k < N .
For some integer k, we construct the minimum ASI string as follows. First, we assemble a doublet from two basic symbols:
c 1 c 2 = C ( 2 , b ) , c 1 , c 2 P 0 ( b ) .
Its ASI is a min ( 2 ) = 1 and its ASD is d s ( 2 , b ) = 1 . Then for each k 2 we have C ( 2 k 1 , b ) with a min ( 2 k 1 ) = k 1 and d s ( 2 k 1 , b ) = k 1 and we construct C ( 2 k , b ) by joining two copies of C ( 2 k 1 , b )
C ( 2 k 1 , b ) C 2 k 1 , b ) = C ( 2 k , b ) .
The ASI of C ( 2 k , b ) is equal to
a min ( 2 k ) = a min ( 2 k 1 ) + 1 = k ,
and the ASD is equal to
d s ( 2 k , b ) max d ( s 1 ) L ( 2 k 1 , b ) , d ( s 1 ) R ( 2 k 1 , b ) + 1 = ( k 1 ) + 1 = k .
Therefore, d s ( 2 k , b ) = a min ( 2 k ) = k in this case.

Appendix G. Misunderstanding Assembly Pools

Consider the following mapping [20] between a working ASP P 3 ( 5 ) containing five basic symbols and three strings made of these symbols in three steps and the initial ASP of radix b = 8
P 3 ( 5 ) P 0 ( 8 ) 0 0 1 1 2 2 3 3 4 4 20 5 201 6 2012 7
Now consider the string
C k ( 11 , 5 ) = [ 20123242012 ]
assembled beginning with the initial ASP P 0 ( 5 ) and having the ASI a ( 11 , 5 ) ( C k ) = 7 only two steps above a min ( 11 ) = 5 , as we can assemble this string as the string
C l ( 8 , 8 ) = [ 20123247 ]
of length N = 8 in 7 steps with the initial ASP P 0 ( 8 ) and then, using the mapping (A27), it will correspond to the string (A28). However, as we have shown in Section 2, N ( N 1 ) ( 8 ) = 73 7 . In fact the latter string (A29) should be assembled as
C m ( 5 , 8 ) = [ 73247 ]
with the ASI a ( 5 , 8 ) ( C m ) = 5 1 = 4 and with the initial ASP P 0 ( 8 ) , as 2012 7 according to the mapping (A27). Hence, considering a set P 3 ( 5 ) as the initial ASP is a gross misunderstanding; there is only one initial ASP for a given b and many different working ASPs for b > 1 and s > 1 ( P 1 ( 1 ) = { 0 , 00 } ). Furthermore, basic objects must have the same vanishing ASD (13).

