Will Fithian: Q P and Its Extensions
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Axiom of Choice, Zorn's Lemma, and the Well
THE AXIOM OF CHOICE, ZORN'S LEMMA, AND THE WELL ORDERING PRINCIPLE The Axiom of Choice is a foundational statement of set theory: Given any collection fSi : i 2 Ig of nonempty sets, there exists a choice function [ f : I −! Si; f(i) 2 Si for all i 2 I: i In the 1930's, Kurt G¨odelproved that the Axiom of Choice is consistent (in the Zermelo-Frankel first-order axiomatization) with the other axioms of set theory. In the 1960's, Paul Cohen proved that the Axiom of Choice is independent of the other axioms. Closely following Van der Waerden, this writeup explains how the Axiom of Choice implies two other statements, Zorn's Lemma and the Well Ordering Prin- ciple. In fact, all three statements are equivalent, as is a fourth statement called the Hausdorff Maximality Principle. 1. Partial Order Let S be any set, and let P(S) be its power set, the set whose elements are the subsets of S, P(S) = fS : S is a subset of Sg: The proper subset relation \(" in P(S) satisfies two conditions: • (Partial Trichotomy) For any S; T 2 P(S), at most one of the conditions S ( T;S = T;T ( S holds, and possibly none of them holds. • (Transitivity) For any S; T; U 2 P(S), if S ( T and T ( U then also S ( U. The two conditions are the motivating example of a partial order. Definition 1.1. Let T be a set. Let ≺ be a relation that may stand between some pairs of elements of T . -
Section V.1. Field Extensions
V.1. Field Extensions 1 Section V.1. Field Extensions Note. In this section, we define extension fields, algebraic extensions, and tran- scendental extensions. We treat an extension field F as a vector space over the subfield K. This requires a brief review of the material in Sections IV.1 and IV.2 (though if time is limited, we may try to skip these sections). We start with the definition of vector space from Section IV.1. Definition IV.1.1. Let R be a ring. A (left) R-module is an additive abelian group A together with a function mapping R A A (the image of (r, a) being × → denoted ra) such that for all r, a R and a,b A: ∈ ∈ (i) r(a + b)= ra + rb; (ii) (r + s)a = ra + sa; (iii) r(sa)=(rs)a. If R has an identity 1R and (iv) 1Ra = a for all a A, ∈ then A is a unitary R-module. If R is a division ring, then a unitary R-module is called a (left) vector space. Note. A right R-module and vector space is similarly defined using a function mapping A R A. × → Definition V.1.1. A field F is an extension field of field K provided that K is a subfield of F . V.1. Field Extensions 2 Note. With R = K (the ring [or field] of “scalars”) and A = F (the additive abelian group of “vectors”), we see that F is a vector space over K. Definition. Let field F be an extension field of field K. -
Math 121. Uniqueness of Algebraic Closure Let K Be a Field, and K/K A
Math 121. Uniqueness of algebraic closure Let k be a field, and k=k a choice of algebraic closure. As a first step in the direction of proving that k is \unique up to (non-unique) isomorphism", we prove: Lemma 0.1. Let L=k be an algebraic extension, and L0=L another algebraic extension. There is a k-embedding i : L,! k, and once i is picked there exists a k-embedding L0 ,! k extending i. Proof. Since an embedding i : L,! k realizes the algebraically closed k as an algebraic extension of L (and hence as an algebraic closure of L), by renaming the base field as L it suffices to just prove the first part: any algebraic extension admits an embedding into a specified algebraic closure. Define Σ to be the set of pairs (k0; i) where k0 ⊆ L is an intermediate extension over k and 0 i : k ,! k is a k-embedding. Using the inclusion i0 : k ,! k that comes along with the data of how k is realized as an algebraic closure of k, we see that (k; i0) 2 Σ, so Σ is non-empty. We wish to apply Zorn's Lemma, where we define a partial ordering on Σ by the condition that (k0; i0) ≤ (k00; i00) if 0 00 00 0 k ⊆ k inside of L and i jk0 = i . It is a simple exercise in gluing set maps to see that the hypothesis of Zorn's Lemma is satisfied, so there exists a maximal element (K; i) 2 Σ. We just have to show K = L. -
Pseudo Real Closed Field, Pseudo P-Adically Closed Fields and NTP2
