A Set Optimization Approach to Utility Maximization Under Transaction Costs

Total Page:16

File Type:pdf, Size:1020Kb

A Set Optimization Approach to Utility Maximization Under Transaction Costs A set optimization approach to utility maximization under transaction costs Andreas H. Hamel,∗ Sophie Qingzhen Wangy Abstract A set optimization approach to multi-utility maximization is presented, and duality re- sults are obtained for discrete market models with proportional transaction costs. The novel approach admits to obtain results for non-complete preferences, where the formulas derived closely resemble but generalize the scalar case. Keywords. utility maximization, non-complete preference, multi-utility representation, set optimization, duality theory, transaction costs JEL classification. C61, G11 1 Introduction In this note, we propose a set-valued approach to utility maximization for market models with transaction costs. For finite probability spaces and a one-period set-up, we derive results which resemble very closely the scalar case as discussed in [4, Theorem 3.2.1]. This is far beyond other approaches in which only scalar utility functions are used as, for example, in [1, 3], where a complete preference for multivariate position is assumed. As far as we are aware of, there is no argument justifying such strong assumption, and it does not seem appropriate for market models with transaction costs. On the other hand, recent results on multi-utility representations as given, among others, in [5] lead to the question how to formulate and solve an \expected multi-utility" maximiza- tion problem. The following optimistic goal formulated by Bosi and Herden in [2] does not seem achievable since, in particular, there is no satisfactory multi-objective duality which matches the power of the scalar version: `Moreover, as it reduces finding the maximal ele- ments in a given subset of X with respect to to a multi-objective optimization problem (cf. Evren and Ok, 2011), in applications, this approach is likely to be more useful than the Richter-Peleg approach.' The question remains how duality could work in a multi-utility framework. Using a simple model with finitely many utility functions as an exemplary case, our answer is that it works almost in the same way as in the scalar case if set optimization methods are used. ∗Free University Bozen, Faculty of Economics and Management, [email protected] yHarvard University Department of Economics, [email protected] 1 Our approach is different, and it has several advantages. First, we demonstrate that the \usual" duality can be established if one allows for a set-valued extension of the problem. This means that the vector-valued problem is replaced by a problem where the objective function maps into a well-defined complete lattice of sets. Secondly, the problem formulation allows to separate the market model, namely the time dependent solvency cone, from the the preference relation expressed by a (vector-valued) utility function and provides a link to no-arbitrage type results for market models with transaction costs as, for example, given in [16]. Our model can be interpreted as follows: The decision maker has a complete preference for random positions of each asset in the market separately which is representable by a utility function (the classic von Neumann-Morgenstern set-up). These preferences work \component-wise,' i.e. they are determined independently of the other assets. This may seem very restrictive and is indeed not the most general situation. However, there are two arguments in favor of studying it. First, it admits non-complete preferences which goes beyond the above quoted references and actually provides a path for a solution of the corresponding (multi-)utility maximization problem. Secondly, via the market model, an exchange mechanism is built into the model which makes the components of the portfolio dependent on each other when one looks for best alternatives. The underlying idea is that one can exchange assets, but cannot exchange utility of one asset for utility of another. The main tool is a set-valued Lagrangian, to which recent duality results for set-valued functions from [10] are applied (compare also the survey [8]). The resulting formulas look very much like the scalar ones, a feature that is nearly impossible to achieve if one would only apply multi-objective optimization duality. The results are based on the senior thesis of the second author written in 2011 at Princeton University and supervised by the first author and B. Rudloff (now at Vienna University for Economics and Business). 