Math 412. the First Isomorphism Theorem

Total Page:16

File Type:pdf, Size:1020Kb

Math 412. the First Isomorphism Theorem (c)Karen E. Smith 2018 UM Math Dept licensed under a Creative Commons By-NC-SA 4.0 International License. Math 412. The First Isomorphism Theorem. φ NOETHER’S FIRST ISOMORPHISM THEOREM: Let R −! S be a surjective homomor- phism of rings. Let I be the kernel of φ. Then R=I is isomorphic to S. More precisely, there is a well-defined ring isomorphism R=I ! S given by r + I 7! φ(r). A. WARM-UP: (1) Prove that the kernel of any ring homomorphism φ : R ! S is an ideal of the source ring. (2) Prove that the image of any ring homomorphism φ : R ! S is a subring of the target ring. (1) This is proved on page 155 (Theorem 6.10). Actually, here is a better proof. We need to show that ker φ is closed under addition and under both left and right multi- plication by arbitrary element of R. Say x; y 2 ker φ. To check that x + y 2 ker φ, apply φ(x + y) = φ(x) + φ(y) = 0 + 0 = 0. So x + y 2 ker φ. Take r 2 R arbi- trary. To check that rx is in ker φ, apply φ: φ(rx) = φ(r)φ(x) = φ(r) · 0 = 0, so rx 2 ker φ. Likewise, applying φ to xr, we haveφ(xr) = φ(x)φ(r) = 0 · φ(r) = 0, so xr 2 ker φ. QED (2) This is proved on page 77 of the text (Corollary 3.11). We do have one extra thing to check, since our definition of rings (and subrings) include the multiplicative identity. We check that 1S 2 im(φ), which is easy, since φ(1R) = 1S by definition of ring homomorphism, so 1S is in the image of φ. B: Consider the canonical homomorphism: Z ! Zn a 7! [a]n (1) Make sure everyone in your group can explain why this map is a surjective ring homo- morphism. (2) Compute the kernel. (3) Find a generator for the kernel. (4) Verify the first isomorphism theorem for this ring homomorphism. (1) We’ve proved this multiple times but no shame if it is not clear: Please come talk to me if you are unsure. (2) The kernel is the ideal of multiples of n. (3) A generator is n (another generator is −n). (4) The first isomorphism theorem says that the quotient ring Z=(n) is isomorphic to Zn. This is indeed true: you proved it on the last worksheet in the first problem. Even more than isomorphic: these are literally the same set of sets (congruence classses mod n). C: Fix any real number a. Consider the evaluation map η : R[x] ! R f 7! f(a) (1) Make sure you understand why the evaluation map is a surjective ring homomor- phism. 1 (2) Prove that the kernel of η is the ideal I of R[x] generated by (x − a). (3) Use the first isomorphism theorem to prove that R[x]=(x − a) is isomorphic to R. ∼ (4) Give a direct proof that R[x]=(x − a) = R by thinking about the congruence classes [f](x−a). Why is there a bijection with R that preserves the ring structure? (1) Please come talk to me if you are unsure why this is a ring homomorphism. To prove it is surjective: take arbitrary λ 2 R (the target). Let f(x) 2 R[x] (the source) be the constant polynomial f(x) = λ. Then the evaluation map sends f to λ. So it is surjective. (2) The kernel is ff 2 R[x] j f(a) = 0g. By the Remainder theorem, f(a) = 0 if and only if (x − a) is a factor of f. This means the kernel is f(x − a)g(x) j g 2 R[x]g. So (x − a) is a generator. (3) Apply the first isomorphism theorem to the evaluation map R[x] ! R f 7! f(a): The kernel is (x − a) so the quotient ring R[x]=(x − a) =∼ R. (4) Each class in R[x]=(x − a) is uniquely represented by the common remainder of the elements in it when divided by (x − a) (from worksheet last time). These remainders have degree less than 1 (the degree of x − a). So they are constant polynomials. So there is a So when we add/multiply classes in R[x]=(x − a), we can represent them all by [λ]x−a where λ 2 R. The way we add/multiply is “the same” as the way we add/multiply in R. That is: [λ]x−a · [µ]x−a = [λµ]x−a and similarly for addition. Clearly this is a bijection: each λ 2 R lies in exactly one class [λ]x−a and each class [g]x−a contains exactly one constant polynomial (which we know from the remainder theorem to be g(a).) When we identify the class of g with the remainder after dividing by (x − a); we get f(a) by the Remainder theorem. This is the evaluation map! p D: Let i be the complex number −1. Consider the ring homomorphism φ : R[x] ! C f 7! f(i) (1) Prove that φ is surjective. (2) Prove that x2 + 1 2 ker φ. (3) Prove that the kernel contains no (non-zero) polynomial of degree less than two. (4) Prove that x2 + 1 generates ker φ. [Hint: If f(x) is in the kernel, use the division algorithm to divide f by x2 + 1 and see what happens under φ.] (5) Use the First Isomorphism Theorem to explain how to think about the complex numbers as a quotient of the polynomial ring R[x]: (1) Take arbitrary a+bi in the target C. The polynomial a+bx in the source satisfies φ(a+bx) = a+bi, so φ is surjective. (2) φ(x2 + 1) = i2 + 1 = 0. So x2 + 1 2 ker φ. (3) Take arbitrary a + bx of degree one or less. Apply φ to get φ(a + bx) = a + bi which is not the zero complex number unless a = b = 0. So no non-zero element of degree one or less is in the kernel. (4) We need to prove ker φ = (x2 + 1): First we show (x2 + 1) ⊂ ker φ. Take arbitrary g(x)(x2 + 1) 2 (x2 + 1): SInce the kernel is an ideal and x2 + 1 2 ker φ, every multiple of x2 + 1 2 ker φ. So (x2 + 1) ⊂ ker φ. For the other direction: Take f 2 ker φ. Use the division algorithm to write f = (x2 + 1)q(x) + r(x) where r = 0 or degree r < 2. We need to show r = 0. Apply φ: φ(f) = φ(x2 + 1)φ(q) + φ(r): SInce f and x2 + 1 are in the kernel, we see that 0 = 0φ(q) + φ(r). So φ(r) = 0. But the kernel has no element of degree 1 or less! So r = 0. This means f 2 (x2 + 1). So ker φ ⊂ (x2 + 1). (5) The map φ is a surjective ring homomorphism and the kernel is (x2 + 1): So the first isomorphism theorem says that C =∼ R[x]=(x2 + 1): E: Let n and m be integers. 1One direction is easy. For the other, say g 2 ker η, and use the division algorithm to divide g by (x − a). Then apply η. (1) There is a unique ring homomorphism φ : Z ! Zn × Zm. Find it. Why is it unique? (2) Prove that the kernel is generated by the least common multiple of m and n. In par- ticular, if m and n are relatively prime, explain why the kernel consists of multiples of mn. (3) Let d be the least common multiple of m and n. Use the first isomorphism theorem to ∼ prove that there is a ring isomorphism Zd = im(φ). (4) Explain why if m and n are relatively prime your ring homomorphism φ is surjective.2 (5) Use the first isomorphism theorem to prove that if m and n are relatively prime, then ∼ Zmn = Zn × Zm. [You gave a different proof on Problem Set 5.] (1) Define φ : Z ! Zn × Zm by φ(x) = ([x]n; [x]m). It is easy to check that this is an homomorphism (do it!). Note that because 1 7! ([1]n; [1]m), the entire mapping is completely determined! Every element of Z is either 1 + 1 + ··· + 1 (x times say, to get x) or the additive inverse of this, and ring homomorphisms respect addition, we know x = 1 + 1 + ··· + 1 MUST go to ([1]n; [1]m) + ([1]n; [1]m) + ··· + ([1]n; [1]m) = ([x]n; [x]m) (and similarly for −x). This argument shows that there is ONLY ONE homomorphism from Z to any ring, in fact. (2) An integer a is mapped to ([0]n; [0]m) if and only if ([0]n; [0]m) = ([a]n; [a]m), which is to say: a is a multiple of both m and n. Every multiple of both m and n is a multiple of the least common multiple, so the least common multiple generates the kernel. If m and n are relatively prime, then the lcm is mn, as follows from the fundamental theorem of arithmetic. (3) Since the image of φ is a ring, the map Z ! im(φ) sending x 7! ([x]n; [x]m) is a surjective ring ∼ homomorphism. Its kernel is generated by the lcm d. So Zd = im(φ). (4) To show φ is surjective, take any ([a]; [b]) 2 Zn × Zm.
