The Phase Transition in Five Point Energy Minimization

Total Page:16

File Type:pdf, Size:1020Kb

The Phase Transition in Five Point Energy Minimization The Phase Transition in Five Point Energy Minimization Richard Evan Schwartz September 26, 2018 arXiv:1610.03303v3 [math.OC] 21 Nov 2016 2 Contents I Introduction and Outline 9 1 Introduction 11 1.1 The Energy Minimization Problem . 11 1.2 MainResults ........................... 13 1.3 IdeasintheProof......................... 14 1.4 ComputerCode.......................... 16 2 Outline of the Proof 19 2.1 Under-Approximation . 19 2.2 DivideandConquer ....................... 20 2.3 Symmetrization .......................... 23 2.4 Endgame.............................. 25 2.5 ComputingtheConstant . 27 II Under-Approximation 29 3 Outline of the Forcing Lemma 31 3.1 AFourChapterPlan....................... 31 3.2 TheRegularTetrahedron. 31 3.3 TheGeneralApproach . 32 3.4 Case1 ............................... 33 3.5 Case2 ............................... 35 3.6 Case3 ............................... 36 3.7 Case4 ............................... 37 3.8 HaveFunPlayingAround . 37 3 4 CONTENTS 4 Polynomial Approximations 39 4.1 RationalIntervals......................... 39 4.2 IntervalPolynomials ....................... 40 4.3 ABoundonthePowerFunctions . 41 4.4 ApproximationofPowerCombos . 41 5 Positive Dominance 45 5.1 The Weak Positive Dominance Criterion . 45 5.2 The Positive Dominance Algorithm . 46 5.3 Discussion............................. 50 6ProofofTheForcingLemma 51 6.1 Positivity of the Coefficients . 51 6.2 UnderApproximation:Case1 . 53 6.3 UnderApproximation:Case2 . 55 6.4 Under-Approximation: Case3 . 57 6.5 UnderApproximation:Case4 . 58 III Divide and Conquer 59 7 The Configuration Space 61 7.1 NormalizedConfigurations . 61 7.2 CompactnessResults . .. .. 62 7.3 TheTBPConfigurations . 64 7.4 DyadicBlocks........................... 65 7.5 A Technical Result about Dyadic Boxes . 68 7.6 VeryNeartheTBP........................ 68 8 Spherical Geometry Estimates 71 8.1 Overview.............................. 71 8.2 SomeResultsaboutCircles . 72 8.3 TheHullApproximationLemma . 74 8.4 DotProductEstimates . 76 8.5 DisorderedBlocks......................... 77 8.6 IrrelevantBlocks ......................... 78 CONTENTS 5 9 The Energy Theorem 81 9.1 MainResult............................ 81 9.2 Generalizations and Consequences . 82 9.3 A Polynomial Inequality . 83 9.4 TheLocalEnergyLemma . 85 9.5 FromLocaltoGlobal....................... 87 10 The Main Algorithm 91 10.1GradingaBlock.......................... 91 10.2 The Divide and Conquer Algorithm . 91 10.3 Results of the Calculations . 92 10.4 Subdivision Recommendation . 93 10.5 IntervalArithmetic . 94 10.6 IntegerCalculations. 96 10.7AGildedApproach ........................ 97 10.8 APotentialSpeedUp. 97 10.9Debugging............................. 98 11 Local Analysis of the Hessian 99 11.1Outline............................... 99 11.2 LowerBoundsontheEigenvalues . 100 11.3 Taylor’sTheoremwithRemainder. 101 11.4 VariationoftheEigenvalues . .102 11.5 TheBiggestTerm. .. .. .104 11.6 TheRemainingTerms . .106 11.7 TheEndoftheProof. .107 IV Symmetrization 109 12 Preliminaries 111 12.1 MonotonicityLemma . .111 12.2 AThreeStepProcess. .112 12.3BaseandBows ..........................112 12.4 ProofStrategy. .. .. .114 6 CONTENTS 13 The Domains 117 13.1 BasicDescription . .. .. .117 13.2 AffineCubicalCoverings . .119 13.3 TheCoveringsforLemma1 . .120 13.4 TheCoveringsforLemma2 . .123 14 The First Symmetrization 125 14.1Inequality1 ............................125 14.2Inequality2 ............................127 14.3 ResultsaboutTriangles. .128 14.4Inequality3 ............................132 15 The Second Symmetrization 135 15.1Inequality1 ............................135 15.2Inequality2 ............................139 15.3 ImprovedMonotonicity. .140 15.4Inequality3 ............................141 15.5Discussion .............................143 V Endgame 145 16TheBabyEnergyTheorem 147 16.1TheMainResult .........................147 16.2 AGeneralEstimate. .149 16.3 AFormulafortheEnergy . .150 16.4 TheFirstEstimate . .151 16.5ATableofValues.........................152 16.6 TheSecondEstimate . .153 17 Divide and Conquer Again 155 17.1TheGoal .............................155 17.2 TheIdealCalculation. .156 17.3 Floating Point Calculations . 157 17.4 ConfrontingthePowerFunction . 159 17.5 The Rational Calculation . 161 17.6Discussion .............................162 CONTENTS 7 18 The Tiny Piece 163 18.1Overview..............................163 18.2 TheProofModuloDerivativeBounds . 164 18.3TheFirstBound .........................166 18.4 TheSecondBound . .. .. .169 19 The Final Battle 173 19.1Discussion .............................173 19.2 ProofOverview ..........................174 19.3 TheCriticalInterval . .175 19.4 TheSmallInterval . .177 19.5 TheLongInterval. .178 19.6TheEnd..............................180 8 CONTENTS Preface This monograph is a rigorous computer assisted analysis of the extent to which the triangular bi-pyramid (TBP) is the minimizer, amongst 5-point configurations on the sphere, with respect to a power law potential. Our main result settles a long-standing open question about this, but perhaps some people will object to both the length of the solution and to the computer- assisted nature. On the positive side, the proof divides neatly into 4 modular pieces, and there is a clear idea behind the attack at each step. −s Define the Riesz s-potential Rs(r) = sign(s) r . We prove there exists such that the TBP is the ...15.0480773927797 = ש a computable number The .(ש ,unique minimizer with respect to Rs if and only if s ( 2, 0) (0 is pronounced “shin”. Our result does∈ not− say what∪ happens ש Hebrew letter though we do prove that in the tiny ,ש for power law potentials much beyond ,the minimizer is a pyramid with square base. Thus [15+25/512 ,ש) interval we prove the existence of the phase transition that was conjectured to exist in the 1977 paper [MKS] by T. W. Melnyk, O. Knop, and W. R. Smith. This is still a draft of the monograph. The mathematics is all written down and the computer programs have all been run, but I am not sure if the programs are in their final form. While the programs are now pretty well documented and organized, I might still like to do more in this direction. Meanwhile, I am happy to answer any questions about the code. I thank Henry Cohn, John Hughes, Abhinav Kumar, Curtis McMullen, Ed Saff, and Sergei Tabachnikov, for discussions related to this monograph. I would specially like to thank Alexander Tumanov for his great idea about this problem, and Jill Pipher for her enthusiasm and encouragement. I thank my wife Brienne Brown for suggesting the name of the phase-transition constant. I thank my family for their forbearance while I worked on this project like Ahab going after the whale. I thank I.C.E.R.M. for facilitating this project. My interest in this prob- lem was rekindled during discussions about point configuration problems around the time of the I.C.E.R.M. Science Advisory Board meeting in Nov. 2015. I thank the National Science Foundation for their continued support, currently in the form of the Research Grant DMS-1204471. Finally, I thank the Simons Foundation for their support, in the form of a Simons Sabbatical Fellowship. Part I Introduction and Outline 9 Chapter 1 Introduction 1.1 The Energy Minimization Problem Let S2 denote the unit sphere in R3 and let P = p , ..., p be a finite list { 1 n} of distinct points on S2. Given some function f : (0, 2] R we can compute the total f-potential → (P )= f( p p ). (1.1) Ef k i − jk i<j X For fixed f and n, one can ask which configuration(s) minimize (P ). Ef For this problem, the energy functional f = Rs, where −s Rs(r) = sign(s)r , (1.2) is a natural one to consider. When s > 0, this is called the Riesz potential. When s< 0 this is called the Fejes-Toth potential. The case s = 1 is specially called the Coulomb potential or the electrostatic potential. This case of the energy minimization problem is known as Thomson’s problem. See [Th]. The case of s = 1, in which one tries to maximize the sum of the distances, is − known as Polya’s problem. There is a large literature on the energy minimization problem. See [F¨o] and [C] for some early local results. See [MKS] for a definitive numerical study on the minimizers of the Riesz potential for n relatively small. The website [CCD] has a compilation of experimental results which stretches all the way up to about n = 1000. The paper [SK] gives a nice survey of results, with an emphasis on the case when n is large. See also [RSZ]. The paper 11 12 CHAPTER 1. INTRODUCTION [BBCGKS] gives a survey of results, both theoretical and experimental, about highly symmetric configurations in higher dimensions. When n =2, 3 the problem is fairly trivial. In [KY] it is shown that when n =4, 6, 12, the most symmetric configurations – i.e. vertices of the relevant Platonic solids – are the unique minimizers for all Rs with s ( 2, ) 0 . See [A] for just the case n = 12 and see [Y] for an earler,∈ − partial∞ −{ result} in the case n = 4, 6. The result in [KY] is contained in the much more general and powerful result [CK, Theorem 1.2] concerning the so-called sharp configurations. The case n = 5 has been notoriously intractable. There is a general feeling that for a wide range of energy choices, and in particular for the Riesz potentials, the global minimizer is either the triangular bi-pyramid or else some pyramid with square base. The triangular bi-pyramid (TBP) is the configuration of 5 points with one point at the north pole, one at the south pole, and three arranged in an equilateral triangle around
Recommended publications
  • Algebraic Properties of the Richard Thompson's Group F
    ALGEBRAIC PROPERTIES OF THE RICHARD THOMPSON’S GROUP F AND ITS APPLICATIONS IN CRYPTOGRAPHY A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY HAKAN YETER IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN MATHEMATICS FEBRUARY 2021 Approval of the thesis: ALGEBRAIC PROPERTIES OF THE RICHARD THOMPSON’S GROUP F AND ITS APPLICATIONS IN CRYPTOGRAPHY submitted by HAKAN YETER in partial fulfillment of the requirements for the de- gree of Master of Science in Mathematics Department, Middle East Technical University by, Prof. Dr. Halil Kalıpçılar Dean, Graduate School of Natural and Applied Sciences Prof. Dr. Yıldıray Ozan Head of Department, Mathematics Assoc. Prof. Dr. Mustafa Gökhan Benli Supervisor, Mathematics Department, METU Examining Committee Members: Assoc. Prof. Dr. Fatih Sulak Mathematics Department, Atilim University Assoc. Prof. Dr. Mustafa Gökhan Benli Mathematics Department, METU Assist. Prof. Dr. Burak Kaya Mathematics Department, METU Date: I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Surname: Hakan Yeter Signature : iv ABSTRACT ALGEBRAIC PROPERTIES OF THE RICHARD THOMPSON’S GROUP F AND ITS APPLICATIONS IN CRYPTOGRAPHY Yeter, Hakan M.S., Department of Mathematics Supervisor: Assoc. Prof. Dr. Mustafa Gökhan Benli February 2021, 69 pages Thompson’s groups F; T and V , especially F , are widely studied groups in group theory.
    [Show full text]
  • The Role of the Interval Domain in Modern Exact Real Airthmetic
    The Role of the Interval Domain in Modern Exact Real Airthmetic Andrej Bauer Iztok Kavkler Faculty of Mathematics and Physics University of Ljubljana, Slovenia Domains VIII & Computability over Continuous Data Types Novosibirsk, September 2007 Teaching theoreticians a lesson Recently I have been told by an anonymous referee that “Theoreticians do not like to be taught lessons.” and by a friend that “You should stop competing with programmers.” In defiance of this advice, I shall talk about the lessons I learned, as a theoretician, in programming exact real arithmetic. The spectrum of real number computation slow fast Formally verified, Cauchy sequences iRRAM extracted from streams of signed digits RealLib proofs floating point Moebius transformtions continued fractions Mathematica "theoretical" "practical" I Common features: I Reals are represented by successive approximations. I Approximations may be computed to any desired accuracy. I State of the art, as far as speed is concerned: I iRRAM by Norbert Muller,¨ I RealLib by Branimir Lambov. What makes iRRAM and ReaLib fast? I Reals are represented by sequences of dyadic intervals (endpoints are rationals of the form m/2k). I The approximating sequences need not be nested chains of intervals. I No guarantee on speed of converge, but arbitrarily fast convergence is possible. I Previous approximations are not stored and not reused when the next approximation is computed. I Each next approximation roughly doubles the amount of work done. The theory behind iRRAM and RealLib I Theoretical models used to design iRRAM and RealLib: I Type Two Effectivity I a version of Real RAM machines I Type I representations I The authors explicitly reject domain theory as a suitable computational model.
    [Show full text]
  • Dyadic Rationals and Surreal Number Theory C
    IOSR Journal of Mathematics (IOSR-JM) e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 16, Issue 5 Ser. IV (Sep. – Oct. 2020), PP 35-43 www.iosrjournals.org Dyadic Rationals and Surreal Number Theory C. Avalos-Ramos C.U.C.E.I. Universidad de Guadalajara, Guadalajara, Jalisco, México J. A. Félix-Algandar Facultad de Ciencias Físico-Matemáticas de la Universidad Autónoma de Sinaloa, 80010, Culiacán, Sinaloa, México. J. A. Nieto Facultad de Ciencias Físico-Matemáticas de la Universidad Autónoma de Sinaloa, 80010, Culiacán, Sinaloa, México. Abstract We establish a number of properties of the dyadic rational numbers associated with surreal number theory. In particular, we show that a two parameter function of dyadic rationals can give all the trees of n-days in surreal number formalism. --------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 07-10-2020 Date of Acceptance: 22-10-2020 --------------------------------------------------------------------------------------------------------------------------------------- I. Introduction In mathematics, from number theory history [1], one learns that historically, roughly speaking, the starting point was the natural numbers N and after a centuries of though evolution one ends up with the real numbers from which one constructs the differential and integral calculus. Surprisingly in 1973 Conway [2] (see also Ref. [3]) developed the surreal numbers structure which contains no only the real numbers , but also the hypereals and other numerical structures. Consider the set (1) and call and the left and right sets of , respectively. Surreal numbers are defined in terms of two axioms: Axiom 1. Every surreal number corresponds to two sets and of previously created numbers, such that no member of the left set is greater or equal to any member of the right set .
    [Show full text]
  • Dyadic Polygons∗
    May 18, 2011 15:21 WSPC/S0218-1967 132-IJAC S0218196711006248 International Journal of Algebra and Computation Vol. 21, No. 3 (2011) 387–408 c World Scientific Publishing Company DOI: 10.1142/S0218196711006248 DYADIC POLYGONS∗ K. MATCZAK Faculty of Civil Engineering, Mechanics and Petrochemistry in Plock Warsaw University of Technology 09-400 Plock, Poland [email protected] A. B. ROMANOWSKA Faculty of Mathematics and Information Science Warsaw University of Technology 00-661 Warsaw, Poland [email protected] J. D. H. SMITH Department of Mathematics Iowa State University, Ames, Iowa, 50011, USA [email protected] Received 20 November 2009 Revised 26 August 2010 Communicated by R. McKenzie Dyadic rationals are rationals whose denominator is a power of 2. Dyadic triangles and dyadic polygons are, respectively, defined as the intersections with the dyadic plane of a triangle or polygon in the real plane whose vertices lie in the dyadic plane. The one-dimensional analogs are dyadic intervals. Algebraically, dyadic polygons carry the structure of a commutative, entropic and idempotent algebra under the binary operation of arithmetic mean. In this paper, dyadic intervals and triangles are classified to within affine or algebraic isomorphism, and dyadic polygons are shown to be finitely generated as algebras. The auxiliary results include a form of Pythagoras’ theorem for dyadic affine geometry. Keywords: Affine space; convex set; polygon; polytope; commutative; binary; entropic mode; arithmetic mean. Mathematics Subject Classification: 20N02, 52C05 ∗Research was supported by the Warsaw University of Technology under grant number 504G/1120/0054/000. Part of the work on this paper was completed during several visits of the second author to Iowa State University, Ames, Iowa.