2 Problem formulation Let (Ω;P ) be a finite probability space where the σ-algebra is assumed to be the power set of Ω = f!1;!2;:::;!N g with pn := P (f!ng) > 0 for all n 2 f1;:::;Ng. A one-period conical model for a market with d assets is given by a pair (K0;KT = KT (!)) d d d d of finitely generated convex cones satisfying IR+ ⊆ K0 6= IR and IR+ ⊆ KT (!) 6= IR for all ! 2 Ω. The cones K0, KT are called solvency cones and may arise, for example, due to explicit proportional transaction costs (see [13]) or bid-ask spreads (see [16]). d d 0 The linear space of IR -valued random variables X :Ω ! IR is denoted by Ld := 0 dN Ld(Ω;P ) which can be identified with IR . Further, denote 0 0 Ld (KT ) = X 2 Ld j 8! 2 Ω: X (!) 2 KT (!) ; 0 0 d 0 and Ld + = Ld IR+ . Finally, 1I 2 Ld stands for the function with 1I(!) = 1 for all ! 2 Ω. In this note, it is assumed that d utility functions Ui : IR ! IR [ {−∞}, i = 1; : : : ; d are given which are concave and non-decreasing. We define a vector-valued function U : IRd ! 2 IRd [ {−∞} by ( (U (x ) ;U (x ) ;:::;U (x ))T : 8i 2 f1; 2; : : : ; dg : x 2 dom U U (x) = 1 1 2 2 d d i i −∞ : otherwise This can be interpreted as follows. The investor has a scalar utility function for each of the d assets which is independent from holdings in the others, and a portfolio is not acceptable for the investor if one asset produces a utility −∞. Of course, this means that the investor has a complete preference for random positions of each asset which admits a von Neumann- Morgenstern representation. We note that even this might be a strong assumption and refer to [6, Chap. 2] for further details. However, this assumption is in some respect much less strong than the existence of a function U^ : IRd ! IR [ {−∞} which represents a complete preference (a total order) on the set of all multivariate positions. This is the starting point e.g. in the recent [1, 3] d Since the Ui's are concave and non-decreasing, the function U is IR+-concave, that is 0 d 0 0 d 8t 2 (0; 1) ; 8x; x 2 IR : U (tx + (1 − t) x ) 2 tU (x) + U ((1 − t) x ) − IR+; d and U is IR+-monotone increasing, that is 0 d 0 d x 2 x + IR+ ) U (x) 2 U (x ) + IR+ where we agree upon x + (−∞) = (−∞) + x = −∞, t (−∞) = −∞ for all t > 0 and −∞ ≤ x for all x 2 IRd. The basic problem of this note is 0 maximize IE[U (X)] subject to X 2 x1I − K01I − Ld (KT ) where x 2 IRd is the given initial endowment and the expected value is understood component- wise with IE[−∞] = −∞. 0 The set x1I − K01I − Ld (KT ) is precisely the set of (random) portfolios which can be obtained by trading at time t = 0 and time t = T starting with the initial endowment x 2 IRd. The first question is how the maximization is understood. In contrast to (more popular) vector approaches, we will understand the above problem as a set-valued one. The advantage of this approach is that the notions of supremum and infimum make sense, and consequently, that a complete duality theory is available. One may compare the appendix and the survey [8] for details. We define the set d d n d d o G(IR ; −IR+) = A ⊆ IR j A = cl co A − IR+ d d and introduce an addition on G IR ; −IR+ by ( cl fa1 + a2 j a1 2 A1; a2 2 A2g : A1;A2 6= ; A1 ⊕ A2 = ; ; : otherwise and a multiplication · with non-negative real numbers by 8 −IRd : t = 0 <> + t · A = fta j a 2 Ag : t > 0;A 6= ; :> ; : t > 0;A = ; 3 d d On G IR ; −IR+ , the inclusion ⊆ is a partial order which is compatible with the two d d algebraic operations just defined, thus the quadruple G IR ; −IR+ ; ⊕; ·; ⊆ is an ordered conlinear space in the sense of [7, 8]. We shall denote this structure by GO and drop the · for multiplication in most cases. The infimum and supremum of a set A ⊆ GO are given by [ \ sup A = cl co A; inf A = A A2A A2A which are clearly elements of GO, thus GO even is a complete lattice (see [7, 8]). Here, we agree upon sup A = ; in GO for A = ;. Our basic problem now is to find, in GO, n d 0 o sup IE[U (X)] − IR+ j X 2 x1I − K01I − Ld (KT ) (UMAX) d where we use the convention IE[U (X)] − IR+ = ; whenever IE[U (X)] = −∞. The plan of the remainder of the paper is as follows. In the next section, we will give a dual characterization of the constraint of (UMAX). Then, we introduce a Lagrangian function, define primal and dual value functions and establish a strong duality theorem which provides the essentials for a solution of (UMAX). The reader may compare [4, Chapter 3] for a concise presentation for the scalar case d = 1. It is the main purpose of this note to demonstrate that the vector-valued case d > 1 can be dealt with by means of set-valued duality as proposed in [7, 10], and that in doing so one obtains meaningful analogs to the well-known scalar formulas.