Pseudo real closed fields, pseudo p-adically closed fields and NTP2 Samaria Montenegro∗ Université Paris Diderot-Paris 7† Abstract The main result of this paper is a positive answer to the Conjecture 5.1 of [15] by A. Chernikov, I. Kaplan and P. Simon: If M is a PRC field, then T h(M) is NTP2 if and only if M is bounded. In the case of PpC fields, we prove that if M is a bounded PpC field, then T h(M) is NTP2. We also generalize this result to obtain that, if M is a bounded PRC or PpC field with exactly n orders or p-adic valuations respectively, then T h(M) is strong of burden n. This also allows us to explicitly compute the burden of types, and to describe forking. Keywords: Model theory, ordered fields, p-adic valuation, real closed fields, p-adically closed fields, PRC, PpC, NIP, NTP2. Mathematics Subject Classification: Primary 03C45, 03C60; Secondary 03C64, 12L12. Contents 1 Introduction 2 2 Preliminaries on pseudo real closed fields 4 2.1 Orderedfields .................................... 5 2.2 Pseudorealclosedfields . .. .. .... 5 2.3 The theory of PRC fields with n orderings ..................... 6 arXiv:1411.7654v2 [math.LO] 27 Sep 2016 3 Bounded pseudo real closed fields 7 3.1 Density theorem for PRC bounded fields . ...... 8 3.1.1 Density theorem for one variable definable sets . ......... 9 3.1.2 Density theorem for several variable definable sets. ........... 12 3.2 Amalgamation theorems for PRC bounded fields . ........ 14 ∗[email protected]; present address: Universidad de los Andes †Partially supported by ValCoMo (ANR-13-BS01-0006) and the Universidad de Costa Rica. -
Real Closed Fields
University of Montana ScholarWorks at University of Montana Graduate Student Theses, Dissertations, & Professional Papers Graduate School 1968 Real closed fields Yean-mei Wang Chou The University of Montana Follow this and additional works at: https://scholarworks.umt.edu/etd Let us know how access to this document benefits ou.y Recommended Citation Chou, Yean-mei Wang, "Real closed fields" (1968). Graduate Student Theses, Dissertations, & Professional Papers. 8192. https://scholarworks.umt.edu/etd/8192 This Thesis is brought to you for free and open access by the Graduate School at ScholarWorks at University of Montana. It has been accepted for inclusion in Graduate Student Theses, Dissertations, & Professional Papers by an authorized administrator of ScholarWorks at University of Montana. For more information, please contact [email protected]. EEAL CLOSED FIELDS By Yean-mei Wang Chou B.A., National Taiwan University, l96l B.A., University of Oregon, 19^5 Presented in partial fulfillment of the requirements for the degree of Master of Arts UNIVERSITY OF MONTANA 1968 Approved by: Chairman, Board of Examiners raduate School Date Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. UMI Number: EP38993 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI OwMTtation PVblmhing UMI EP38993 Published by ProQuest LLC (2013). Copyright in the Dissertation held by the Author. -
Class Group Computations in Number Fields and Applications to Cryptology Alexandre Gélin
Class group computations in number fields and applications to cryptology Alexandre Gélin To cite this version: Alexandre Gélin. Class group computations in number fields and applications to cryptology. Data Structures and Algorithms [cs.DS]. Université Pierre et Marie Curie - Paris VI, 2017. English. NNT : 2017PA066398. tel-01696470v2 HAL Id: tel-01696470 https://tel.archives-ouvertes.fr/tel-01696470v2 Submitted on 29 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École Doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Alexandre GÉLIN Pour obtenir le grade de DOCTEUR de l’UNIVERSITÉ PIERRE ET MARIE CURIE Calcul de Groupes de Classes d’un Corps de Nombres et Applications à la Cryptologie Thèse dirigée par Antoine JOUX et Arjen LENSTRA soutenue le vendredi 22 septembre 2017 après avis des rapporteurs : M. Andreas ENGE Directeur de Recherche, Inria Bordeaux-Sud-Ouest & IMB M. Claus FIEKER Professeur, Université de Kaiserslautern devant le jury composé de : M. Karim BELABAS Professeur, Université de Bordeaux M. Andreas ENGE Directeur de Recherche, Inria Bordeaux-Sud-Ouest & IMB M. Claus FIEKER Professeur, Université de Kaiserslautern M. -
FIELD EXTENSION REVIEW SHEET 1. Polynomials and Roots Suppose