    [Show full text]
  • On the Walsh Functions(*)
    ON THE WALSH FUNCTIONS(*) BY N. J. FINE Table of Contents 1. Introduction. 372 2. The dyadic group. 376 3. Expansions of certain functions. 380 4. Fourier coefficients. 382 5. Lebesgue constants. 385 6. Convergence. 391 7. Summability. 395 8. On certain sums. 399 9. Uniqueness and localization. 402 1. Introduction. The system of orthogonal functions introduced by Rade- macher [6](2) has been the subject of a great deal of study. This system is not a complete one. Its completion was effected by Walsh [7], who studied some of its Fourier properties, such as convergence, summability, and so on. Others, notably Kaczmarz [3], Steinhaus [4], Paley [S], have studied various aspects of the Walsh system. Walsh has pointed out the great similarity be- tween this system and the trigonometric system. It is convenient, in defining the functions of the Walsh system, to follow Paley's modification. The Rademacher functions are defined by *»(*) = 1 (0 g x < 1/2), *»{«) = - 1 (1/2 á * < 1), <¡>o(%+ 1) = *o(«), *»(*) = 0o(2"x) (w = 1, 2, • • ■ ). The Walsh functions are then given by (1-2) to(x) = 1, Tpn(x) = <t>ni(x)<t>ni(x) ■ ■ ■ 4>nr(x) for » = 2"1 + 2n2+ • • • +2"r, where the integers »¿ are uniquely determined by «i+i<«¿. Walsh proves that {^„(x)} form a complete orthonormal set. Every periodic function f(x) which is integrable in the sense of Lebesgue on (0, 1) will have associated with it a (Walsh-) Fourier series (1.3) /(*) ~ Co+ ciipi(x) + crf/iix) + • • • , where the coefficients are given by Presented to the Society, August 23, 1946; received by the editors February 13, 1948.
    [Show full text]
  • A Computable Absolutely Normal Liouville Number
    MATHEMATICS OF COMPUTATION Volume 84, Number 296, November 2015, Pages 2939–2952 http://dx.doi.org/10.1090/mcom/2964 Article electronically published on April 24, 2015 A COMPUTABLE ABSOLUTELY NORMAL LIOUVILLE NUMBER VERONICA´ BECHER, PABLO ARIEL HEIBER, AND THEODORE A. SLAMAN Abstract. We give an algorithm that computes an absolutely normal Liou- ville number. 1. The main result The set of Liouville numbers is {x ∈ R \ Q : ∀k ∈ N, ∃q ∈ N,q>1and||qx|| <q−k} where ||x|| =min{|x−m| : m ∈ Z} is the distance of a real number x to the nearest −k! integer and other notation is as usual. Liouville’s constant, k≥1 10 ,isthe standard example of a Liouville number. Though uncountable, the set of Liouville numbers is small, in fact, it is null, both in Lebesgue measure and in Hausdorff dimension (see [6]). We say that a base is an integer s greater than or equal to 2. A real number x is normal to base s if the sequence (sjx : j ≥ 0) is uniformly distributed in the unit interval modulo one. By Weyl’s Criterion [11], x is normal to base s if and only if certain harmonic sums associated with (sjx : j ≥ 0) grow slowly. Absolute normality is normality to every base. Bugeaud [6] established the existence of absolutely normal Liouville numbers by means of an almost-all argument for an appropriate measure due to Bluhm [3, 4]. The support of this measure is a perfect set, which we call Bluhm’s fractal, all of whose irrational elements are Liouville numbers.
    [Show full text]
  • Interpolated Free Group Factors
    Pacific Journal of Mathematics INTERPOLATED FREE GROUP FACTORS KENNETH JAY DYKEMA Volume 163 No. 1 March 1994 PACIFIC JOURNAL OF MATHEMATICS Vol. 163, No. 1, 1994 INTERPOLATED FREE GROUP FACTORS KEN DYKEMA The interpolated free group factors L(¥r) for 1 < r < oo (also defined by F. Radulescu) are given another (but equivalent) definition as well as proofs of their properties with respect to compression by projections and free products. In order to prove the addition formula for free products, algebraic techniques are developed which allow us to show R*R*ί L(¥2) where R is the hyperfinite Hi -factor. Introduction. The free group factors L(Fn) for n — 2, 3, ... , oo (introduced in [4]) have recently been extensively studied [11, 2, 5, 6, 7] using Voiculescu's theory of freeness in noncommutative prob- ability spaces (see [8, 9, 10, 11, 12, 13], especially the latter for an overview). One hopes to eventually be able to solve the isomorphism question, first raised by R. V. Kadison of whether L(Fn) = L(Fm) for n Φ m. In [7], F. Radulescu introduced Hi -factors L(Fr) for 1 < r < oo, equalling the free group factor L(¥n) when r = n e N\{0, 1} and satisfying (1) L(FΓ) * L(FrO = L(FW.) (1< r, r' < oo) and (2) L(¥r)γ = L (V(l + ^)) (Kr<oo, 0<y<oo), where for a II i -factor <^f, J?y means the algebra [4] defined as fol- lows: for 0 < γ < 1, ^y = p^p, where p e «/# is a self adjoint pro- jection of trace γ for γ = n = 2, 3, ..