Recommended publications
  • Kernel and Image
    Math 217 Worksheet 1 February: x3.1 Professor Karen E Smith (c)2015 UM Math Dept licensed under a Creative Commons By-NC-SA 4.0 International License. T Definitions: Given a linear transformation V ! W between vector spaces, we have 1. The source or domain of T is V ; 2. The target of T is W ; 3. The image of T is the subset of the target f~y 2 W j ~y = T (~x) for some x 2 Vg: 4. The kernel of T is the subset of the source f~v 2 V such that T (~v) = ~0g. Put differently, the kernel is the pre-image of ~0. Advice to the new mathematicians from an old one: In encountering new definitions and concepts, n m please keep in mind concrete examples you already know|in this case, think about V as R and W as R the first time through. How does the notion of a linear transformation become more concrete in this special case? Think about modeling your future understanding on this case, but be aware that there are other important examples and there are important differences (a linear map is not \a matrix" unless *source and target* are both \coordinate spaces" of column vectors). The goal is to become comfortable with the abstract idea of a vector space which embodies many n features of R but encompasses many other kinds of set-ups. A. For each linear transformation below, determine the source, target, image and kernel. 2 3 x1 3 (a) T : R ! R such that T (4x25) = x1 + x2 + x3.
    [Show full text]
  • Math 120 Homework 3 Solutions
    Math 120 Homework 3 Solutions Xiaoyu He, with edits by Prof. Church April 21, 2018 [Note from Prof. Church: solutions to starred problems may not include all details or all portions of the question.] 1.3.1* Let σ be the permutation 1 7! 3; 2 7! 4; 3 7! 5; 4 7! 2; 5 7! 1 and let τ be the permutation 1 7! 5; 2 7! 3; 3 7! 2; 4 7! 4; 5 7! 1. Find the cycle decompositions of each of the following permutations: σ; τ; σ2; στ; τσ; τ 2σ. The cycle decompositions are: σ = (135)(24) τ = (15)(23)(4) σ2 = (153)(2)(4) στ = (1)(2534) τσ = (1243)(5) τ 2σ = (135)(24): 1.3.7* Write out the cycle decomposition of each element of order 2 in S4. Elements of order 2 are also called involutions. There are six formed from a single transposition, (12); (13); (14); (23); (24); (34), and three from pairs of transpositions: (12)(34); (13)(24); (14)(23). 3.1.6* Define ' : R× ! {±1g by letting '(x) be x divided by the absolute value of x. Describe the fibers of ' and prove that ' is a homomorphism. The fibers of ' are '−1(1) = (0; 1) = fall positive realsg and '−1(−1) = (−∞; 0) = fall negative realsg. 3.1.7* Define π : R2 ! R by π((x; y)) = x + y. Prove that π is a surjective homomorphism and describe the kernel and fibers of π geometrically. The map π is surjective because e.g. π((x; 0)) = x. The kernel of π is the line y = −x through the origin.