References

  1. S. M. Marshall, A. R. G. S. M. Marshall, A. R. G. Murray, and L. Cronin, “A probabilistic framework for identifying biosignatures using Pathway Complexity,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 375, p. 20160342, Dec. 2017.
  2. S. Imari Walker, L. S. Imari Walker, L. Cronin, A. Drew, S. Domagal-Goldman, T. Fisher, and M. Line, “Probabilistic biosignature frameworks,” in Planetary Astrobiology (V. Meadows, G. Arney, B. Schmidt, and D. J. Des Marais, eds.), pp. 1–1, University of Arizona Press, 2019.
  3. V. S. Meadows, G. N. Arney, B. E. Schmidt, and D. J. Des Marais, eds., Planetary astrobiology. University of Arizona space science series, Tucson: The University of Arizona Press; Houston: Lunar and Planetary Institute, 2020. [Google Scholar]
  4. Y. Liu, C. Y. Liu, C. Mathis, M. D. Bajczyk, S. M. Marshall, L. Wilbraham, and L. Cronin, “Exploring and mapping chemical space with molecular assembly trees,” Science Advances, vol. 7, p. eabj2465, Sept. 2021.
  5. S. M. Marshall, C. S. M. Marshall, C. Mathis, E. Carrick, G. Keenan, G. J. T. Cooper, H. Graham, M. Craven, P. S. Gromski, D. G. Moore, S. I. Walker, and L. Cronin, “Identifying molecules as biosignatures with assembly theory and mass spectrometry,” Nature Communications, vol. 12, p. 3033, 21. 20 May.
  6. S. M. Marshall, D. G. S. M. Marshall, D. G. Moore, A. R. G. Murray, S. I. Walker, and L. Cronin, “Formalising the Pathways to Life Using Assembly Spaces,” Entropy, vol. 24, p. 884, 22. 20 June.
  7. A. Sharma, D. A. Sharma, D. Czégel, M. Lachmann, C. P. Kempes, S. I. Walker, and L. Cronin, “Assembly theory explains and quantifies selection and evolution,” Nature, vol. 622, pp. 321–328, Oct 2023.
  8. M. Jirasek, A. M. Jirasek, A. Sharma, J. R. Bame, S. H. M. Mehr, N. Bell, S. M. Marshall, C. Mathis, A. MacLeod, G. J. T. Cooper, M. Swart, R. Mollfulleda, and L. Cronin, “Investigating and Quantifying Molecular Complexity Using Assembly Theory and Spectroscopy,” ACS Central Science, vol. 10, pp. 1054–1064, 24. 20 May.
  9. S. Łukaszyk and W. Bieniawski, “Assembly Theory of Binary Messages,” Mathematics, vol. 12, p. 1600, 24. 20 May.
  10. S. Raubitzek, A. S. Raubitzek, A. Schatten, P. König, E. Marica, S. Eresheim, and K. Mallinger, “Autocatalytic Sets and Assembly Theory: A Toy Model Perspective,” Entropy, vol. 26, p. 808, Sept. 2024.
  11. P. Francis, “Dilexit nos: Encyclical letter on the human and divine love of the heart of jesus christ,” 2024. Accessed: 2024-11-01.
  12. S. Łukaszyk and A. Tomski, “Omnidimensional Convex Polytopes,” Symmetry, vol. 15, mar 2023.
  13. “Book of John [1.3],” c90.
  14. L. Cronin, “Exploring assembly index of strings is a good way to show why assembly & entropy are intrinsically different..” https://x.com/leecronin/status/1850289225935257665, 2024. Accessed: 2024-11-01.
  15. S. Pagel, A. S. Pagel, A. Sharma, and L. Cronin, “Mapping Evolution of Molecules Across Biochemistry with Assembly Theory,” 2024.
  16. M. M. Vopson, “The second law of infodynamics and its implications for the simulated universe hypothesis,” AIP Advances, vol. 13, p. 105308, Oct. 2023.
  17. S. Łukaszyk, “Shannon entropy of chemical elements,” European Journal of Applied Sciences, vol. 11, p. 443–458, Jan. 2024.
  18. S. Łukaszyk, Black Hole Horizons as Patternless Binary Messages and Markers of Dimensionality, ch. 15, pp. 317–374. Nova Science Publishers, 2023.
  19. S. Łukaszyk, “Life as the explanation of the measurement problem,” Journal of Physics: Conference Series, vol. 2701, p. 012124, Feb 2024.
  20. L. Ozelim, A. L. Ozelim, A. Uthamacumaran, F. S. Abrahão, S. Hernández-Orozco, N. A. Kiani, J. Tegnér, and H. Zenil, “Assembly Theory Reduced to Shannon Entropy and Rendered Redundant by Naive Statistical Algorithms,” 2024.
Figure 1. Shannon entropies H ( C ( N k ) ) for 1 k 9 and 2 b 5 .
Figure 1. Shannon entropies H ( C ( N k ) ) for 1 k 9 and 2 b 5 .
Preprints 138884 g001
Figure 2. Lower assembly index bound (red) and upper bounds (green) for 1 b 4 , lower assembly depth bound (blue) of C max ( N , b ) strings for b > 1 , log 2 ( N ) (red, dash-dot), and OEIS A014701 sequence (cyan) for 0 < N 33 .
Figure 2. Lower assembly index bound (red) and upper bounds (green) for 1 b 4 , lower assembly depth bound (blue) of C max ( N , b ) strings for b > 1 , log 2 ( N ) (red, dash-dot), and OEIS A014701 sequence (cyan) for 0 < N 33 .
Preprints 138884 g002
Table 1. Distributions of n-plets in strings of maximum ASI.
Table 1. Distributions of n-plets in strings of maximum ASI.
N × 2 ( b = 1 ) × 2 ( b = 2 ) × 2 ( b = 3 ) × 2 ( b = 4 ) × 4 ( b ) × 8 ( b ) × 16 ( b ) × 32 ( b ) last × 8 last × 4 last × 2 last × 1 a max ( N , 1 ) a max ( N , 2 ) a max ( N , 3 ) a max ( N , 4 )
1 0 0 0 0 0 0 0 0 N N N 0 0 0 0
2 1 1 1 1 0 0 0 0 N N N 1 1 1 1
3 1 1 1 1 0 0 0 0 N N Y 2 2 2 2
4 1 2 2 2 1 0 0 0 N N N 2 3 3 3
5 1 2 2 2 1 0 0 0 N N Y 3 4 4 4
6 1 3 3 3 1 0 0 0 N Y N 3 5 5 5
7 1 3 3 3 1 0 0 0 N Y Y 4 6 6 6
8 1 3 4 4 2 1 0 0 N N N 3 6 7 7
9 1 3 4 4 2 1 0 0 N N Y 4 7 8 8
10 1 4 5 5 2 1 0 0 N Y N 4 8 9 9
11 1 3 5 5 2 1 0 0 N Y Y 5 8 10 10
12 1 4 6 6 3 1 0 0 Y N N 4 9 11 11
13 1 3 6 6 3 1 0 0 Y N Y 5 9 12 12
14 1 4 6 7 3 1 0 0 Y Y N 5 10 12 13
15 1 3 6 7 3 1 0 0 Y Y Y 6 10 13 14
16 1 4 7 8 4 2 1 0 N N N N 4 11 14 15
17 1 3 6 8 4 2 1 0 N N N Y 5 11 14 16
18 1 4 7 9 4 2 1 0 N N Y N 5 12 15 17
19 1 3 6 9 4 2 1 0 N N Y Y 6 12 15 18
20 1 4 7 10 5 2 1 0 N Y N N 5 13 16 19
21 1 3 6 10 5 2 1 0 N Y N Y 6 13 16 20
22 1 4 7 10 5 2 1 0 N Y Y N 6 14 17 20
23 1 3 6 10 5 2 1 0 N Y Y Y 7 14 17 21
24 1 4 7 11 6 3 1 0 Y N N N 5 15 18 22
25 1 3 6 10 6 3 1 0 Y N N Y 6 15 18 22
26 1 4 7 11 6 3 1 0 Y N Y N 6 16 19 23
27 1 3 6 10 6 3 1 0 Y N Y Y 7 16 19 23
28 1 4 7 11 7 3 1 0 Y Y N N 6 17 20 24
29 1 3 6 10 7 3 1 0 Y Y N Y 7 17 20 24
30 1 4 7 11 7 3 1 0 Y Y Y N 7 18 21 25
31 1 3 6 11 7 3 1 0 Y Y Y Y 8 18 21 25
32 1 4 7 11 8 4 2 1 N N N N 5 19 22 26
33 1 3 6 11 8 4 2 1 N N N Y 6 19 22 26
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated