• Keine Ergebnisse gefunden

Algorithmic homological algebra

N/A
N/A
Protected

Academic year: 2021

Aktie "Algorithmic homological algebra"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Algorithmic homological algebra

Exercise sheet 5

Prof. Dr. Mohamed Barakat, Sebastian Posur

Exercise 1. (Computable rings)

Given a constructive field k equipped with the Gaussian normal form algorithm, more precisely, an algorithm to compute the row reduced echelon form (RREF). Apply such an algorithm to the block matrix (1 B 00 A 1) and obtain1 B0 −X

0 A0 Y 0 0 S

. Show that setting

• DecideZeroRows(B,A) := B0,

• DecideZeroRowsEffectively(B,A) := (B0,−X),

• SyzygiesOfRows(A) :=S,

turns k into a computable ring.

Exercise 2. (Category of matrices)

Letk be a constructive field. We construct the categoryk-vec as follows.

1. Objk-vec:=N0.

2. For m, n∈N0, Homk-vec(m, n) := km×n.

3. For n ∈N0, idn is the n×n identity matrix In.

4. For m, n, o ∈ N0, A ∈ km×n, B ∈kn×o, composition is given by the matrix product A·B.

Show thatk-vec is a constructively abelian category.

Exercise 3. (Gr¨obner basis)

(a) Prove Gordan’s lemma: LetR =k[x1, . . . , xn] be the polynomial ring innindetermi- nates over a field k. Then any nonempty set X of monomials in R has only finitely many minimal elements in the partial order given by divisibility.

(b) Let f1 = x2y − y3, f2 = x3 ∈ k[x, y]. Compute a Gr¨obner basis for the ideal I = hf1, f2i with respect to >lex. Visualize the monomials in L(I), and compute a multiplication table for k[x, y]/I.

Exercise 4. (Generalized inverses)

Prove that for any generalized morphism γ, we have (γ−1)−1 =γ.

(2)

Algorithmic homological algebra

Exercise 5. (Generalized morphisms and additive relations)

Given a ring R and R-modules A and B, we call a submodule S ⊆ A⊕B an additive relationfromA toB. Given two additive relations S ⊆A⊕B and T ⊆B⊕C, we define their composite as

S·T :={(a, c)∈A⊕C | ∃b ∈B : (a, b)∈S∧(b, c)∈T}. Now, let A0 ⊆A and B0 ⊆B be submodules. Given a generalized morphism

ψ :A←- A0 ψ

−→B/B0 B,

where A ←- A0 and B/B0 B are the canoncial inclusion and projection, we define the additive relation

F(ψ) :=

(a, b)∈A0⊕B | ψ(a) = b+B0 ⊆A⊕B.

(a) Show thatF defines a bijection from generalized morphisms fromAtoB to additive relations from A toB.

(b) Show that F is compatible with composition of generalized morphisms and compo- sition of additive relations, i.e., given another generalized morphism φ fromB to C, we have

F(ψ·φ) = F(ψ)·F(φ).

This exercise sheet will be discussed on 19.01.2017.

Referenzen

ÄHNLICHE DOKUMENTE

Mohamed Barakat, Sebastian Posur.

Abstract- A numerical algorithm to compute steady-state ground level concentration from elevated sources by means of a K-model which takes into account the spatial variability of

Instead of projecting one point at a time onto the nondominated frontier - like in the original reference point approach by Wierzbicki [1980] - Korhonen and Laakso [1986] proposed

Dijkstra iterates as long as the expanded nodes correspond to tree edges and delivers a solution path only when a node corresponding to a sidetrack edge is expanded.. Blind K

In other fields of statistical application we face the problem of finding the probability distribution corresponding to some given marginal distributions (Frechet [26]).

According to our proposed approach, during DDoS attack scenarios, most packets are generated by attackers, so the packet score value is higher than the packet score value during

(We only report these for the case where relative risk aversion is equal to 2; the results for the high risk aversion economies were almost identical.) Note that in the …ve

Note that both our algorithm as described above, and Wagner’s original k-tree algorithm, are based only on an analysis of the expected number of solutions found, which says