FIELD EXTENSION REVIEW SHEET MATH 435 SPRING 2011 1. Polynomials and roots Suppose that k is a field. Then for any element x (possibly in some field extension, possibly an indeterminate), we use • k[x] to denote the smallest ring containing both k and x. • k(x) to denote the smallest field containing both k and x. Given finitely many elements, x1; : : : ; xn, we can also construct k[x1; : : : ; xn] or k(x1; : : : ; xn) analogously. Likewise, we can perform similar constructions for infinite collections of ele- ments (which we denote similarly). Notice that sometimes Q[x] = Q(x) depending on what x is. For example: Exercise 1.1. Prove that Q[i] = Q(i). Now, suppose K is a field, and p(x) 2 K[x] is an irreducible polynomial. Then p(x) is also prime (since K[x] is a PID) and so K[x]=hp(x)i is automatically an integral domain. Exercise 1.2. Prove that K[x]=hp(x)i is a field by proving that hp(x)i is maximal (use the fact that K[x] is a PID). Definition 1.3. An extension field of k is another field K such that k ⊆ K. Given an irreducible p(x) 2 K[x] we view K[x]=hp(x)i as an extension field of k. In particular, one always has an injection k ! K[x]=hp(x)i which sends a 7! a + hp(x)i. We then identify k with its image in K[x]=hp(x)i. Exercise 1.4. Suppose that k ⊆ E is a field extension and α 2 E is a root of an irreducible polynomial p(x) 2 k[x]. -
6 Ideal Norms and the Dedekind-Kummer Theorem
18.785 Number theory I Fall 2017 Lecture #6 09/25/2017 6 Ideal norms and the Dedekind-Kummer theorem In order to better understand how ideals split in Dedekind extensions we want to extend our definition of the norm map to ideals. Recall that for a ring extension B=A in which B is a free A-module of finite rank, we defined the norm map NB=A : B ! A as ×b NB=A(b) := det(B −! B); the determinant of the multiplication-by-b map with respect to an A-basis for B. If B is a free A-module we could define the norm of a B-ideal to be the A-ideal generated by the norms of its elements, but in the case we are most interested in (our \AKLB" setup) B is typically not a free A-module (even though it is finitely generated as an A-module). To get around this limitation, we introduce the notion of the module index, which we will use to define the norm of an ideal. In the special case where B is a free A-module, the norm of a B-ideal will be equal to the A-ideal generated by the norms of elements. 6.1 The module index Our strategy is to define the norm of a B-ideal as the intersection of the norms of its localizations at maximal ideals of A (note that B is an A-module, so we can view any ideal of B as an A-module). Recall that by Proposition 2.6 any A-module M in a K-vector space is equal to the intersection of its localizations at primes of A; this applies, in particular, to ideals (and fractional ideals) of A and B. -
NORM GROUPS with TAME RAMIFICATION 11 Is a Homomorphism, Which Is Equivalent to the first Equation of Bimultiplicativity (The Other Follows by Symmetry)
LECTURE 3 Norm Groups with Tame Ramification Let K be a field with char(K) 6= 2. Then × × 2 K =(K ) ' fcontinuous homomorphisms Gal(K) ! Z=2Zg ' fdegree 2 étale algebras over Kg which is dual to our original statement in Claim 1.8 (this result is a baby instance of Kummer theory). Npo te that an étale algebra over K is either K × K or a quadratic extension K( d)=K; the former corresponds to the trivial coset of squares in K×=(K×)2, and the latter to the coset defined by d 2 K× . If K is local, then lcft says that Galab(K) ' Kd× canonically. Combined (as such homomorphisms certainly factor through Galab(K)), we obtain that K×=(K×)2 is finite and canonically self-dual. This is equivalent to asserting that there exists a “suÿciently nice” pairing (·; ·): K×=(K×)2 × K×=(K×)2 ! f1; −1g; that is, one which is bimultiplicative, satisfying (a; bc) = (a; b)(a; c); (ab; c) = (a; c)(b; c); and non-degenerate, satisfying the condition if (a; b) = 1 for all b; then a 2 (K×)2 : We were able to give an easy definition of this pairing, namely, (a; b) = 1 () ax2 + by2 = 1 has a solution in K: Note that it is clear from this definition that (a; b) = (b; a), but unfortunately neither bimultiplicativity nor non-degeneracy is obvious, though we will prove that they hold in this lecture in many cases. We have shown in Claim 2.11 that a less symmetric definition of the Hilbert symbol holds, namely that for all a, p (a; b) = 1 () b is a norm in K( a)=K = K[t]=(t2 − a); which if a is a square, is simply isomorphic to K × K and everything is a norm. -
The Algebraic Closure of a $ P $-Adic Number Field Is a Complete