    [Show full text]
  • Efficient Computation with Dedekind Reals
    CCA 2008 Efficient Computation with Dedekind Reals Andrej Bauer1 Faculty of Mathematics and Physics University of Ljubljana Ljubljana, Slovenia Abstract Cauchy's construction of reals as sequences of rational approximations is the theoretical basis for a number of implementations of exact real numbers, while Dedekind's construction of reals as cuts has inspired fewer useful computational ideas. Nevertheless, we can see the computational content of Dedekind reals by constructing them within Abstract Stone Duality (ASD), a computationally meaningful calculus for topology. This provides the theoretical background for a novel way of computing with real numbers in the style of logic programming. Real numbers are defined in terms of (lower and upper) Dedekind cuts, while programs are expressed as statements about real numbers in the language of ASD. By adapting Newton's method to interval arithmetic we can make the computations as efficient as those based on Cauchy reals. The results reported in this talk are joint work with Paul Taylor. Keywords: Dedekind real numbers, Abstract Stone Duality, exact real number computation. 1 Introduction The material presented in this talk is joined work with Paul Taylor. We thank Danko Ilik, Matija Pretnar, and Chris Stone for taking part in fruitful discussions during our meeting in June 2008 in Ljubljana. Implementations of (exact) real numbers are usually based on Cauchy's con- struction of real numbers as sequences of rational approximations. Typically, a real number is represented as stream of signed binary digits −1; 0; 1, or a sequence of intervals with dyadic 2 endpoints whose widths converge to zero. The preference for Cauchy reals is also visible in Bishop's constructive analysis [2] and Type Two Effectivity [9].
    [Show full text]
  • Measure Theory and Hilbert's Tenth Problem Inside Q
    Measure theory and Hilbert's Tenth Problem inside Q Russell Miller ∗ October 5, 2016 Abstract For a ring R, Hilbert's Tenth Problem HTP(R) is the set of poly- nomial equations over R, in several variables, with solutions in R. 0 When R = Z, it is known that the jump Z is Turing-reducible to HTP(Z). We consider computability of HTP(R) for subrings R of the rationals. Applying measure theory to these subrings, which naturally form a measure space, relates their sets HTP(R) to the set HTP(Q), whose decidability remains an open question. We raise the question of the measure of the topological boundary of the solution set of a polynomial within this space, and show that if these boundaries all have measure 0, then for each individual oracle Turing machine Φ, the reduction R0 = ΦHTP(R) fails on a set of subrings R of positive measure. That is, no Turing reduction of the jump R0 of a subring R to HTP(R) holds uniformly on a set of measure 1. 1 Introduction The original version of Hilbert's Tenth Problem demanded an algorithm de- ciding which polynomial equations from Z[X0;X1;:::] have solutions in in- tegers. In 1970, Matiyasevic [5] completed work by Davis, Putnam and ∗The author was partially supported by Grant # DMS { 1362206 from the National Science Foundation, and by several grants from the PSC-CUNY Research Award Program. This work grew out of research initiated at a workshop held at the American Institute of Mathematics and continued at a workshop held at the Institute for Mathematical Sci- ences of the National University of Singapore.