Recommended publications
  • Proofs in Elementary Analysis by Branko´Curgus January 15, 2016
    Proofs in Elementary Analysis by Branko Curgus´ January 15, 2016 Contents Chapter 1. Introductory Material 5 1.1. Goals 5 1.2. Strategies 5 1.3. Mathematics and logic 6 1.4. Proofs 8 1.5. Four basic ingredients of a Proof 10 Chapter 2. Sets and functions 11 2.1. Sets 11 2.2. Functions 14 2.3. Cardinality of sets 17 Chapter 3. The Set R of real numbers 19 3.1. Axioms of a field 19 3.2. Axioms of order in a field 21 3.3. Three functions: the unit step, the sign and the absolute value 23 3.4. Intervals 25 3.5. Bounded sets. Minimum and Maximum 28 3.6. The set N 29 3.7. Examples and Exercises related to N 32 3.8. Finite sets, infinite sets, countable sets 34 3.9. More on countable sets 37 3.10. The sets Z and Q 41 3.11. The Completeness axiom 42 3.12. More on the sets N, Z and Q 45 3.13. Infimum and supremum 47 3.14. The topology of R 49 3.15. The topology of R2 51 Chapter 4. Sequences in R 53 4.1. Definitions and examples 53 4.2. Bounded sequences 54 4.3. Thedefinitionofaconvergentsequence 55 4.4. Finding N(ǫ)foraconvergentsequence 57 4.5. Two standard sequences 60 4.6. Non-convergent sequences 61 4.7. Convergence and boundedness 61 4.8. Algebra of limits of convergent sequences 61 4.9. Convergent sequences and the order in R 62 4.10. Themonotonicconvergencetheorem 63 3 4 CONTENTS 4.11.
    [Show full text]
  • Supremum and Infimum of Set of Real Numbers
    ISSN (Online) :2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 9, September 2015 Supremum and Infimum of Set of Real Numbers M. Somasundari1, K. Janaki2 1,2Department of Mathematics, Bharath University, Chennai, Tamil Nadu, India ABSTRACT: In this paper, we study supremum and infimum of set of real numbers. KEYWORDS: Upper bound, Lower bound, Largest member, Smallest number, Least upper bound, Greatest Lower bound. I. INTRODUCTION Let S denote a set(a collection of objects). The notation x∈ S means that the object x is in the set S, and we write x ∉ S to indicate that x is not in S.. We assume there exists a nonempty set R of objects, called real numbers, which satisfy the ten axioms listed below. The axioms fall in anatural way into three groups which we refer to as the field axioms, the order axioms, and the completeness axiom( also called the least-upper-bound axiom or the axiom of continuity)[10]. Along with the R of real numbers we assume the existence of two operations, called addition and multiplication, such that for every pair of real numbers x and ythe sum x+y and the product xy are real numbers uniquely dtermined by x and y satisfying the following axioms[9]. ( In the axioms that appear below, x, y, z represent arbitrary real numbers unless something is said to the contrary.). In this section, we define axioms[6]. The field axioms Axiom 1. x+y = y+x, xy =yx (commutative laws) Axiom 2.