Mathematica Slovaca José E. Marcos The algebraic closure of a p-adic number field is a complete topological field Mathematica Slovaca, Vol. 56 (2006), No. 3, 317--331 Persistent URL: http://dml.cz/dmlcz/136929 Terms of use: © Mathematical Institute of the Slovak Academy of Sciences, 2006 Institute of Mathematics of the Academy of Sciences of the Czech Republic provides access to digitized documents strictly for personal use. Each copy of any part of this document must contain these Terms of use. This paper has been digitized, optimized for electronic delivery and stamped with digital signature within the project DML-CZ: The Czech Digital Mathematics Library http://project.dml.cz Mathematíca Slovaca ©20106 .. -. c/. ,~r\r\c\ M -> ->•,-- 001 Mathematical Institute Math. SlOVaCa, 56 (2006), NO. 3, 317-331 Slovák Academy of Sciences THE ALGEBRAIC CLOSURE OF A p-ADIC NUMBER FIELD IS A COMPLETE TOPOLOGICAL FIELD JosÉ E. MARCOS (Communicated by Stanislav Jakubec) ABSTRACT. The algebraic closure of a p-adic field is not a complete field with the p-adic topology. We define another field topology on this algebraic closure so that it is a complete field. This new topology is finer than the p-adic topology and is not provided by any absolute value. Our topological field is a complete, not locally bounded and not first countable field extension of the p-adic number field, which answers a question of Mutylin. 1. Introduction A topological ring (R,T) is a ring R provided with a topology T such that the algebraic operations (x,y) i-> x ± y and (x,y) \-> xy are continuous. -
Electromagnetic Time Reversal Electromagnetic Time Reversal
Electromagnetic Time Reversal Electromagnetic Time Reversal Application to Electromagnetic Compatibility and Power Systems Edited by Farhad Rachidi Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland Marcos Rubinstein University of Applied Sciences of Western Switzerland, Yverdon, Switzerland Mario Paolone Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland This edition first published 2017 © 2017 John Wiley & Sons, Ltd All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions. The right of Farhad Rachidi, Marcos Rubinstein, and Mario Paolone to be identified asthe authors of the editorial material in this work has been asserted in accordance with law. Registered Offices John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK Editorial Office The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com. Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats. Limit of Liability/Disclaimer of Warranty The publisher and the authors make no representations or warranties with respect tothe accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of fitness for a particular purpose. -
LECTURES on COHOMOLOGICAL CLASS FIELD THEORY Number
LECTURES on COHOMOLOGICAL CLASS FIELD THEORY Number Theory II | 18.786 | Spring 2016 Taught by Sam Raskin at MIT Oron Propp Last updated August 21, 2017 Contents Preface......................................................................v Lecture 1. Introduction . .1 Lecture 2. Hilbert Symbols . .6 Lecture 3. Norm Groups with Tame Ramification . 10 Lecture 4. gcft and Quadratic Reciprocity. 14 Lecture 5. Non-Degeneracy of the Adèle Pairing and Exact Sequences. 19 Lecture 6. Exact Sequences and Tate Cohomology . 24 Lecture 7. Chain Complexes and Herbrand Quotients . 29 Lecture 8. Tate Cohomology and Inverse Limits . 34 Lecture 9. Hilbert’s Theorem 90 and Cochain Complexes . 38 Lecture 10. Homotopy, Quasi-Isomorphism, and Coinvariants . 42 Lecture 11. The Mapping Complex and Projective Resolutions . 46 Lecture 12. Derived Functors and Explicit Projective Resolutions . 52 Lecture 13. Homotopy Coinvariants, Abelianization, and Tate Cohomology. 57 Lecture 14. Tate Cohomology and Kunr ..................................... 62 Lecture 15. The Vanishing Theorem Implies Cohomological lcft ........... 66 Lecture 16. Vanishing of Tate Cohomology Groups. 70 Lecture 17. Proof of the Vanishing Theorem . 73 Lecture 18. Norm Groups, Kummer Theory, and Profinite Cohomology . 76 Lecture 19. Brauer Groups . 81 Lecture 20. Proof of the First Inequality . 86 Lecture 21. Artin and Brauer Reciprocity, Part I. 92 Lecture 22. Artin and Brauer Reciprocity, Part II . 96 Lecture 23. Proof of the Second Inequality . 101 iii iv CONTENTS Index........................................................................ 108 Index of Notation . 110 Bibliography . 113 Preface These notes are for the course Number Theory II (18.786), taught at mit in the spring semester of 2016 by Sam Raskin. The original course page can be found online here1; in addition to these notes, it includes an annotated bibliography for the course, as well as problem sets, which are frequently referenced throughout the notes.