    [Show full text]
  • Discrete Topological Transformations for Image Processing Michel Couprie, Gilles Bertrand
    Discrete Topological Transformations for Image Processing Michel Couprie, Gilles Bertrand To cite this version: Michel Couprie, Gilles Bertrand. Discrete Topological Transformations for Image Processing. Brimkov, Valentin E. and Barneva, Reneta P. Digital Geometry Algorithms, 2, Springer, pp.73-107, 2012, Lecture Notes in Computational Vision and Biomechanics, 978-94-007-4174-4. 10.1007/978-94- 007-4174-4_3. hal-00727377 HAL Id: hal-00727377 https://hal-upec-upem.archives-ouvertes.fr/hal-00727377 Submitted on 3 Sep 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Chapter 3 Discrete Topological Transformations for Image Processing Michel Couprie and Gilles Bertrand Abstract Topology-based image processing operators usually aim at trans- forming an image while preserving its topological characteristics. This chap- ter reviews some approaches which lead to efficient and exact algorithms for topological transformations in 2D, 3D and grayscale images. Some transfor- mations which modify topology in a controlled manner are also described. Finally, based on the framework of critical kernels, we show how to design a topologically sound parallel thinning algorithm guided by a priority function. 3.1 Introduction Topology-preserving operators, such as homotopic thinning and skeletoniza- tion, are used in many applications of image analysis to transform an object while leaving unchanged its topological characteristics.
    [Show full text]
  • Kernel Methodsmethods Simple Idea of Data Fitting
    KernelKernel MethodsMethods Simple Idea of Data Fitting Given ( xi,y i) i=1,…,n xi is of dimension d Find the best linear function w (hyperplane) that fits the data Two scenarios y: real, regression y: {-1,1}, classification Two cases n>d, regression, least square n<d, ridge regression New sample: x, < x,w> : best fit (regression), best decision (classification) 2 Primary and Dual There are two ways to formulate the problem: Primary Dual Both provide deep insight into the problem Primary is more traditional Dual leads to newer techniques in SVM and kernel methods 3 Regression 2 w = arg min ∑(yi − wo − ∑ xij w j ) W i j w = arg min (y − Xw )T (y − Xw ) W d(y − Xw )T (y − Xw ) = 0 dw ⇒ XT (y − Xw ) = 0 w = [w , w ,L, w ]T , ⇒ T T o 1 d X Xw = X y L T x = ,1[ x1, , xd ] , T −1 T ⇒ w = (X X) X y y = [y , y ,L, y ]T ) 1 2 n T −1 T xT y =< x (, X X) X y > 1 xT X = 2 M xT 4 n n×xd Graphical Interpretation ) y = Xw = Hy = X(XT X)−1 XT y = X(XT X)−1 XT y d X= n FICA Income X is a n (sample size) by d (dimension of data) matrix w combines the columns of X to best approximate y Combine features (FICA, income, etc.) to decisions (loan) H projects y onto the space spanned by columns of X Simplify the decisions to fit the features 5 Problem #1 n=d, exact solution n>d, least square, (most likely scenarios) When n < d, there are not enough constraints to determine coefficients w uniquely d X= n W 6 Problem #2 If different attributes are highly correlated (income and FICA) The columns become dependent Coefficients
    [Show full text]
  • Kernel Methods for Knowledge Structures
    Kernel Methods for Knowledge Structures Zur Erlangung des akademischen Grades eines Doktors der Wirtschaftswissenschaften (Dr. rer. pol.) von der Fakultät für Wirtschaftswissenschaften der Universität Karlsruhe (TH) genehmigte DISSERTATION von Dipl.-Inform.-Wirt. Stephan Bloehdorn Tag der mündlichen Prüfung: 10. Juli 2008 Referent: Prof. Dr. Rudi Studer Koreferent: Prof. Dr. Dr. Lars Schmidt-Thieme 2008 Karlsruhe Abstract Kernel methods constitute a new and popular field of research in the area of machine learning. Kernel-based machine learning algorithms abandon the explicit represen- tation of data items in the vector space in which the sought-after patterns are to be detected. Instead, they implicitly mimic the geometry of the feature space by means of the kernel function, a similarity function which maintains a geometric interpreta- tion as the inner product of two vectors. Knowledge structures and ontologies allow to formally model domain knowledge which can constitute valuable complementary information for pattern discovery. For kernel-based machine learning algorithms, a good way to make such prior knowledge about the problem domain available to a machine learning technique is to incorporate it into the kernel function. This thesis studies the design of such kernel functions. First, this thesis provides a theoretical analysis of popular similarity functions for entities in taxonomic knowledge structures in terms of their suitability as kernel func- tions. It shows that, in a general setting, many taxonomic similarity functions can not be guaranteed to yield valid kernel functions and discusses the alternatives. Secondly, the thesis addresses the design of expressive kernel functions for text mining applications. A first group of kernel functions, Semantic Smoothing Kernels (SSKs) retain the Vector Space Models (VSMs) representation of textual data as vec- tors of term weights but employ linguistic background knowledge resources to bias the original inner product in such a way that cross-term similarities adequately con- tribute to the kernel result.