    [Show full text]
  • Arxiv:2005.13313V1
    Single Valued Neutrosophic Filters 1Giorgio Nordo, 2Arif Mehmood, 3Said Broumi 1MIFT - Department of Mathematical and Computer Science, Physical Sciences and Earth Sciences, Messina University, Italy. 2Department of Mathematics and Statistics, Riphah International University Sector I-14, Islamabad, Pakistan 3Laboratory of Information Processing, Faculty of Science, University Hassan II, Casablanca, Morocco [email protected], [email protected], [email protected] Abstract In this paper we give a comprehensive presentation of the notions of filter base, filter and ultrafilter on single valued neutrosophic set and we investigate some of their properties and relationships. More precisely, we discuss properties related to filter completion, the image of neutrosophic filter base by a neutrosophic induced mapping and the infimum and supremum of two neutrosophic filter bases. Keywords: neutrosophic set, single valued neutrosphic set, neutrosophic induced mapping, single valued neutrosophic filter, neutrosophic completion, single valued neutrosophic ultrafilter. 1 Introduction The notion of neutrosophic set was introduced in 1999 by Smarandache [20] as a generalization of both the notions of fuzzy set introduced by Zadeh in 1965 [22] and intuitionistic fuzzy set introduced by Atanassov in 1983 [2]. In 2012, Salama and Alblowi [17] introduced the notion of neutrosophic topological space which gen- eralizes both fuzzy topological spaces given by Chang [8] and that of intuitionistic fuzzy topological spaces given by Coker [9]. Further contributions to Neutrosophic Sets Theory, which also involve many fields of theoretical and applied mathematics were recently given by numerous authors (see, for example, [6], [3], [4], [15], [1], [13], [14] and [16]). In particular, in [18] Salama and Alagamy introduced and studied the notion of neutrosophic filter and they gave some applications to neutrosophic topological space.
    [Show full text]
  • Sun Studio 9: Fortran 95 Interval Arithmetic
    Fortran 95 Interval Arithmetic Programming Reference Sun™ Studio 9 Sun Microsystems, Inc. www.sun.com Part No. 817-6704-10 July 2004, Revision A Submit comments about this document at: http://www.sun.com/hwdocs/feedback Copyright © 2004 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. Use is subject to license terms. This distribution may include materials developed by third parties. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and in other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, Java, and JavaHelp are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon architecture developed by Sun Microsystems, Inc. This product is covered and controlled by U.S. Export Control laws and may be subject to the export or import laws in other countries. Nuclear, missile, chemical biological weapons or nuclear maritime end uses or end users, whether direct or indirect, are strictly prohibited. Export or reexport to countries subject to U.S. embargo or to entities identified on U.S. export exclusion lists, including, but not limited to, the denied persons and specially designated nationals lists is strictly prohibited.
    [Show full text]
  • Star Order and Topologies on Von Neumann Algebras
    Star order and topologies on von Neumann algebras Martin Bohata1 Department of Mathematics, Faculty of Electrical Engineering, Czech Technical University in Prague, Technick´a2, 166 27 Prague 6, Czech Republic Abstract: The goal of the paper is to study a topology generated by the star order on von Neumann algebras. In particular, it is proved that the order topology under investigation is finer than σ-strong* topology. On the other hand, we show that it is comparable with the norm topology if and only if the von Neumann algebra is finite- dimensional. AMS Mathematics Subject Classification: 46L10; 06F30; 06A06 1 Introduction In the order-theoretical setting, the notion of convergence of a net was introduced by G. Birkhoff [3, 4]. Let (P, ≤) be a poset and let x ∈ P . If(xα)α∈Γ is an increasing net in (P, ≤) with the supremum x, we write xα ↑ x. Similarly, xα ↓ x means that (xα)α∈Γ is a decreasing net in (P, ≤) with the infimum x. We say that a net (xα)α∈Γ is order convergent to x in (P, ≤) if there are nets (yα)α∈Γ and (zα)α∈Γ in (P, ≤) such that yα ≤ xα ≤ zα for all α ∈ Γ, yα ↑ x, and zα ↓ x. If(xα)α∈Γ is order convergent o to x, we write xα → x. It is easy to see that every net is order convergent to at most one point. The order convergence determines a natural topology on a poset (P, ≤) as follows. A subset C of P is said to be order closed if no net in C is order convergent to a point in P \ C.