    [Show full text]
  • Analysis in Weak Systems
    ANALYSIS IN WEAK SYSTEMS ANTONIO´ M. FERNANDES, FERNANDO FERREIRA, AND GILDA FERREIRA Abstract. The authors survey and comment their own work on weak analy- sis. They describe the basic set-up of analysis in a feasible second-order theory and consider the impact of adding to it various forms of weak K¨onig'slemma. A brief discussion of the Baire categoricity theorem follows. It is then consid- ered a strengthening of feasibility obtained (fundamentally) by the addition of a counting axiom and showed how it is possible to develop Riemann integra- tion in the stronger system. The paper finishes with three questions in weak analysis. 1. Introduction This paper is the third and last part of a triptych whose two other parts consist of \Techniques in weak analysis for conservation results" [13] and \Interpretability in Robinson's Q" [20]. This triptych of papers mostly surveys the work of the authors in weak analysis. The present paper is representative of our work in this field and it is the way that the authors have found to jointly render homage to Am´ılcarSernadas on the occasion of his 64th birthday (Am´ılcarwas born on April 20, 1952). The influence and scientific leadership of Am´ılcaron his side of logic has been enormous at Instituto Superior T´ecnicoand, indeed, in Portugal. One should also mention his international collaborations, specially with Brazilian logicians. Am´ılcar’sinfluence was also felt in Portugal on the other side, namely in important matters of academic support and institutional collaboration. The authors of this paper are grateful for the chance to present here the final paper of their triptych.
    [Show full text]
  • Computability and the Connes Embedding Problem
    COMPUTABILITY AND THE CONNES EMBEDDING PROBLEM ISAAC GOLDBRING AND BRADD HART Abstract. The Connes Embedding Problem (CEP) asks whether ev- ery separable II1 factor embeds into an ultrapower of the hyperfinite II1 factor. We show that the CEP is equivalent to the statement that every type II1 tracial von Neumann algebra has a computable universal theory. 1. Introduction With the advent of continuous model theory, model theoretic studies of operator algebras began in earnest (see [11, 12]). The class of C*-algebras and tracial von Neumann algebras were seen to be elementary classes as were many interesting subclasses - II1 factors, particular von Neumann algebras, being one such; see [10] for other examples. Naturally one would look at ex- istentially closed models in these classes ([8]) and attempt to identify model complete theories and theories with significant quantifier simplification. The results in this direction have been decidably negative. For tracial von Neu- mann algebras, it is known that there is no model companion ([7]); in fact, no known theory of II1 factors is model complete ([8]). For C*-algebras, the only theory of an infinite-dimensional algebra which has quantifier elimina- tion is the entirely atypical theory of C(X), continuous functions from X into C where X is Cantor space ([5]). It follows that the class of C*-algebras does not have a model companion. Most of the work to date in this area has focused on identifying useful elementary properties, classes and their axioms. The axioms for all known elementary classes have been recursive and indeed of low quantifier complex- ity (89-axiomatizable or better).
    [Show full text]
  • Dedekind Complete Posets from Sheaves on Von Neumann Algebras
    Dedekind complete posets from sheaves on von Neumann algebras Alexandru Chirvasitu∗ November 8, 2018 Abstract We show that for any two von Neumann algebras M and N, the space of non-unital normal homomorphisms N → M with finite support, modulo conjugation by unitaries in M, is Dedekind complete with respect to the partial order coming from the addition of homomorphisms with orthogonal ranges; this ties in with work by Brown and Capraro, where the corresponding objects are given Banach space structures under various niceness conditions on M and N. More generally, we associate to M a Grothendieck site-type category, and show that presheaves satisfying a sheaf-like condition on this category give rise to Dedekind complete lattices upon modding out unitary conjugation. Examples include the above-mentioned spaces of morphisms, as well as analogous spaces of completely positive or contractive maps. We also study conditions under which these posets can be endowed with cone structures extending their partial additions. Keywords: von Neumann algebra, poset, lattice, Dedekind complete, sheaf, sketch, cone Contents 1 The canonical sketch and sheaves on it 3 2 Sheaves give rise to Dedekind complete posets 7 3 Divisibility and cone structures 11 4 Completely positive / contractive maps as homomorphisms 14 References 15 arXiv:1307.8400v1 [math.OA] 31 Jul 2013 Introduction Organizing objects one is interested in into “moduli spaces” and then endowing such spaces with as much structure as possible is one of the more familiar themes in mathematics. As an instance of this, with the objects in question being operator algebra homomorphisms, Brown studies in [2] the space Hom(A, B) of normal unital homomorphisms between two W ∗-algebras A, B up to conjugation by unitaries in B (and similarly a C∗ version).
    [Show full text]