    [Show full text]
  • Abelian Categories
    Abelian Categories Lemma. In an Ab-enriched category with zero object every finite product is coproduct and conversely. π1 Proof. Suppose A × B //A; B is a product. Define ι1 : A ! A × B and π2 ι2 : B ! A × B by π1ι1 = id; π2ι1 = 0; π1ι2 = 0; π2ι2 = id: It follows that ι1π1+ι2π2 = id (both sides are equal upon applying π1 and π2). To show that ι1; ι2 are a coproduct suppose given ' : A ! C; : B ! C. It φ : A × B ! C has the properties φι1 = ' and φι2 = then we must have φ = φid = φ(ι1π1 + ι2π2) = ϕπ1 + π2: Conversely, the formula ϕπ1 + π2 yields the desired map on A × B. An additive category is an Ab-enriched category with a zero object and finite products (or coproducts). In such a category, a kernel of a morphism f : A ! B is an equalizer k in the diagram k f ker(f) / A / B: 0 Dually, a cokernel of f is a coequalizer c in the diagram f c A / B / coker(f): 0 An Abelian category is an additive category such that 1. every map has a kernel and a cokernel, 2. every mono is a kernel, and every epi is a cokernel. In fact, it then follows immediatly that a mono is the kernel of its cokernel, while an epi is the cokernel of its kernel. 1 Proof of last statement. Suppose f : B ! C is epi and the cokernel of some g : A ! B. Write k : ker(f) ! B for the kernel of f. Since f ◦ g = 0 the map g¯ indicated in the diagram exists.
    [Show full text]
  • 2.2 Kernel and Range of a Linear Transformation
    2.2 Kernel and Range of a Linear Transformation Performance Criteria: 2. (c) Determine whether a given vector is in the kernel or range of a linear trans- formation. Describe the kernel and range of a linear transformation. (d) Determine whether a transformation is one-to-one; determine whether a transformation is onto. When working with transformations T : Rm → Rn in Math 341, you found that any linear transformation can be represented by multiplication by a matrix. At some point after that you were introduced to the concepts of the null space and column space of a matrix. In this section we present the analogous ideas for general vector spaces. Definition 2.4: Let V and W be vector spaces, and let T : V → W be a transformation. We will call V the domain of T , and W is the codomain of T . Definition 2.5: Let V and W be vector spaces, and let T : V → W be a linear transformation. • The set of all vectors v ∈ V for which T v = 0 is a subspace of V . It is called the kernel of T , And we will denote it by ker(T ). • The set of all vectors w ∈ W such that w = T v for some v ∈ V is called the range of T . It is a subspace of W , and is denoted ran(T ). It is worth making a few comments about the above: • The kernel and range “belong to” the transformation, not the vector spaces V and W . If we had another linear transformation S : V → W , it would most likely have a different kernel and range.