    [Show full text]
  • Control of Stochastic Discrete Event Systems Modeled by Probabilistic Languages 1
    Control of Stochastic Discrete Event Systems Modeled by Probabilistic Languages 1 Ratnesh Kumar Dept. of Electrical Engineering, Univ. of Kentucky Lexington, KY 40506 Vijay K. Garg Dept. of Elec. and Comp. Eng., Univ. of Texas at Austin Austin, TX 78712 1This research is supported in part by the National Science Foundation under Grants NSF- ECS-9409712, NSF-ECS-9709796, ECS-9414780, and CCR-9520540, in part by the Office of Naval Research under the Grant ONR-N00014-96-1-5026, a General Motors Fellowship, a Texas Higher Education Coordinating Board Grant ARP-320, and an IBM grant. Abstract In earlier papers [7, 6, 5] we introduced the formalism of probabilistic languages for mod- eling the stochastic qualitative behavior of discrete event systems (DESs). In this paper we study their supervisory control where the control is exercised by dynamically disabling cer- tain controllable events thereby nulling the occurrence probabilities of disabled events, and increasing the occurrence probabilities of enabled events proportionately. This is a special case of \probabilistic supervision" introduced in [15]. The control objective is to design a supervisor such that the controlled system never executes any illegal traces (their occurrence probability is zero), and legal traces occur with minimum pre-specified occurrence proba- bilities. In other words, the probabilistic language of the controlled system lies within a pre-specified range, where the upper bound is a \non-probabilistic language" representing a legality constraint. We provide a condition for the existence of a supervisor. We also present an algorithm to test this existence condition when the probabilistic languages are regular (so that they admit probabilistic automata representation with finitely many states).
    [Show full text]
  • Recap from Last Time
    Recap from last time The real numbers are characterized by being a complete, ordered field. Complete means that every non-empty subset that is bounded above has a least upper bound. Supremum is a synonym for least upper bound. Infimum is a synonym for greatest lower bound. You can go back and forth between infimum and supremum by observing that inf(S) = − sup(−S), where −S means the set of negatives of all the elements of the set S. If sup(S) is an element of the set S, you are allowed to write max(S). Similarly for inf and min. A consequence of completeness Theorem (Archimedean property of R) If x and y are two arbitrary positive real numbers, then there exists a natural number n such that nx > y. Proof. Seeking a contradiction, suppose for some x and y no such n exists. That is, nx ≤ y for every positive integer n. Then dividing by the positive number x shows that n ≤ y=x for every positive integer n. Since the natural numbers have an upper bound y=x, there is by completeness a least upper bound, say s. When n is a natural number, n ≤ s; but n + 1 is a natural number too, so n + 1 ≤ s. Add −1 to both sides to deduce that n ≤ s − 1 for every natural number n. Then s − 1 is an upper bound for the natural numbers that is smaller than the supposed least upper bound s. Contradiction. Density of Q in R If x < y, then there exists a rational number between x and y.
    [Show full text]
  • Factorization Invariants of Puiseux Monoids Generated by Geometric Sequences
    FACTORIZATION INVARIANTS OF PUISEUX MONOIDS GENERATED BY GEOMETRIC SEQUENCES SCOTT T. CHAPMAN, FELIX GOTTI, AND MARLY GOTTI Abstract. We study some of the factorization invariants of the class of Puiseux monoids generated by geometric sequences, and we compare and contrast them with the known results for numerical monoids generated by arithmetic sequences. The class n we study here consists of all atomic monoids of the form Sr := hr j n 2 N0i, where r is a positive rational. As the atomic monoids Sr are nicely generated, we are able to give detailed descriptions of many of their factorization invariants. One distinguishing characteristic of Sr is that all its sets of lengths are arithmetic sequences of the same distance, namely ja − bj, where a; b 2 N are such that r = a=b and gcd(a; b) = 1. We prove this, and then use it to study the elasticity and tameness of Sr. 1. Prologue There is little argument that the study of factorization properties of rings and integral domains was a driving force in the early development of commutative algebra. Most of this work centered on determining when an algebraic structure has \nice" factorization properties (i.e., what today has been deemed a unique factorization domain (or UFD). It was not until the appearance of papers in the 1970s and 1980s by Skula [42], Zaks [46], Narkiewicz [39, 40], Halter-Koch [36], and Valenza1 [44] that there emerged interest in studying the deviation of an algebraic object from the UFD condition. Implicit in much of this work is the realization that problems involving factorizations of elements in a ring or integral domain are merely problems involving the multiplicative semigroup of the object in question.
    [Show full text]
  • Real Analysis
    Real Analysis Part I: MEASURE THEORY 1. Algebras of sets and σ-algebras For a subset A ⊂ X, the complement of A in X is written X − A. If the ambient space X is understood, in these notes we will sometimes write Ac for X − A. In the literature, the notation A′ is also used sometimes, and the textbook uses A˜ for the complement of A. The set of subsets of a set X is called the power set of X, written 2X . Definition. A collection F of subsets of a set X is called an algebra of sets in X if 1) ∅,X ∈F 2) A ∈F⇒ Ac ∈F 3) A,B ∈F⇒ A ∪ B ∈F In mathematics, an “algebra” is often used to refer to an object which is simulta- neously a ring and a vector space over some field, and thus has operations of addition, multiplication, and scalar multiplication satisfying certain compatibility conditions. How- ever the use of the word “algebra” within the phrase “algebra of sets” is not related to the preceding use of the word, but instead comes from its appearance within the phrase “Boolean algebra”. A Boolean algebra is not an algebra in the preceding sense of the word, but instead an object with operations AND, OR, and NOT. Thus, as with the phrase “Boolean algebra”, it is best to treat the phrase “algebra of sets” as a single unit rather than as a sequence of words. For reference, the definition of a Boolean algebra follows. Definition. A Boolean algebra consists of a set Y together with binary operations ∨, ∧, and a unariy operation ∼ such that 1) x ∨ y = y ∨ x; x ∧ y = y ∧ x for all x,y ∈ Y 2) (x ∨ y) ∨ z = x ∨ (y ∨ z); (x ∧ y) ∧ z = x ∧ (y ∧ z) forall x,y,z ∈ Y 3) x ∨ x = x; x ∧ x = x for all x ∈ Y 4) (x ∨ y) ∧ x = x; (x ∧ y) ∨ x = x for all x ∈ Y 5) x ∧ (y ∨ z)=(x ∧ y) ∨ (x ∧ z) forall x,y,z ∈ Y 6) ∃ an element 0 ∈ Y such that 0 ∧ x = 0 for all x ∈ Y 7) ∃ an element 1 ∈ Y such that 1 ∨ x = 1 for all x ∈ Y 8) x ∧ (∼ x)=0; x ∨ (∼ x)=1 forall x ∈ Y Other properties, such as the other distributive law x ∨ (y ∧ z)=(x ∨ y) ∧ (x ∨ z), can be derived from the ones listed.
    [Show full text]
  • A Ternary Variety Generated by Lattices
    Commentationes Mathematicae Universitatis Carolinae William H. Cornish A ternary variety generated by lattices Commentationes Mathematicae Universitatis Carolinae, Vol. 22 (1981), No. 4, 773--784 Persistent URL: http://dml.cz/dmlcz/106119 Terms of use: © Charles University in Prague, Faculty of Mathematics and Physics, 1981 Institute of Mathematics of the Academy of Sciences of the Czech Republic provides access to digitized documents strictly for personal use. Each copy of any part of this document must contain these Terms of use. This paper has been digitized, optimized for electronic delivery and stamped with digital signature within the project DML-CZ: The Czech Digital Mathematics Library http://project.dml.cz COMMENTATIONES MATHEMATICAE UNIVERSITATIS CAROLINAE 22.4 (1981) A TERNARY VARIETY GENERATED BY LATTICES William H. CORNISH Abatract: The class of all subreducts of lattices, with respect to the ternary lattice-polynomial sCxfyfz) * * xACyvz), is a 4-baeed variety. Within ita lattice ot aubvarietiea, the subvariety of distributive supremum algeb­ ras ia atomic and needs 4 variables in any equatlonal des­ cription. Key words: Subreduct, lattice, neariattice, distribu— tivity. Classification: 03005, 06A12, 06D99, 08B10 0* Introduction. Consider the variety of algebras (A;a) sf typ#<3> that satisfy the following identities CS1) aCxfxfy) » xf CS2) aCxfy,y) »s(yfxfx)f CS3) s(xfyfz) «s(xfzfy)f (54) wAa(xfyfz) *s(iAx,y,zl, (55) 8(xfa(yfvfw)f aCzfvfw)) £aCxfvfw), where A is the derived operation given by CD1) xAy * aCxfyfy), and £ Is the derived relation defined by CDS) x^y if and only if x « XAy. Then, we ahow that an algebra la in thla variety if and only if it ia a subalgebra of s reduct (L;a), where CL; A ,V ) ia - 773 - a lattice and s(x,y,z) » xACyvz).