    [Show full text]
  • 23. Kernel, Rank, Range
    23. Kernel, Rank, Range We now study linear transformations in more detail. First, we establish some important vocabulary. The range of a linear transformation f : V ! W is the set of vectors the linear transformation maps to. This set is also often called the image of f, written ran(f) = Im(f) = L(V ) = fL(v)jv 2 V g ⊂ W: The domain of a linear transformation is often called the pre-image of f. We can also talk about the pre-image of any subset of vectors U 2 W : L−1(U) = fv 2 V jL(v) 2 Ug ⊂ V: A linear transformation f is one-to-one if for any x 6= y 2 V , f(x) 6= f(y). In other words, different vector in V always map to different vectors in W . One-to-one transformations are also known as injective transformations. Notice that injectivity is a condition on the pre-image of f. A linear transformation f is onto if for every w 2 W , there exists an x 2 V such that f(x) = w. In other words, every vector in W is the image of some vector in V . An onto transformation is also known as an surjective transformation. Notice that surjectivity is a condition on the image of f. 1 Suppose L : V ! W is not injective. Then we can find v1 6= v2 such that Lv1 = Lv2. Then v1 − v2 6= 0, but L(v1 − v2) = 0: Definition Let L : V ! W be a linear transformation. The set of all vectors v such that Lv = 0W is called the kernel of L: ker L = fv 2 V jLv = 0g: 1 The notions of one-to-one and onto can be generalized to arbitrary functions on sets.
    [Show full text]
  • Positive Semigroups of Kernel Operators
    Positivity 12 (2008), 25–44 c 2007 Birkh¨auser Verlag Basel/Switzerland ! 1385-1292/010025-20, published online October 29, 2007 DOI 10.1007/s11117-007-2137-z Positivity Positive Semigroups of Kernel Operators Wolfgang Arendt Dedicated to the memory of H.H. Schaefer Abstract. Extending results of Davies and of Keicher on !p we show that the peripheral point spectrum of the generator of a positive bounded C0-semigroup of kernel operators on Lp is reduced to 0. It is shown that this implies con- vergence to an equilibrium if the semigroup is also irreducible and the fixed space non-trivial. The results are applied to elliptic operators. Mathematics Subject Classification (2000). 47D06, 47B33, 35K05. Keywords. Positive semigroups, Kernel operators, asymptotic behaviour, trivial peripheral spectrum. 0. Introduction Irreducibility is a fundamental notion in Perron-Frobenius Theory. It had been introduced in a direct way by Perron and Frobenius for matrices, but it was H. H. Schaefer who gave the definition via closed ideals. This turned out to be most fruit- ful and led to a wealth of deep and important results. For applications Ouhabaz’ very simple criterion for irreduciblity of semigroups defined by forms (see [Ouh05, Sec. 4.2] or [Are06]) is most useful. It shows that for practically all boundary con- ditions, a second order differential operator in divergence form generates a positive 2 N irreducible C0-semigroup on L (Ω) where Ωis an open, connected subset of R . The main question in Perron-Frobenius Theory, is to determine the asymp- totic behaviour of the semigroup. If the semigroup is bounded (in fact Abel bounded suffices), and if the fixed space is non-zero, then irreducibility is equiv- alent to convergence of the Ces`aro means to a strictly positive rank-one opera- tor, i.e.
    [Show full text]
  • The Kernel of a Linear Transformation Is a Vector Subspace
    The kernel of a linear transformation is a vector subspace. Given two vector spaces V and W and a linear transformation L : V ! W we define a set: Ker(L) = f~v 2 V j L(~v) = ~0g = L−1(f~0g) which we call the kernel of L. (some people call this the nullspace of L). Theorem As defined above, the set Ker(L) is a subspace of V , in particular it is a vector space. Proof Sketch We check the three conditions 1 Because we know L(~0) = ~0 we know ~0 2 Ker(L). 2 Let ~v1; ~v2 2 Ker(L) then we know L(~v1 + ~v2) = L(~v1) + L(~v2) = ~0 + ~0 = ~0 and so ~v1 + ~v2 2 Ker(L). 3 Let ~v 2 Ker(L) and a 2 R then L(a~v) = aL(~v) = a~0 = ~0 and so a~v 2 Ker(L). Math 3410 (University of Lethbridge) Spring 2018 1 / 7 Example - Kernels Matricies Describe and find a basis for the kernel, of the linear transformation, L, associated to 01 2 31 A = @3 2 1A 1 1 1 The kernel is precisely the set of vectors (x; y; z) such that L((x; y; z)) = (0; 0; 0), so 01 2 31 0x1 001 @3 2 1A @yA = @0A 1 1 1 z 0 but this is precisely the solutions to the system of equations given by A! So we find a basis by solving the system! Theorem If A is any matrix, then Ker(A), or equivalently Ker(L), where L is the associated linear transformation, is precisely the solutions ~x to the system A~x = ~0 This is immediate from the definition given our understanding of how to associate a system of equations to M~x = ~0: Math 3410 (University of Lethbridge) Spring 2018 2 / 7 The Kernel and Injectivity Recall that a function L : V ! W is injective if 8~v1; ~v2 2 V ; ((L(~v1) = L(~v2)) ) (~v1 = ~v2)) Theorem A linear transformation L : V ! W is injective if and only if Ker(L) = f~0g.