    [Show full text]
  • An Introduction to Real Analysis John K. Hunter1
    An Introduction to Real Analysis John K. Hunter1 Department of Mathematics, University of California at Davis 1The author was supported in part by the NSF. Thanks to Janko Gravner for a number of correc- tions and comments. Abstract. These are some notes on introductory real analysis. They cover the properties of the real numbers, sequences and series of real numbers, limits of functions, continuity, differentiability, sequences and series of functions, and Riemann integration. They don't include multi-variable calculus or contain any problem sets. Optional sections are starred. c John K. Hunter, 2014 Contents Chapter 1. Sets and Functions 1 1.1. Sets 1 1.2. Functions 5 1.3. Composition and inverses of functions 7 1.4. Indexed sets 8 1.5. Relations 11 1.6. Countable and uncountable sets 14 Chapter 2. Numbers 21 2.1. Integers 22 2.2. Rational numbers 23 2.3. Real numbers: algebraic properties 25 2.4. Real numbers: ordering properties 26 2.5. The supremum and infimum 27 2.6. Real numbers: completeness 29 2.7. Properties of the supremum and infimum 31 Chapter 3. Sequences 35 3.1. The absolute value 35 3.2. Sequences 36 3.3. Convergence and limits 39 3.4. Properties of limits 43 3.5. Monotone sequences 45 3.6. The lim sup and lim inf 48 3.7. Cauchy sequences 54 3.8. Subsequences 55 iii iv Contents 3.9. The Bolzano-Weierstrass theorem 57 Chapter 4. Series 59 4.1. Convergence of series 59 4.2. The Cauchy condition 62 4.3. Absolutely convergent series 64 4.4.
    [Show full text]
  • Various Types of Completeness in Topologized Semilattices
    Various types of completeness in topologized semilattices Konstantin Kazachenkoa, Alexander V. Osipovb aKrasovskii Institute of Mathematics and Mechanics, Yekaterinburg, Russia bKrasovskii Institute of Mathematics and Mechanics, Ural Federal University, Ural State University of Economics, Yekaterinburg, Russia Abstract A topologized semilattice X is called complete if each non-empty chain C ⊂ X has inf C and sup C that belong to the closure C of the chain C in X. In this paper, we introduce various concepts of completeness of topologized semilattices in the context of operators that generalize the closure operator, and study their basic properties. In addition, examples of specific topologized semilattices are given, showing that these classes do not coincide with each other. Also in this paper, we prove theorems that allow us to generalize the available results on complete semilattices endowed with topology. Keywords: topologized semilattice, complete semilattice, θ-closed set, δ-closed set, H-set 2010 MSC: 06B30, 06B35, 54D55 1. Introduction The use of various algebraic structures, additionally endowed with the structure of a topo- logical space, has long established itself as a convenient and powerful tool in various fields of modern mathematics. This phenomenon motivates the fundamental study of the properties of these objects. When studying spaces that have some additional structure consistent with the topology, quite often the concept of completeness naturally arises, as some internal property of these objects. In most cases, completeness can also be described as an external property, and often it is associated with the concept of absolute closedness, understood in a suitable sense. For example, a metric space X is complete if and only if it is closed in every metric space Y containing X as a metric subspace.
    [Show full text]