    [Show full text]
  • Quasi-Arithmetic Filters for Topology Optimization
    Quasi-Arithmetic Filters for Topology Optimization Linus Hägg Licentiate thesis, 2016 Department of Computing Science This work is protected by the Swedish Copyright Legislation (Act 1960:729) ISBN: 978-91-7601-409-7 ISSN: 0348-0542 UMINF 16.04 Electronic version available at http://umu.diva-portal.org Printed by: Print & Media, Umeå University, 2016 Umeå, Sweden 2016 Acknowledgments I am grateful to my scientific advisors Martin Berggren and Eddie Wadbro for introducing me to the fascinating subject of topology optimization, for sharing their knowledge in countless discussions, and for helping me improve my scientific skills. Their patience in reading and commenting on the drafts of this thesis is deeply appreciated. I look forward to continue with our work. Without the loving support of my family this thesis would never have been finished. Especially, I am thankful to my wife Lovisa for constantly encouraging me, and covering for me at home when needed. I would also like to thank my colleges at the Department of Computing Science, UMIT research lab, and at SP Technical Research Institute of Sweden for providing a most pleasant working environment. Finally, I acknowledge financial support from the Swedish Research Council (grant number 621-3706), and the Swedish strategic research programme eSSENCE. Linus Hägg Skellefteå 2016 iii Abstract Topology optimization is a framework for finding the optimal layout of material within a given region of space. In material distribution topology optimization, a material indicator function determines the material state at each point within the design domain. It is well known that naive formulations of continuous material distribution topology optimization problems often lack solutions.
    [Show full text]
  • On Semifields of Type
    I I G ◭◭ ◮◮ ◭ ◮ On semifields of type (q2n,qn,q2,q2,q), n odd page 1 / 19 ∗ go back Giuseppe Marino Olga Polverino Rocco Tromebtti full screen Abstract 2n n 2 2 close A semifield of type (q , q , q , q , q) (with n > 1) is a finite semi- field of order q2n (q a prime power) with left nucleus of order qn, right 2 quit and middle nuclei both of order q and center of order q. Semifields of type (q6, q3, q2, q2, q) have been completely classified by the authors and N. L. Johnson in [10]. In this paper we determine, up to isotopy, the form n n of any semifield of type (q2 , q , q2, q2, q) when n is an odd integer, proving n−1 that there exist 2 non isotopic potential families of semifields of this type. Also, we provide, with the aid of the computer, new examples of semifields of type (q14, q7, q2, q2, q), when q = 2. Keywords: semifield, isotopy, linear set MSC 2000: 51A40, 51E20, 12K10 1. Introduction A finite semifield S is a finite algebraic structure satisfying all the axioms for a skew field except (possibly) associativity. The subsets Nl = {a ∈ S | (ab)c = a(bc), ∀b, c ∈ S} , Nm = {b ∈ S | (ab)c = a(bc), ∀a, c ∈ S} , Nr = {c ∈ S | (ab)c = a(bc), ∀a, b ∈ S} and K = {a ∈ Nl ∩ Nm ∩ Nr | ab = ba, ∀b ∈ S} are fields and are known, respectively, as the left nucleus, the middle nucleus, the right nucleus and the center of the semifield.
    [Show full text]